Cloud Security

Facebook Fixes Privacy Bug

Grazed from eWeek.  Author: Brian Prince.

Facebook has fixed a bug that could have been abused by someone looking to get their hands on the full names and photos of users.

Atul Agarwal of Secfence Technologies posted information about the issue to the Full Disclosure mailing list Aug. 11. If someone entered a user’s e-mail address and the wrong password in the log-in page, the site coughed up the user’s full name and profile picture in addition to an incorrect password message.

Identity Management Shifts Toward the Cloud

Grazed from IT Business Edge.  Author: Michael Vizard.

As cloud computing evolves, access control is already becoming a major issue. In fact, when you ask IT organizations what their major issue is with cloud computing, some form of security is always at the top of the list.

Crypto Signatures Are Key to New DNS Security

Grazed from Internet Revolution.  Author: Sean Gallagher.

At the recent Black Hat information security conference, officials of ICANN and VeriSign Inc. (Nasdaq: VRSN) announced a major change to the Domain Name Service (DNS), the Internet’s global address book. Called Domain Name Service Security Extensions (DNSSEC), the modification adds a cryptographic signature to Websites’ addresses that verifies they are genuine.

Telarus picks Fortinet for cloud security

Grazed from IT Wire.  Author: Stephen Withers.

Telarus has become the first company in Asia Pacific to acquire a FortiGate-3951B unified threat managment (UTM) appliance, which it will use to deliver an managed firewall service.

The company is a Fortinet Gold Partner, and the first Fortinet managed security service provider in the Asia Pacific region. This has required all network operations and engineering staff to achieve Fortinet certification.

Mr Jules Rumsey, CEO of Telarus, said the Telarus Managed Firewall service, based on the FortiGate 3951B, will provide customers with Enterprise grade security and performance at an SME price point.

SaaS Security Is Still Sticking Point but Doesn't Have to Be

Grazed from IT Business Edge.  Author: Ann All.