CSA cloud security alliance founder and Jim Reavis:Cloud Today Cloud, Tomorrow CEO

CSA cloud security alliance founder and Jim Reavis CEO published a speech entitled "Today Cloud, Tomorrow Cloud", in the face of the challenges of the future CSA, he said CSA future will be dedicated to make cloud security more than any other IT system. He believes that security should serve as a service to provide.

[brief] penetration testing system Kali launched Docker image

The famous Offensive Security launched the mirror penetration testing team official Kali Docker, brought good news for the Docker game player.

Android security research experience

Android application itself is mainly focused on the 4 major components, is usually some of the problem of logic processing lead to information leakage, identity authentication bypass, etc..

[news] Ali cloud bid "two period" of these projects big data cloud project, the total amount of 85680000! (including)

Announcement of the General Administration of customs, Ali cloud bid "Jinguan project phase II" big data cloud project, winning a total amount of 8568 million, integrators for Jiangsu Datacraft. Its focus on the construction of the national customs monitoring command system, import and export enterprise credit management system, customs logistics monitoring system, etc..

AWS security best practice #5: minimize the authority

In this series of articles in the top four, we discuss how to make the EC2 instance more secure using AWS services, which refers to the maximum number of keys to reduce the number of keys. Before we have discussed, the use of a more potential benefits of Roles is to control the EC2 instance has the right.

AWS security best practices #4: the use of Roles EC2 function

This article belongs to the best practice of AWS security fourth, the security of this AWS is basically completed by the pretreatment. And take the initiative to the essence of the defense is to reduce the illegal molecular space to attack, with the attack space less, by the agency loss will be smaller.

AWS security best practice #5: minimize the authority

In this series of articles in the top four, we discuss how to make the EC2 instance more secure using AWS services, which refers to the maximum number of keys to reduce the number of keys. Before we have discussed, the use of a more potential benefits of Roles is to control the EC2 instance has the right.

AWS security best practices #3: the number of IAM users through Admin permissions

This article belongs to the third part of the best practice of AWS security. In accordance with the progress of the first two articles, we have disabled the root AWS users - the removal of all root keys for their distribution of MFA, then destroyed or discarded them.

AWS security best practice #2: at any time to open the MFA token

This article belongs to the AWS security best practices of the second, we will explore the Authentication Multi-Factor (MFA), tells you the reasons you need it and need to use it, and we will analyze why the lack of its infrastructure will be a security risk.

75% of the company is still vulnerable to Heartbleed attacks, it has been numb?

According to a recent report by Venafi, a key management company, two thousand companies have found that 3/4 of companies are still vulnerable to Heartbleed attacks, and not all of the IT companies can learn from the experience, once again a massive leak, estimates that time people have been numb.
Per page Total 190 data < One Two Three Four Five Six Seven Eight Nine Ten ...Ninteen >      To No. Page GO

Safety weekly

Extract the most essence of the week of the development of security content, covering expert interviews, blog essence, interactive Q & A, data download, etc..

Safe community activity

Top_arrow