Installing and configuring eCryptfs with a trusted platform module (TPM) key
Mike Halcrow has written a paper on Installing and configuring eCryptfs with a trusted platform module (TPM) key. This paper is available on IBM Systems Information Center along with a bunch of other...
View ArticleWeak passwords – curable with pam_cracklib
By Bryan Jacobson, Linux Technology Center, IBM ( bryan.jacobson@us.ibm.com). Emily – thanks so much for the guest blogging opportunity!! On January 5th, Twitter was hacked. “I am high on crack right...
View ArticleExplaining Linux Security
by George Wilson <gcwilson@us.ibm.com>, IBM Linux Technology Center Operating system security features are notoriously difficult to explain. Folks who work on security have their own specialized...
View ArticleBlueprint: Using MIT-Kerberos with IBM Tivoli Directory Server backend
by Klaus Heinrich Kiwi, IBM LTC Security Team. In the Information Security world, authentication and authorization are orthogonal concepts: Authentication refers to the act of correctly identifying an...
View ArticleCost savings of encrypting confidential data
Intel has done a study on the costs associated with a stolen or lost laptop. One of the most interesting aspects of the study is that they were able to quantify how much a company saves when the...
View ArticleKarmic Koala & eCryptfs
By Bryan Jacobson, Linux Technology Center. Tyler Hicks (from our team) recently attended the 5/25-29 Ubuntu Developers Summit for Karmic Koala in Barcelona, Spain. Some of Tyler’s observations on...
View ArticleopenCryptoki project new releases
by Klaus Heinrich Kiwi, LTC Security team The openCryptoki project, a PKCS#11 provider for Linux with support for software and hardware tokens, has released new versions for both the openCryptoki code...
View ArticlesVirt Stronger Security for Linux Virtualization
By Bryan Jacobson, Linux Technology Center. While Virtualization offers many benefits, there can also be increased security risks. For example, consider a system running two hundred virtual images. All...
View ArticleNew Trusted Computing Blueprint published.
by Rajiv Andrade, Linux Technology Center Since the foundation of the Trusted Computing Group, previously named Trusted Computing Platform Alliance, the pillars required to win most of today’s security...
View ArticleBare Metal Versus Hosted Hypervisor Security
by George Wilson, IBM Linux Technology Center I was recently reading through the NIST “Draft Guide to Security for Full Virtualization Technologies” (SP 800-125 draft)...
View Article
More Pages to Explore .....