Aggregator
10 Ways Organizations Can Get Ready for Breach Disclosure
8 years 1 month ago
Facing data breach disclosure requirements across the globe, organizations need to be prepare in advance to respond well.
Ubuntu 16.04安装KLEE
8 years 1 month ago
Terenceli
ServiceStack.Redis 与多线程
8 years 1 month ago
如果是多线程的环境下使用ServiceStack.Redis,就必须使用连接池,每次从连接池里面获取一个连接供当前线程使用
Default Passwords Are Not the Biggest Part of the IoT Botnet Problem
8 years 1 month ago
Providers and manufacturers could go a long way toward reducing the very real threat of IoT.
第三十一期 取证实战篇-Windows日志分析
8 years 1 month ago
Windows事件日志为涉及计算机犯罪案件的破获提供重要证据或线索,因此,在电子数据取证调查过程中扮演越来越重要的作用。
第三十一期 取证实战篇-Windows日志分析
8 years 1 month ago
Windows事件日志为涉及计算机犯罪案件的破获提供重要证据或线索,因此,在电子数据取证调查过程中扮演越来越重要的作用。
第三十一期 取证实战篇-Windows日志分析
8 years 1 month ago
Windows事件日志为涉及计算机犯罪案件的破获提供重要证据或线索,因此,在电子数据取证调查过程中扮演越来越重要的作用。
第三十一期 取证实战篇-Windows日志分析
8 years 1 month ago
Windows事件日志为涉及计算机犯罪案件的破获提供重要证据或线索,因此,在电子数据取证调查过程中扮演越来越重要的作用。
第三十一期 取证实战篇-Windows日志分析
8 years 1 month ago
Windows事件日志为涉及计算机犯罪案件的破获提供重要证据或线索,因此,在电子数据取证调查过程中扮演越来越重要的作用。
自律方能自由,《网络安全法》实施后的白帽子行为参考
8 years 1 month ago
《网络安全法》已于2017.6.1正式实施,那对于白帽子来说可能都会有一些忐忑和迷茫。一句话建议:自律方能自由。
The CISO: A Field Guide
8 years 2 months ago
Learn to recognize different types of CISOs so you can ensure you’re hiring the right one.
We are Back with the Blog
8 years 2 months ago
null is India’s largest open security community. Registered as a non-profit society in 2010, we have been active since even before that. null is about spreading information security awareness. All our activities such as null Monthly Meets, null Humla, null Bachaav, null Puliya, null Job Portal are for the cause of that.
Android Devices Potentially Compromised by Judy App Weaknesses
8 years 2 months ago
We’ve seen cyberattacks truly embody their names as of late, given how the massive WannaCry ransomware attack left quite a...
The post Android Devices Potentially Compromised by Judy App Weaknesses appeared first on McAfee Blog.
McAfee
Fight Credential Stuffing by Taking a New Approach to Authorization
8 years 2 months ago
How a token-based authorization model can help organizations dramatically reduce credential stuffing attacks.
Spark编程手抄 - Python
8 years 2 months ago
KINGX
第三十期 取证实战篇-Surface设备取证
8 years 2 months ago
Surface设备的取证难一直困扰大家的问题,本次CCFC峰会上,Surface设备取证的主题分享获得了与会人士的一致关注。
第三十期 取证实战篇-Surface设备取证
8 years 2 months ago
Surface设备的取证难一直困扰大家的问题,本次CCFC峰会上,Surface设备取证的主题分享获得了与会人士的一致关注。
第三十期 取证实战篇-Surface设备取证
8 years 2 months ago
Surface设备的取证难一直困扰大家的问题,本次CCFC峰会上,Surface设备取证的主题分享获得了与会人士的一致关注。
第三十期 取证实战篇-Surface设备取证
8 years 2 months ago
Surface设备的取证难一直困扰大家的问题,本次CCFC峰会上,Surface设备取证的主题分享获得了与会人士的一致关注。