Skip to content
data security
data security

Month: January 2022

  • Home
  • 2022
  • January
  • Page 2
Uncategorized

How to use Solitude to evaluate user privacy issues in your application

About SOLITUDE Solitude is a powerful privacy safety analysis tool that helps the majority of researchers conduct privacy issues based on their own needs. Whether it is curious novice or

  • admin
  • January 23, 2022
Uncategorized

How do companies do data anti-leakage?

The current era is the big data era, which is not only reflected in the massive growth of data, but also reflects more definitions of data in the privacy channel.

  • admin
  • January 23, 2022
Uncategorized

Privacy calculation hardware program: “Trust” TEE TEE “, data security, privacy protection

With the rapid development of mobile Internet and cloud computing technology, more and more data is stored, shared, and computated in the cloud environment, and data security and privacy protection

  • admin
  • January 22, 2022
Uncategorized

Darktrace: 2021 Five Trends of Email Security

As the domain name price continues to fall, and the threat of Email attacks in 2021 continues to grow in 2021. It is reported that in 2020, the fishing email,

  • admin
  • January 21, 2022
Uncategorized

Byte two sides: optimize HTTPS means, do you know how to?

The HTTP protocol transmitted by naked data is transferred to an HTTPS protocol for encrypted data transmission, and a “protective umbrella” is set to the application data, and the performance

  • admin
  • January 21, 2022
Uncategorized

Management of data risks in financial functions

The company’s chief financial officer and financial officer play a key role in assessing and managing data risks. According to a survey report released by the Analytics Gartner, in 2022,

  • admin
  • January 20, 2022
Uncategorized

The interviewer does not speak Wu De, and I actually let me talk about worms and Golden Slee!

1. Introduction to the worm 2. Buffer overflow 3. Buffer overflow Example 4. Hazard of buffer overflow 5. The consequences of the inner memory in the computer 6. Avoid three

  • admin
  • January 19, 2022
Uncategorized

How to search for ElasticSearch and MongoDB Directory data using ODBPARSER

About ODBPARSER OdbParser is a public resource intelligence tool that helps the researchers search, resolve and export data we are interested in frequent researchers from the Elasticsearch and MongoDB directories.

  • admin
  • January 19, 2022
Uncategorized

Analysis of Data Security Market Trend 2021

Today’s data security market is similar to the US “Golden Gold” in 1849. It is only that the company is not going to the West, but the application and advanced

  • admin
  • January 19, 2022
Uncategorized

The three-six zero joint public security department issued the “Global Network Security Policy Legal Development Annual Report (2021)”

Recently, the Ministry of Public Security Third Institute Network Security Law Research Center and three or six zero (601360.sh, the “360”) legal center jointly released the “Global Network Security Policy

  • admin
  • January 19, 2022

Posts navigation

Previous 1 2 … 5 Next

Recent Posts

  • Enterprises must prepare for the future of data drivers
  • Nosqli: a powerful NOSQL injection command line interface tool
  • Hand handle you how to achieve a simple data plus decision algorithm
  • No code authentication: Most of the illusion
  • Come to the weapon: BLACK HAT USA will launch eight security tools

Recent Comments

No comments to show.

Archives

  • February 2022
  • January 2022
  • December 2021
  • November 2021
  • October 2021
  • September 2021
  • August 2021
  • July 2021
  • June 2021

Link

  • anti detect browser
  • Orchid Store Theme by Themebeez