Quantcast
Channel: Hackmageddon.com » IBM
Browsing latest articles
Browse All 12 View Live

Image may be NSFW.
Clik here to view.

Il Cloud? E’ appena NATO!

Il 2011 sarà l’anno della definitiva consacrazione del Cloud (soprattutto per le implicazioni di sicurezza). A conferma di questo arriva la notizia che la NATO adotterà tecnologia Cloud IBM per il...

View Article



Image may be NSFW.
Clik here to view.

La Città (Verde) Tra Le Nuvole

Il titolo dell’articolo apparentemente richiama la romantica Cloud City, città tra le nuvole che contraddistingue le gesta di Han Solo e Lando Calrissian nell’Episodio V di Guerre Stellari. In realtà...

View Article

Image may be NSFW.
Clik here to view.

Application Security: What’s Next?

In the wake of the infamous LizaMoon which has flooded an impressive number of databases all over the world with SQL Injection, infecting more than 1,500,000 URLs according to Google Search, the next...

View Article

Image may be NSFW.
Clik here to view.

Driving Through The Clouds

How many times, stuck in traffic on a hot August day, we hoped to have a pair of wings to fly through the clouds and free from the wreckage of burning metal. Unfortunately, at least for me (even if my...

View Article

Image may be NSFW.
Clik here to view.

Some Random Thoughts On The Security Market

The intention by UK-headquartered company Sophos to acquire Astaro, the privately-held security company co-headquartered in Karlsruhe, Germany and Wilmington, Massachusetts (USA) is simply the last...

View Article


Image may be NSFW.
Clik here to view.

Information, The Next Battlefield

Today the Information Security Arena has been shaken by two separate, although similar, events: IBM and McAfee, two giants in this troubled market, have separately decided to make a decisive move into...

View Article

Image may be NSFW.
Clik here to view.

Advanced Persistent Threats and Security Information Management

Advanced Persistent Threats are probably the most remarkable events for Information Security in 2011 since they are redefining the infosec landscape from both technology and market perspective. I...

View Article

Image may be NSFW.
Clik here to view.

XML Encryption Cracked!

We have not completely assimilated the BEAST vulnerability, and here it comes, from Bochum, Germany, another serious flaw involving Encryption, or better, involving XML Encryption. XML Encryption, is a...

View Article


Image may be NSFW.
Clik here to view.

Looking Back…

Actually this post is nearly a couple of weeks in delay (last week I was skiing in at the Italian Dolomites!!). (Un)fortunately now that I am back to home (and to work), I have choosen this Friday The...

View Article


Image may be NSFW.
Clik here to view.

May 2012 Cyber Attacks Timeline (Part II)

As usual, here it is the second part of the Cyber Attacks Timeline for the month of May 2012: a month particularly rich of Cyber Events. As you will probably know, the Flame malware has monopolized the...

View Article

Image may be NSFW.
Clik here to view.

Ne resterà soltanto uno… (Prima Parte)

Il titolo di questo post riporta alla memoria la frase prinicipale del bel film “Higlander, L’Ultimo Immortale”, il capolavoro fantasy di Russel Mulcahy che nell’ormai lontanto 1986 rapì la mente di...

View Article

Image may be NSFW.
Clik here to view.

Ne resterà soltanto uno… (Seconda Parte)

Se immaginassimo per un attimo che non esista Antitrust, concentrandoci ad immaginare il framework di sicurezza ideale, potremmo suddividere un offerta completa di sicurezza in 6 domini: Sicurezza...

View Article
Browsing latest articles
Browse All 12 View Live




Latest Images