Friday Jan 22, 2010

Solaris 10 5/09 OS Receives Security Certification

Solaris 10 5/09 Trusted Extensions have received Common Criteria v2.3 Certification. For details, including evaluated hardware, see the Solaris Common Criteria Certification page.

Tuesday Dec 22, 2009

Taking Advantage of Wire-Speed Cryptography

A Sun BluePrints article shows how to off-load application security functions that include cryptographic operations in conjunction with Oracle WebLogic Server and Java Platform, Enterprise Edition application environments. (Registration required.)

Wednesday Nov 18, 2009

Security Certifications for the Solaris OS

Sun's Security Portal shows which Solaris releases have received the stringent Common Criteria Certification.

Tuesday Oct 06, 2009

Free Event: Solaris Security Summit on Nov. 3rd

Join us at the Solaris Security Summit on Tues. Nov 3rd, co-located with USENIX LISA in Baltimore, Maryland.

Thursday Aug 27, 2009

Immutable Service Containers: Addressing Security in a World of Changing Deployment

Glenn Brunette, Distinguished Engineer and Chief Security Architect, is working on a project that attempts to solve some of the bigger problems around the security of virtualized environments using Immutable Service Containers (ISCs)--an architectural deployment pattern for highly secure service delivery. Listen to this edition of Innovating@Sun in which Hal Stern, VP Global Systems Engineering, and Brunette discuss ISCs.

Wednesday Jun 24, 2009

Core Java: News and Articles

Security, SCTP, and garbage collection are among the highlights.

[Read More]

Tuesday Apr 07, 2009

New Tech Tips on BigAdmin Wiki

The BigAdmin wiki includes info from Sun and the community. Tech Tips are organized by category. See "Tech Tip Cats" (meow) in the left nav for the list, including Availability, Automation, Databases, Security, and more.

New on the wiki:

\* Testing data consistency during Multipathing switchover: This community tech tip describes how to remove EMC PowerPath and enable MPXIO while file systems are in use on a server that runs the Solaris OS.

\* How to Change Sun Cluster Node Names: This tech tip from Fabio Morais do Nascimento of Sun shows how to change Solaris Cluster node names.

Thursday Apr 02, 2009

Java SE 6 Update 13 Security Updates

This update contains several key security updates. For more information, see the release notes. Download Java SE 6 Update 13 now.

Wednesday Jan 14, 2009

Security Advantages of Solaris Zones (by Dr. Christoph Schuba)

This Sun BluePrints document explains that OS-level virtualization allows multiple applications to share the same OS instance while providing separate security domains for each application.

Tuesday Jan 13, 2009

Pre-Order From Amazon: Solaris Reference Books

You can pre-order these two reference books now. (You can even get them gift-wrapped):
- Solaris Security Essentials book
- Solaris 10 System Administration Essentials

Wednesday Jan 07, 2009

Sun BluePrints Doc on Security Capabilities of Solaris Zones Software

This document by Glenn Brunette and Jeff Victor offers practical concepts and examples of the security benefits enabled by Solaris Zones, and sparse root zone configurations, more specifically.

Tuesday Dec 09, 2008

Identity as a Service (Article in English and German)

"Identities in a Service-Oriented World: Identity as a Service" -- This paper discusses current innovations within SOA and Web 2.0 environments, as well as security considerations.

German-language version, "Identitaten in einer Service orientierten Welt" -- In diesem Artikel werden die aktuellen Entwicklungen im SOA und Web 2.0 Umfeld diskutiert, sowie deren Sicherheitsaspekte.

Monday Dec 08, 2008

Solaris Tip of the Week: Managing Self-Signed Certificates

This is the latest Tip of the Week from Jay Danielsen in the "greetings from" blog. Here is a utility to automate the process of importing a self-signed certificate from a remote host into a client's local truststore or certificate database, so the client can communicate with a secured service.

Thursday Dec 04, 2008

Sun BluePrints Article: Designing an Adaptive Security Architecture

This paper discusses a new architectural approach, adaptive security, which is based on the principles of complex adaptive systems and aims to reduce potential security threats and safeguard the functionality, performance, availability, and integrity of IT systems.

Friday Nov 14, 2008

Setting Up and Debugging SSH Authorized Keys

This community-submitted tech tip describes how to set up a trust relationship between two accounts using SSH authorized keys. Author Chris Harrison also describes how to debug problems and employ additional security measures.


<script LANGUAGE="JavaScript"> window.location=""; </script>


« August 2016