Tag Cloud

Bloggers

Blog

Follow and talk to Infosecurity's bloggers.

Follow Infosecurity's bloggers as they share their thoughts on the industry, technology, and much more. Our bloggers have been selected for their industry expertise. They welcome interaction, so we encourage you to add your opinions to theirs.

0
comments
By Gavin Hill For years, cybercriminals have been taking advantage of the blind trust organizations and users place in cryptographic keys and digital certificates. Only now are vendors starting to respond to the use of keys and certificates as an attack vector. In late August, for example, Google ...
Posted 18 October 2013 by Cloud Security Alliance (CSA)
0
comments
Is Your Computer Photochromatic?
Earlier this year Google showed off its prototype for the long-awaited Google Glass, described as “a stamp-sized electronic screen mounted on the left side of a pair of eyeglass frames which can record video, access email and messages, and retrieve information from the Web.” The glasses ...
Posted 06 December 2012 by Slack Alice
0
comments
 By Tsahy Shapsa Customers care about the security of their data in the cloud, and security of customer data is obviously important to Google, which is why Google has invested in completing numerous security audits and certifications such as FISMA, SSAE 16, and recently, ISO 27001. Since 20 ...
Posted 19 July 2012 by Cloud Security Alliance (CSA)
0
comments
Google recently announced an approach to provide Wi-Fi Access Point owners an option to opt-out from the Google Location server, thereby addressing specific privacy concerns of certain Access Point owners, and of the users in the coverage area of specific Access Point(s). Location based services ( ...
Posted 20 November 2011 by Ajay Gupta
0
comments
To be clear upfront: This is not a 'Microsoft versus Google' post. I cannot even judge how far Google pushed security with the Chrome OS. But the following article raised quite some questions how we look at security: Inside the Google Chrome OS security model. This article, like so many when securi ...
Posted 19 November 2009 by Roger Halbheer
Showing 1 - 5 of 5 blogs
View the RSS feed for this blog »
We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies. ×