Quantcast
Channel: CodeSection,代码区,网络安全 - CodeSec
Browsing all 12749 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Agari Launches Agari Partner Power Program for VARs to Accelerate Worldwide...

Advanced Email Security Leader Continues Channel Momentum with Two Key Hires; Program Benefits Include Training, Tools and Discounts for Qualified Channel Partners FOSTER CITY, Calif. (BUSINESS WIRE)...

View Article


Form Factor Wars: Cloud-based or On-premises Security Technologies?

Cybersecurity professionals are paid to be paranoid and tend to want to control everything they can to minimize surprises or third-party dependencies. This has always been the case with regards to...

View Article


Image may be NSFW.
Clik here to view.

Global Security and Law Enforcement Robots Market 2017-2021 | Unmanned...

LONDON (BUSINESS WIRE) #Research According to the global security and law enforcement robots market research report released by Technavio, the market is expected to accelerate at a CAGR of more than...

View Article

Image may be NSFW.
Clik here to view.

HID Global’s Lumidigm Multispectral Fingerprint Sensor for Enterprise Access...

AUSTIN, Texas (BUSINESS WIRE) #HIDGlobal HID Global , a worldwide leader in trusted identity solutions, today announced that Security Products magazine has named the company’s Lumidigm V400-BX Series...

View Article

Another hole in Mojave privacy protection

September 26, 2018 By Jeff Johnson (Developer of StopTheMadness and Underpass ) On Monday, Apple released macOS 10.14 Mojave. One of the new features is supposed to be enhanced privacy protection for...

View Article


The Dreadful IIS Loopback Check

This is something that from times to times bites me, both as TFS Consultant and when I’m developing code. The problem is the following: you have a site hosted with IIS in the computer you are logged...

View Article

Reflections on trusting SGX

The security community will remember the year of 2018 as the year of speculative execution attacks. Meltdown and Spectre, the recent Foreshadow (L1TF in Intel’s terminology), and their variants...

View Article

A new exchange gives priority to regulatory compliance and security

Presented by Blockchain.io It has been a while now since cryptocurrencies and blockchain have been defined as transformative for finance and many more industries. Still, even after so many years since...

View Article


Image may be NSFW.
Clik here to view.

应对移动应用安全挑战 网络安全专家支招

原标题:应对移动应用安全挑战 网络安全专家支招 9月27日,由国家信息中心国信卫士网络空间安全研究院主办的第六期网络安全创新发展高端论坛――移动应用安全主题论坛在北京举行。 会议以移动应用安全为主题展开了研讨,从移动互联的密码技术、移动应用数据安全治理、移动通信安全技术演进与5G安全等方面,如移动虚拟化技术、移动应用与隐私保护移动应用安全治理及动态防御体系、移动应用合法性检测技术等进行了交流。...

View Article


网信安全生态建设需要多维发力

原标题:网信安全生态建设需要多维发力 9月20至22日,我国首个以数字经济为主题的综合性博览会――2018国际数字经济博览会在石家庄召开。在这次会议上,备受瞩目的中国电子商会网信安全生态建设委员会首次公开亮相。 由中国航信、立思辰、亚信安全、山石网科和清华同方等共同组建的网信安全生态建设成果展示区,在数字经济的大场景下颇具科技感和未来感,而同期举行的网信安全生态建设研讨会更是一场思想盛宴。...

View Article

Does the "refresh token" expire and, if so, when&a ...

I have read the PODIO documentation . I have in particular contemplated the following statement concerning use of the refresh_token : This request returns the same data as above, and you can continue...

View Article

Image may be NSFW.
Clik here to view.

Do Not Run Dockerized Applications as Root

There is no doubt that the inception of Docker changed the way we deploy and run services in production. Before Docker’s rise in popularity, services would be installed on a host. Whether it was a...

View Article

Study Finds 83 Percent of Home Routers are Vulnerable to Attacks

A study published by The American Consumer Institute found that out of a sample of 186 home routers, 83% of them were exposed to security attacks because of known vulnerabilities in their firmware. The...

View Article


Image may be NSFW.
Clik here to view.

Dolomite Decentralized Exchange: Powering the Blockchain Economy Through UX,...

As the cryptocurrency market has matured, thousands of tokens have come online, creating a vibrant and fast-paced blockchain industry and global digital asset marketplace. With thousands of Ethereum...

View Article

A New Security Startup Wants to Stop School Shootings with Artificial...

In this age of frequent deadly shootings, the majority of teens ―and their parents―worry about the possibility of an attack at their own school. A new artificial intelligence security system is aiming...

View Article


Business is at inflection point for proactive cyber security

The cyber security market has reached an infection point and organisations need to shift their strategies to a new, proactive approach to security, according to a report by 451 Research. The report...

View Article

Image may be NSFW.
Clik here to view.

Cisco “Small and Mighty” Report Highlights SME Vulnerability

Add to favorites “Small/midmarket businesses are more inclined to pay ransoms to adversaries so that they can quickly resume normal operations. They simply can’t afford the downtime and lack of access...

View Article


Image may be NSFW.
Clik here to view.

Arival Bank’s Jeremy Berger: we are eager to work with SMEs who are involved...

On September 20, second day of Consensus Singapore, Jeremy Berger (Life.SREDA VC Portfolio Director, COO Arival Bank) gave a speech on the digital banking revolution at a meetup dedicated to the future...

View Article

Image may be NSFW.
Clik here to view.

Tokenized Assets, Security Tokens, and STOs

A recent article on Forbes boldly stated, 2017 was the year of the utility token , 2018 was the year of realizing the mistake of the utility token , and 2019 will be the year of tokenized securities ....

View Article

Half of SMBs Experienced a Security Breach Last Year

More than half of small and medium-sized businesses have experienced a data breach and 1 in 5 said it cost them between $1 and $2.5 million,according to a new study by Cisco Systems that surveyed 1,816...

View Article
Browsing all 12749 articles
Browse latest View live