Quantcast
Channel: CodeSection,代码区,网络安全 - CodeSec
Browsing all 12749 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Why you should consider hapi

When starting a new web application, your first decision is the platform: node, Go, Rails, etc. Your second decision is the framework. When it comes to node, there are plenty of great frameworks to...

View Article



See Where You Place in the PAM Maturity Model

Many companies aren’t sure how to begin their PAM implementation or which security activities have the most impact on their goals. To help you stay on course, Thycotic has developed the first PAM...

View Article

Understanding the 7 different types of data breaches

Every day more than 6 million data records are compromised , with no organisation or sector immune. Organisations are facing a data breach war so it’s imperative that ‘know your enemy’ becomes part of...

View Article

Image may be NSFW.
Clik here to view.

Pivot3 Delivers Policy-Based Security for Hybrid Cloud Solutions

Pivot3’s expanded Intelligence Engine capabilities enable customers to streamline security and regulatory compliance across the edge, core and cloud AUSTIN, Texas (BUSINESS WIRE) Pivot3 , the...

View Article

Image may be NSFW.
Clik here to view.

Brazil’s Banco Votorantim Selects NETSCOUT’s nGeniusOne

WESTFORD, Mass. (BUSINESS WIRE) lt;a href=”https://twitter.com/search?q=%24NTCT&src=ctag” target=”_blank”gt;$NTCTlt;/agt; lt;a href=”https://twitter.com/hashtag/DDoS?src=hash”...

View Article


Image may be NSFW.
Clik here to view.

人工智能与网络安全的跨界论道:ASCC 2018在渝开幕

伴随着互联网的诞生,关于网络安全(CyberSecurity)议题的探讨从未停止。 从广义上来说,凡是涉及到网络上信息的保密性、完整性、可用性、真实性和可控性的相关技术和理论都是网络安全的研究领域,这是一门涉及计算机科学、网络技术、通信技术、密码技术、信息安全技术、应用数据、数论、信息论等多种学科的综合性科学。...

View Article

The Key To Turning Your Security Program Into A Marketing Asset While Staying...

It is often said, “if you don’t want something noticed, don’t talk about it”. This is true of a bad GPA, a stain on a carpet, or a project you might have missed a deadline for. Many security leaders...

View Article

Roles and Responsibilities of Information Security Auditor

Most people break out into cold sweats at the thought of conducting an audit, and for good reason. Auditing the information systems of an organization requires attention to detail and thoroughness on a...

View Article


Image may be NSFW.
Clik here to view.

Facing the Fear and Securing the Internet of Things (IoT)

It’s official. There are officially more IoT devices than humans in the world. And by 2020, there will be twice as many of them than us. It can be a sobering thought, especially if you’ve ever seen...

View Article


SMG Comms Chapter 11: Arbitrary Size of Public Exponent

~ This is a work in progress towards an Ada implementation of Eulora's communication protocol. Start withChapter 1.~ The change from fixed-size to arbitrary size of the public exponent "e" of RSA...

View Article

CNCERT:关于SQLite远程代码执行漏洞的安全公告

安全公告编号:CNTA-2018-0031 2018年12月10日,国家信息安全漏洞共享平台(CNVD)收录了由腾讯安全平台部Tencent Blade团队发现并报告的SQLite远程代码执行漏洞(CNVD-2018-24855)。攻击者利用该漏洞,可在未授权的情况下远程执行代码。目前漏洞利用细节尚未公开。 一、漏洞情况分析...

View Article

CNCERT:关于ThinkPHP存在远程代码执行漏洞的安全公告

安全公告编号:CNTA-2018-0032 2018年12月11日,国家信息安全漏洞共享平台(CNVD)收录了Thinkphp远程代码执行漏洞(CNVD-2018-24942)。攻击者利用该漏洞,可在未授权的情况下远程执行代码。目前,漏洞利用原理已公开,厂商已发布新版本修复此漏洞。 一、漏洞情况分析...

View Article

Image may be NSFW.
Clik here to view.

30万人黑客组织紧盯区块链 熊市当道攻击事件或将加剧

近两年, 加密货币 市场频现一夜暴富之人, 加密货币 的拥护者也一度激增, 加密货币 俨然被看作新型投资方式。而随着社会各界对 数字货币 的兴趣飙升,黑客攻击等网络安全已经成为 加密货币 行业日益关注的问题。 攻击事件频率大幅上升 经济损失半年逾27亿美元 在这些黑客攻击中,既有大规模的数据泄露事件,也有波及全球的黑客勒索。而据腾讯公布的《2018年上半年 区块链 安全报告》显示,基于 区块链...

View Article


Image may be NSFW.
Clik here to view.

AVANT and Alert Logic Partner to Enable AVANT’s Growing Network of Trusted...

AVANT becomes first master agent to represent Alert Logic to the Agent Channel community and will accelerate security channel sales worldwide CHICAGO (BUSINESS WIRE) AVANT Communications (“AVANT”), a...

View Article

Image may be NSFW.
Clik here to view.

Datadog and Aqua Security Partner to Provide Seamless Visibility into...

Aqua integrates with Datadog to give DevOps teams real-time security metrics and events Seattle, WA December 11, 2018 KubeCon/CloudNativeCon Aqua Security, the leading platform provider for securing...

View Article


Image may be NSFW.
Clik here to view.

OnePlus 6T sees 249% sales boost from T-Mobile, CEO talks 5G, TV, security,...

No longer the startup it once was, OnePlus has seen massive growth over the past few years. Now, with the help of its first US carrier launch, the OnePlus 6T is seeing a huge sales boost as revealed in...

View Article

9 Core & Specialty AWS Security Certifications

Cloud computing has become a necessity for almost all businesses. Given this reality, there is a significant need to design, develop, deploy, manage, and secure workloads in the cloud. AWS offers a...

View Article


How Well Is Your Organization Investing Its Cybersecurity Dollars?

The principles, methods, and tools for performing good risk measurement already exist and are being used successfully by organizations today. They take some effort -- and are totally worth it. There's...

View Article

Image may be NSFW.
Clik here to view.

Fundamentals of Security: What is SSH?

We’re drawing on our security knowledge to provide a series on the fundamentals of securing devices and networks. The previous item in our series was an introduction to why asset management is...

View Article

Image may be NSFW.
Clik here to view.

Damning Report on Equifax Security Failures is a Lesson for all Enterprises

Add to favorites No clear lines of authority, complex and “antiquated” custom IT infrastructure… Equifax allowed over 300 security certificates to expire, including 79 certificates for monitoring...

View Article
Browsing all 12749 articles
Browse latest View live




Latest Images