Quantcast
Channel: CodeSection,代码区,网络安全 - CodeSec
Browsing all 12749 articles
Browse latest View live

Trend Micro and HITRUST Launch New Company to Provide Cyber Risk Management...

Cysiv extends and elevates in-house, enterprise security capabilities and operations DALLAS (BUSINESS WIRE) Trend ( TYO: ; TSE: ), a global leader in cybersecurity solutions, and HITRUST , a leading...

View Article


Image may be NSFW.
Clik here to view.

Knightscope Showroom NYC Brings “Security Team of the Future” to Midtown...

Company offers clients and community hands-on, interactive experience with award-winning security robots and cutting-edge autonomous crime-fighting technology NEW YORK (BUSINESS WIRE) #MiniIPO ―...

View Article


Arms race: SiFive, Hex Five build code safe houses for RISC-V chips

If you've been looking at SiFive's RISC-V-based chip technology and thinking, y'know what, it's missing an Arm TrustZone-style element to run sensitive code, well, here's some good news. And if you're...

View Article

Infosys gets Australian Open gig as IBM given the boot

Tennis Australia's technology needs for the Australian Open in 2019, and for the next two years thereafter, will be provided by the Indian outsourcing giant Infosys, which has signed a three-year deal...

View Article

Image may be NSFW.
Clik here to view.

From Dev to Infosec Making Friends

Whenever you enter a new community, the hardest part is always finding your way around and making friends. With InfoSec, it’s analogous to being dropped in the middle of Europe without a map, and you...

View Article


California’s bad IoT law

California has passed an IoT security bill , awaiting the government’s signature/veto. It’s a typically bad bill based on a superficial understanding of cybersecurity/hacking that will do little...

View Article

Image may be NSFW.
Clik here to view.

The best IAM software: Rating the top 10 products

What are your company's biggest assets? Arguably you can break them down into two groups: People , which includes productive employees, loyal customers and efficient partners. Data , which includes...

View Article

Image may be NSFW.
Clik here to view.

Exploit vendor drops Tor Browser zero-day on Twitter

Zerodium, a company that buys and sells vulnerabilities in popular software, has published details today on Twitter about a zero-day vulnerability in the Tor Browser, a Firefox-based browser used by...

View Article


Image may be NSFW.
Clik here to view.

DevOps Demystified: A Primer for Security Practitioners

Key starting points for those still struggling to understand the concept. Back when I was burning up the ISSA and ISACA speaking circuit, I passed out a quiz before each presentation. The quiz focused...

View Article


Image may be NSFW.
Clik here to view.

IDG Contributor Network: User behavior analytics is not a silver bullet

Home Analytics IDG Contributor Network Want to Join? The Security Log By Monzy Merza ,Contributor, CSO | Sep 10, 2018 8:00 AM PT Opinions expressed by ICN authors are their own. Opinion User behavior...

View Article

Image may be NSFW.
Clik here to view.

Engaging the CSIRT Community: Cyber Capacity Building on a Global Scale

Angel L. HuecaSenior Computer Security Information AnalystCERT Division At the 2018 World Economic Forum , global leaders voiced concerns about the growing trend of cyberattacks targeting critical...

View Article

Image may be NSFW.
Clik here to view.

What You Need to Know About the TLS 1.3 Protocol and WolfSSL’s TSL/SSL...

Security protocols, like communication protocols, are currently in competition to set industry-wide standards. What is the TLS 1.3 protocol? How does this security protocol differ from SSL? WolfSSL, a...

View Article

IDG Contributor Network: Threat detection: it’s about ‘time’

Incident responders have no shortage of products that help to identify threats. From the earliest virus scanners and IDS products to modern solutions that utilize machine learning to analyze behavior,...

View Article


Redesigning computing for cloud workers and the digital workplace

Editor’s note: In today’s guest post, Nick McQuire, vice president of enterprise research at CCS Insight, shares more on how the era of the cloud worker is shaping IT and device strategy. You can also...

View Article

Image may be NSFW.
Clik here to view.

TrueKey: the not so uncommon story of a failed patch

In this blog post, we examine the vendor-supplied patch addressing CVE-2018-6661 . The vulnerability was initially reported to Intel Security (McAfee) in June 2017 and disclosed publicly in April...

View Article


Zero-Day Tor Browser Exploit Bypassed NoScript to Execute Malicious Code

Zerodium unveiled in a tweet a Tor Browser 7.x zero-day exploit which circumvented NoScript's'Safest' security level to run malicious code inside the browser. Tor Browser is a modified version...

View Article

Cybersecurity is Rapidly Changing

"We cannot control our adversary," says Rick McElroy , Security Strategist for CarbonBlack , a leading next-generation cybersecurity firm. "Although we can choose to control them once in our...

View Article


Image may be NSFW.
Clik here to view.

The Equifax Breach One Year Later: 6 Action Items for Security Pros

The Equifax breach last September was the largest consumer breach in history. We talked to experts about lessons learned and steps companies can take to prevent and minimize future breaches. 1 of 7...

View Article

Image may be NSFW.
Clik here to view.

This NYC Startup Just Raised $18M to Deploy The Most Advanced Industrial...

Industrial infrastructures like power plants, oil & gas pipelines, and water treatment facilities are vulnerable to attacks, and it isn’t that difficult to get access to the operational technology...

View Article

Image may be NSFW.
Clik here to view.

Exchanges Roundup: Startup Targets Crypto Micro-Investments, Kraken Denies...

Exchanges 7 hours ago| By Samuel Haig - | Exchanges Roundup: Startup Targets Crypto Micro-Investments, Kraken Denies Halifax Closure In recent news pertaining to cryptocurrency exchanges, Perth-based...

View Article
Browsing all 12749 articles
Browse latest View live