elastic-security.com
Read-Only Credentials For EC2 | Elastic Security
https://elastic-security.com/2010/12/30/read-only-credentials-for-ec2
Elastic Security for Cloud Infrastructures (IaaS). Read-Only Credentials For EC2. December 30, 2010. A common concern of EC2 users with regard to using third-party tools like Elastic Detector. Is the fact that those tools require the users’ AWS EC2 credentials to work. In the wrong hands, those credentials can be misused to cause significant damage by e.g. shutting down instances. Fortunately, AWS provides a solution called Identity and Access Management (IAM). 1 Install IAM Client Tools. 2 Create A Group.
sipxecs.blogspot.com
sipXcom (formerly sipXecs) News, Tips and Equipment: Building CentOS 5.7 images for Amazon EC2
http://sipxecs.blogspot.com/2011/11/building-centos-57-images-for-amazon.html
SipXcom (formerly sipXecs) News, Tips and Equipment. A blog about using the SIP Open Source sipXcom Unified Communications Server. sipXcom is a fork of sipXecs. Thursday, November 24, 2011. Building CentOS 5.7 images for Amazon EC2. I'm new to Amazon's EC2 platform so I've struggled a bit with it as of late. I had been using Rightscale's. I'll spare the trials and tribulations of what I went through and get to exactly how I now build my images. The basic process I am using is as follows:. So it simplifie...
sipxecs.blogspot.com
sipXcom (formerly sipXecs) News, Tips and Equipment: November 2011
http://sipxecs.blogspot.com/2011_11_01_archive.html
SipXcom (formerly sipXecs) News, Tips and Equipment. A blog about using the SIP Open Source sipXcom Unified Communications Server. sipXcom is a fork of sipXecs. Thursday, November 24, 2011. Building CentOS 5.7 images for Amazon EC2. I'm new to Amazon's EC2 platform so I've struggled a bit with it as of late. I had been using Rightscale's. I'll spare the trials and tribulations of what I went through and get to exactly how I now build my images. The basic process I am using is as follows:. So it simplifie...
elastic-security.com
AWS | Elastic Security
https://elastic-security.com/category/aws
Elastic Security for Cloud Infrastructures (IaaS). Big Data Security: How to secure your Hadoop cluster. Hi all, Big Data is for sure one of the biggest trends of the last few years. Besides the conceptual discussions on what big data actually is and what amount of data can be defined as such, any technology that quickly becomes widespread is relevant to security as well. A bit of History When talking about…. August 10, 2016. How-To: Creating Advanced AWS Credentials with IAM. May 18, 2016. July 7, 2014.
elastic-security.com
Great Trailblazer Competition to start the year! | Elastic Security
https://elastic-security.com/2014/01/10/great-trailblazer-competition-to-start-the-year
Elastic Security for Cloud Infrastructures (IaaS). Great Trailblazer Competition to start the year! January 10, 2014. As 2014 kicks off, we at SecludIT would like to wish you a fantastic start to 2014! Starting the year, we would like to share some great news on SecludIT being a Security Trailblazer Finalist. Currently, as finalists of this competition, we are at the last step where we need now to raise the most votes to become 2014’s Security Trailblazer. January 10, 2014. Docker: Best Security Practices.
elastic-security.com
Discussions | Elastic Security
https://elastic-security.com/category/discussions
Elastic Security for Cloud Infrastructures (IaaS). A deeper look at Whatsapp End-to-end Encryption. Hi all, a few days ago Whatsapp announced that end-to-end encryption is finally available on iOS and Android (only if you have the latest version of Whatsapp installed). That’s great news! It’s worth pointing out it’s been a while that users have been asking for this feature, and other applications have been providing it with…. April 26, 2016. First Line of Defense: Best Security Practices for Users. Hi th...
elastic-security.com
Elastic Security | Elastic Security
https://elastic-security.com/category/elastic-security
Elastic Security for Cloud Infrastructures (IaaS). How to outsource your data to the Cloud without losing confidentiality and control. Hi there, recently, data leaks and various security incidents have been constantly part of daily news and scandals. From an end-user point of view, it looks like storing confidential data in the cloud is a serious risk, especially when dealing with sensitive and strategic data. Why? Thanks to the confession of Edward Snowden, we now know for sure…. May 5, 2015. Hi there, ...
elastic-security.com
Secure Cloud | Elastic Security
https://elastic-security.com/category/secure-cloud
Elastic Security for Cloud Infrastructures (IaaS). Big Data Security: How to secure your Hadoop cluster. Hi all, Big Data is for sure one of the biggest trends of the last few years. Besides the conceptual discussions on what big data actually is and what amount of data can be defined as such, any technology that quickly becomes widespread is relevant to security as well. A bit of History When talking about…. August 10, 2016. A deeper look at Whatsapp End-to-end Encryption. April 26, 2016. April 11, 2016.
elastic-security.com
ClouDedup: Secure Deduplication with Encrypted Data for Cloud Storage | Elastic Security
https://elastic-security.com/2013/12/10/cloudedup-secure-deduplication
Elastic Security for Cloud Infrastructures (IaaS). ClouDedup: Secure Deduplication with Encrypted Data for Cloud Storage. December 10, 2013. In this post I will have the pleasure to introduce our proposed solution for secure block-level deduplication. We presented this work at IEEE CloudCom 2013. You can find the slides). IBM System Storage N series Deduplication. And Symantec’s NetBackup. From a high-level point of view, deduplication is very simple: duplicate data is stored only once. In convergent enc...