- 博客(4233)
- 资源 (2)
- 收藏
- 关注
原创 Twitter for Museums: Strategies and Tactics for Success
Twitter for Museums: Strategies and Tactics for Success
2016-07-15 21:30:35 701
原创 aws devops
https://aws.amazon.com/cn/training/course-descriptions/devops-engineering/https://www.aws.training/home?courseid=13&language=en-US&view=table&src=web_en_course-devopshttps://aws.amazon.com/cn/de
2016-07-09 18:02:50 1010
转载 Microsoft Infrastructure as a Service Foundations-Multi-Tenant Designs
https://blogs.technet.microsoft.com/privatecloud/2014/11/18/microsoft-infrastructure-as-a-service-foundations-multi-tenant-designs/
2016-05-13 20:17:37 806
原创 Integrity Measurement Architecture (IMA)
https://sourceforge.net/p/linux-ima/wiki/Home/
2016-02-19 16:36:45 1726
原创 ENISA CCSM
https://resilience.enisa.europa.eu/cloud-computing-certification/https://www.enisa.europa.eu/media/press-releases/enisa-cloud-certification-schemes-metaframework
2016-02-06 21:03:36 1334
原创 红军vs蓝军
http://blogs.microsoft.com/cybertrust/2015/10/08/cloud-security-controls-series-penetration-testing-red-teaming-forensics/
2015-12-09 00:25:47 3204
原创 nsa ant tools
https://nsa.gov1.info/dni/nsa-ant-catalog/servers/index.html
2015-12-06 11:33:01 1478
原创 Market Guide for Cloud Access Security Brokers
http://www.gartner.com/technology/reprints.do?id=1-2RUEH70&ct=151110&st=sb
2015-12-03 22:46:00 1474
原创 COMPSAC峰会
https://www.google.com.hk/?gws_rd=cr,ssl#safe=strict&q=COMPSAC+2015
2015-11-22 17:34:24 1462 1
转载 The 11-Step Guide to BYOD Security. How to Avoid Getting Fired
https://heimdalsecurity.com/blog/byod-security/
2015-11-21 13:24:23 1123
转载 透视网络空间思路
透视网络空间思路1. 组件识别2. 组件之间的层级关系3. 组件高一维度的设备信息4. 设备之间的网络层级关系5. 设备高一维度的使用方信息(人)6. 人高一维度的社交信息7. 物理位置信息8. 漏洞信息9. 数据信息
2015-11-21 10:46:56 1073
原创 MTCS标准
https://www.ida.gov.sg/Tech-Scene-News/ICT-Standards-and-Framework/MTCS-Certification-Schemehttp://www.singaporestandardseshop.sg/product/product.aspx?id=88be024c-cead-4a59-801d-9fcedbbab88f
2015-11-21 00:08:45 1843
原创 Distributed Machine Learning Toolkit (DMTK)
http://www.dmtk.io/download.html
2015-11-10 13:26:05 1329
原创 RID Agents
https://github.com/RSAIntelShare/RID-Serverhttps://github.com/MITRE-RID-Agent/MITRE_RID_Agent
2015-11-08 01:12:22 1219
原创 The Cloud Security Ecosystem: Technical, Legal, Business and Management Issues
http://www.amazon.com/Cloud-Security-Ecosystem-Technical-Management-ebook/dp/B00ZC90H02/ref=mt_kindle?_encoding=UTF8&me=
2015-10-25 20:06:15 922
转载 northropgrumman
http://www.northropgrumman.com/capabilities/cybersecurity/Pages/default.aspx
2015-10-25 18:29:51 825
转载 What is SSAE 16, ISAE3402
http://wenku.baidu.com/link?url=KW6LtX6bN_2-N9ZlNZNmTtmv6Piht_1_2E7ID4tFqo3Yk9hcEr3XkSasBuLxOt-VrZiuvwJ4_uStwQ_P_6dlO-uEhCyqNxnysXqY-i5zrF_
2015-10-25 16:03:18 1250
转载 Introduce Intelligence to Your Security Operations
http://cyber.lockheedmartin.com/blog/introduce-intelligence-to-your-security-operations
2015-10-25 15:42:52 686
转载 Adversaries and Their Motivations (Part 1)
http://researchcenter.paloaltonetworks.com/2015/10/adversaries-and-their-motivations-part-1/
2015-10-25 15:37:51 673 1
转载 7 Deadly Sins Of Security Policy Change Management
http://www.darkreading.com/operations/7-deadly-sins-of-security-policy-change-management/a/d-id/1319486
2015-10-25 11:30:51 718
原创 网络微切分-0信任网络架构
https://www.paloaltonetworks.com/resources/videos/zero-trust.htmlhttp://blogs.vmware.com/networkvirtualization/files/2014/06/VMware-SDDC-Micro-Segmentation-White-Paper.pdfhttp://csrc.nist.gov/cy
2015-10-24 14:26:25 1370
原创 An Overview of MITRE Cyber Situational Awareness Solutions
http://www.mitre.org/publications/technical-papers/an-overview-of-mitre-cyber-situational-awareness-solutionshttps://attack.mitre.org/wiki/Main_Page
2015-10-18 22:01:15 750
原创 Threat Intelligence-Driven Risk Analysis
http://www.threatconnect.com/threat-intelligence-driven-risk-analysis/
2015-10-18 00:08:39 625
空空如也
TA创建的收藏夹 TA关注的收藏夹
TA关注的人