The New York Technology Council and Internet Society New York Chapter (ISOC-NY) on Jan 5 2012 will present a joint event “New Techniques for Protecting Cloud Data and Security” – a review of new research, including techniques for data encryption and management, that promises to make the cloud a safer place.
The event is free. Please be sure to register at the link below.
What: New Techniques for Protecting Cloud Data and Security
When: Thursday January 5, 2012, 6pm-8pm
Where: Parsons Kellen Auditorium, 66 Fifth Avenue, NYC
Who: Free for ISOC-NY & NYTECH members. Free for non-members.
Webcast: Will be taped for later viewing
Twitter: #cloud, #security, @ISOCNY, @nytechcouncil
WASHINGTON, D.C., USA and GENEVA, SWITZERLAND–2 February 2010–In a paper scheduled to be presented at the upcoming 17th Annual Network and Distributed System Security Symposium (NDSS 2010), Darrell Bethea, Robert Cochran, and Michael Reiter of the University of North Carolina, Chapel Hill describe a technique they have developed to identify cheating in the rapidly growing, multi-billion dollar industry of online gaming which includes titles such as World of Warcraft. The full paper will be published in the NDSS Proceedings.
Cheating through the use of non-sanctioned client software compromises the gaming experience for players and undermines the revenue of game developers and operators. The approach outlined in the paper to be presented at NDSS 2010 could help ensure the integrity of the online gaming experience by providing an automated, alternative approach to current, manually programmed methods of identifying game cheats. The described approach is server-based and does not increase the required bandwidth, often a critical expense for game operators.
An informative article in the latest issue of Popular Science goes into some detail as to the measures taken to protect the fundamental hardware of the Internet.
In an opening keynote address at the RSA conference in San Francisco today, Craig Mundie, chief research and strategy officer at Microsoft, called for broad discussions about the safety of the Internet in an initiative called “End to End Trust“.
Core to the concept is something called “a trusted stack,” where security is housed or rooted in the hardware, but each piece — the hardware, software, the data and even the people involved — can be authenticated if necessary.
As part of the Stanford EE Computer Systems Colloquium Charlie Reis of the University of Washington will today talk about the increasing practice of intermediaries messing with web content between server & client, and ways to proscribe such. He will also talk about browser security, focusing on the deficiencies of today’s web as an application platform.
The talk, which takes place from 4:15-5:30 PST will be webcast live and thereafter be available on demand. Continue reading
At the December 2007 Board of Trustees meeting held in Vancouver, ISOC presented plans for 2008 to 2010. Key to those plans were a series of new, longer term, more strategic activities which will replace the traditional ‘pillar’ model describing activities in Standards, Public Policy, and Education. The new initiatives will focus on ‘Enabling Access‘, ‘InterNetWorks‘, ‘Trust & Identity‘ and ‘Standards & Technology‘. Continue reading
A new survey on the state of DNS, commissioned by infrastructure appliance vendor Infoblox, found that the use of Windows DNS Server in Internet-facing applications has fallen off dramatically as more users act on concerns about security. BIND 9, the latest version, gained against earlier, less secure versions. Continue reading