Yu Yun's SaaS applications will increasingly replace the existing key business systems and services, many companies have seen the benefits of cloud computing, but the challenges and concerns are inevitable. In this paper, 18 tips to help companies deal with the privacy, regulations, and security issues that are relevant to cloud computing.
A few days ago, an organization to steal the Italy Team 400GB more than Hacking data and published in the network, stolen data including Team Hacking some of the source code, mail, recording and customer details. The attacker also controlled the Team Hacking twitter account, and use it to publish a stolen e-mail screenshot.
TLS (SSL) in the AWS has been widely used, AWS in the process of using TLS to find a lot of problems, so some optimization and simplification, in order to allow more people to use the encryption results, AWS put this code library open source.
CTO club, Acer earthquake KEEN founder and CEO Wang Qi, said the industry is big bullfrog, GeekPwn launched and founder. Is also the first one of the first regional security response center ChinaMSRC, the former Microsoft headquarters outside the United states. In the near future, Wang Qi introduced the idea and thought of the GeekPwn event.
On 26 June 2015, antique Beijing siheyuan happened a information security related things, turned out to be the myth act famous hacker Wang Yingjian initiated and build "I age" and "e" in the spring and Autumn period safety personnel training platform Yongxin sincerity, the powerful combination of both to subvert the information security personnel training mode.
Said "Bo master" of the taxi drops CTO Zhang Bo said: "three years, basically every day 'War'. Eyes every day to a matter of life and death. And in the life and death speed, we are happy to find a lot of valuable experience, training a large number of outstanding talents."
The current protection function is difficult to respond to advanced targeted attacks, because the enterprise system is subject to continuous attack, and continued to lack of defense, the special way for the emergency response is no longer the right thinking mode, Garnter proposed the use of adaptive security architecture should be targeted at advanced attacks.
Kaspersky Lab is Duqu 2.0 captured after many security professionals to code and 0day were in-depth analysis, but there are still a lot of not clear place, in addition to Kaspersky, in addition to other victims of it? What kind of 0Day attack is used? What the attacker did?
We have discussed why it is a bad thing to have a EC2 instance with a API access key. Next, I will discuss the user and other automation processes that can use some characters to escape the entire key management process. However, there are a number of scenarios, the API key is still must be used to.
Password hardware is another form of password security industry, the future of many network applications are not separated from the password products, but many people do not know enough password security. With the state of security, autonomy, and more and more high degree of control of the degree of attention, the password industry, in particular, password hardware products will usher in a golden period of development.