Quantcast
Channel: CodeSection,代码区,网络安全 - CodeSec
Browsing all 12749 articles
Browse latest View live

Home Automation and Security SystemOverview

I’ve done a lot of work on my DIY HomeAssistant-based home automation and security system since mylast post on it just over a month ago. While it was a lot of work and frustrating at times, I’m happy...

View Article


The Latest: US says man was arrested on outstanding warrant

LOS ANGELES (AP) ― The Latest on the arrest by immigration agents of a man as he drove his wife to the hospital so she could give birth (all times local): 4:15 p.m. U.S. Immigration and Customs...

View Article


让亿万人民在共享互联网发展成果上拥有更多获得感

原标题:让亿万人民在共享互联网发展成果上拥有更多获得感 数字信息浪潮风云激荡,网络技术发展日新月异。 党的十八大以来,以习近平同志为核心的党中央系统部署网络安全和信息化工作,不断推进理论创新和实践创新,走出一条中国特色治网之道,形成了网络强国战略思想,我国网信事业取得历史性成就,亿万人民在共享互联网发展成果上拥有更多获得感。 积极构建天朗气清的精神家园...

View Article

Image may be NSFW.
Clik here to view.

CIS 3.1 in Azure - Azure Security Center

Continuing on with discussing the CIS Controls on Azure, the goal of this post is to talk about CIS Control 3, and specifically 3.1: Run Automated Vulnerability Scanning Tools. On-premises, this...

View Article

Image may be NSFW.
Clik here to view.

阿里安全专家:未来是靠脸的时代 今明两年人脸识别应用进入爆发期

摘要: 未来包括人脸识别在内的AI技术将会运用在更多安全场景中,“阿里安全将运用AI技术不遗余力打击诈骗,用技术协助各界解决黑灰产等社会问题。” 证件能伪造,密码能被窃取,验证码能被劫持……未来世界里,靠什么来证明你是谁?用什么来保护数据安全?答案就是――刷脸!...

View Article


Image may be NSFW.
Clik here to view.

Oracle Jet - security by obfuscation - Do not use it

Obfuscation “ the action of making something obscure, unclear, or unintelligible ” is often used when trying to secure an application. The idea behind obfuscation is to make the technical working of...

View Article

Image may be NSFW.
Clik here to view.

WindTalker Debuts Innovative New Content Security Platform at ILTACON 2018

Legal professionals can safely redact, protect and share documents without fear of the unintended disclosure of privileged information. NATIONAL HARBOR, Md. (BUSINESS WIRE) #ILTACON18 ― ILTACON 2018...

View Article

Image may be NSFW.
Clik here to view.

Privva CEO Ishan Girdhar Presents Security Assessment Analysis at ILTACON...

NATIONAL HARBOR, Md. (BUSINESS WIRE) #Privva Risk management technology provider Privva, will both present and exhibit at ILTACON 2018 this week. Privva CEO and founder Ishan will address security...

View Article


Image may be NSFW.
Clik here to view.

Database Security Monitoring for MySQL and MariaDB

Data protection is one of the most significant aspects of administering a database. Depending on the organizational structure, whether you are a developer, sysadmin or DBA, if you are managing the...

View Article


Image may be NSFW.
Clik here to view.

Gamifying Crypto ― The Benefits of Personalized Avatars

Gamifying Crypto ― The Benefits of Personalized Avatars A new development named “monKey” is testing if combining gaming elements with identicons adds to a coin’s growth and value Introduction A lot of...

View Article

如何通过云计算平台确保企业的信息安全?

如今,系统管理提供商正在将其本地部署的产品推向云端,并开发或获取纯粹的基于云计算的软件,希望能够保持相关性。 随着企业IT部门将任务关键型工作负载迅速转移到云平台中,系统管理软件供应商通过重新构建其产品组合对此进行响应。 这种适应云计算需求的巨变不仅包括对顶级系统管理软件的重新构建,而且还将各种各样的云计算技术融入这些产品中,这使得即使云计算供应商也难以确定他们与谁竞争。...

View Article

Image may be NSFW.
Clik here to view.

Black Hat USA 2018: Targeted Threat Hunting, Managed Everything, Serverless...

Quenching your thirst in the desert is a major challenge, but seeing everything at BSides Las Vegas and Black Hat is even more difficult. While I am there every year, hydrating, I try to take note of...

View Article

Image may be NSFW.
Clik here to view.

How Protect Outlook Emails With Strong Passwords & Security Settings

If you're like most of us, your Outlook email account is full of important personal and business information. The last thing you want to happen is to have a stranger access your email account―or worse...

View Article


Image may be NSFW.
Clik here to view.

The Essential Guide for Mac Security | Avast

Macs are beautiful machines, in both appearance and performance. The sleek designs, intuitive OS, trend-setting apps, and, yes, the anti-malware security built into the platform, make them among the...

View Article

Image may be NSFW.
Clik here to view.

Signal Sciences Extends WAF Scope

Signal Sciences is looking to further DevSecOps adoption by adding support for a Power Rules user interface to its web application firewall (WAF) through which security teams can define, monitor and...

View Article


CloudPassage Debuts Halo Cloud Secure, Delivering Unparalleled, Continuous...

Powerful new enhancements to industry-leading security platform enables unprecedented insight into infrastructure-as-a-service security and compliance issues SAN FRANCISCO, August 20, 2018―...

View Article

New Ubuntu Security Podcast

Show Notes Overview Security fixes for 39 CVEs this week including L1TF and FragmentSmack This week in Ubuntu Security Updates GDM ( USN-3737-1 ) ( CVE-2018-14424 ) Found by Ubuntu Security Team member...

View Article


Image may be NSFW.
Clik here to view.

How DevSecOps can keep you ‘1 Step Ahead’ with Application Security?

Evaluating the current digital and online transactions scenario, one can confidently state that every enterprise of varying sizes is gearing up to fix security gaps within their applications. Security...

View Article

Image may be NSFW.
Clik here to view.

Can security tokens fulfill their promise of liquidity?

Can security tokens fulfill their promise of liquidity? The security token liquidity hype is in full swing. Time and time again we hear: tokenization makes illiquid assets liquid. But just how much is...

View Article

Image may be NSFW.
Clik here to view.

Cyber Attacks and Cyber Defense Options

There seems to be an endless list of what attackers are willing and capable of doing; viruses, malware, network attacks, etc. It’s tough just trying to keep up with all of these types of attacks along...

View Article
Browsing all 12749 articles
Browse latest View live