If you’ve managed secure cryptographic infrastructure, you know the challenges of physical secure rooms, from the high cost of SCIF-standard facilities to the operational burdens of multi-operator ...
With users voicing their concerns about the security challenges of virtualization, vendors are slowly cranking up their efforts to lock down virtual data. (See Tales From the Virtual Crypt.) Today, ...
Security is a key feature for most virtual-memory OSs. Given sufficient hardware controls, an OS lets an application perform any operation it likes. The OS will trap any operation that's restricted ...