docker

Docker: Best Security Practices

Hi there, let’s start by saying that Docker is great, for many reasons. To mention one, the possibility of using a simple and lightweight tool to manage and deploy apps during all phases of their lifecycle. For the sake of clarity, it is worth pointing out that Docker leverages a number of tools and mechanisms that…

Cloud Storage: How to protect user credentials against malware

Hi there, recently, during the Black Hat USA 2015 event, some cyber security experts from Imperva unveiled a serious vulnerability that affected (it’s been fixed now) several major Cloud Storage services such as Google Drive and Dropbox. Also, they put in place a practical attack named “Man in the Cloud” (in French). The vulnerability and the corresponding attack…

How to outsource your data to the Cloud without losing confidentiality and control

Hi there, recently, data leaks and various security incidents have been constantly part of daily news and scandals. From an end-user point of view, it looks like storing confidential data in the cloud is a serious risk, especially when dealing with sensitive and strategic data. Why? Thanks to the confession of Edward Snowden, we now know for sure…