3 min
自动化和编排
你的安全团队需要编码资源吗?
通常当安全团队考虑安全自动化时
[http://www.rapid7.他们担心他们
don’t have the coding capabilities needed to create, implement, and maintain it.
Pulling development resources from the IT team or engineering department can
take time; backlogs are long, and revenue-generating projects tend to take
priority. Another option is to hire an IT consultant, but this can be pricey and
可能无法长期持续.
Instead, some sec
4 min
自动化和编排
安全编排和自动化将如何统一信息安全
After working in the security industry for 15 years, one of the consistent
themes I’ve observed is how teams struggle with balancing the increasing amount
of work they have to do, without an increase in resources to accomplish their
goals. But there’s another, less obvious problem that I like to refer to as a
另一种SaaS:“作为孤岛的安全”.”
It should be no surprise that large organizations frequently struggle with silos
这就产生了摩擦和沟通不畅的障碍
4 min
自动化和编排
How to Securely Handle a Lost or Stolen Device: A Practical Workflow
It’s 10pm and you receive an email from a teammate that their laptop was stolen
at a local networking event. 你知道的不仅仅是他们的电脑
unlocked, but they were logged into their company email and Salesforce accounts
那时候设备被偷了.
Devices like laptops and phones hold a lot more value than the technology
itself. Everything from customer data to company files and account logins are
stored and easily accessible on these devices, making them easy targets for data
4 min
自动化和编排
安全职业道路:常见和独特的角色
安全是当今最受欢迎的角色之一. According to recent numbers
[http://www.csoonline.com/article/2953258/it-careers/cybersecurity-job-market-figures-2015-to-2019-indicate-severe-workforce-shortage.html]
, the demand for security workers is expected to grow to 6 million worldwide by
2019. 那么,你是如何进入或发展你的安全事业的呢?
What makes security so interesting is the many directions you can take —
traditional or not. 这篇文章将指导您如何构建
2 min
自动化和编排
为什么安全团队应该拥抱(而不是害怕)自动化
这不是世界末日的到来. 这不是安全的终结
profession. 这当然不是一件坏事. 我们讨论的是
automation. As security threats become a bigger part of the day-to-day concerns
at all types of organizations, bringing in machines has become necessary to keep
up. In fact, security automation can help you become even more valuable as an
employee. 处于安全编排和自动化的核心
[http://tdvrr.abbylexus.net/solutions/s
1 min
Komand
你需要知道的关于建立安全事业的一切
你在考虑从事保安工作吗? Or have you already
started one, and you’re wondering what it will take to get to the next level?
Perhaps you have been in the security field for a long time, and it’s starting
to feel a little stale?
Regardless of where you are in your journey, we’ve put together a helpful guide
full of valuable information and real-world anecdotes about what it means to
追求这个充满活力和挑战的职业.
免费电子书:定义你的职业道路
3 min
Komand
SOC系列:如何为您的SOC选择正确的技能
Do you have the right mix of skills in your security operations center (SOC)
[http://tdvrr.abbylexus.net/fundamentals/security-operations-center/]? Whether your
SOC is brand new or has been around for years, you need to be sure it’s built to
满足当今复杂安全形势的需求.
In this post, we’ll define the most important skills any SOC should have today
so you can be sure to have the right mix of people to safeguard your business.
有效的团队合作和沟通技巧
Regard
3 min
自动化和编排
How to Password Protect Apache Directories with mod_authn_dbd and MySQL on Ubuntu Linux
Synopsis
The mod_authn_dbd is an Apache module that provides the functionality for Apache
使用MySQL数据库验证用户. 该模块提供身份验证
front-ends such as mod_auth_digest and mod_auth_basic to authenticate users by
在MySQL表中查找用户. Apache的mod_authn_dbd支持的范围很广
of drivers such as, ODBC, MSSQL, SyBase, MySQL, Oracle, PostgreSQL and SQLite.
This module allows execution of arbitrary SQL for user / password matching and
also support al
3 min
自动化和编排
如何在Ubuntu Linux上使用Let's Encrypt来保护Apache
Synopsis
Improving your website security has generally been most complicated and
对于每个Linux管理员来说,这是一项昂贵的任务. Let’s Encrypt is a free,
自动的、开放的证书颁发机构,提供免费的X.509 certificates
for Transport Layer Security encryption via an automated process. It is very
complex process to install and add an SSL certificate to a web server. You can
让它更容易与让我们加密的帮助. You can easily encrypt data
[http://tdvrr.abbylexus.net/fundamentals/
4 min
自动化和编排
如何在Ubuntu Linux上使用端口敲门来保护SSH服务器
Synopsis
Port Knocking is a method used to secure your port access from unauthorised
users. Port Knocking works by opening ports on a firewall by generating a
在一组预先指定的关闭端口上尝试连接. Once a correct
sequence of connection attempts is received, the firewall will open the port
that was previously closed. 港口敲打的主要目的是防御
防范端口扫描器. 更改默认ssh端口是不安全的
方法来保护您的服务器,因为
3 min
自动化和编排
如何在Ubuntu Linux上保护MySQL服务器
Synopsis
Now a day database server is very critical and necessary component for any
applications. Databases can be found in everything from web applications, web
服务器到智能手机和其他设备. 大多数软件应用程序依赖于
database to store its data. 这就是为什么数据库是第一位的原因
target of any attackers. 在所有数据库中,MySQL和MariaDB已经成为
the world’s most popular open source database due to its fast performance, high
reliability and eas
23 min
Komand
An Interview with Rebekah Brown, Co-Author of Intelligence-Driven Incident Response
We recently interviewed Rebekah Brown for our Defender Spotlight series
[/2017/08/09/defender-spotlight-rebekah-brown-rapid7/] on the topic of her life
as a cybersecurity defender. 当我们和她交谈时,她也谈得很深入
about how threat intelligence can inform and improve the incident response
lifecycle.
Rebekah practices these concepts in her day-to-day life as a defender, and she’s
even co-authored a book on this very topic called Intelligence-Driven Incident
Response [http://shop.o
3 min
自动化和编排
RSA (Rivest, Shamir and Adleman)
Synopsis
Rivest, Shamir & RSA (Adleman)是公钥密码系统. The phenomenon
数据传输的安全通过它. “RSA”是首字母
这个系统的发明者. 该算法分为四个步骤:
加密,解密,密钥分发和密钥生成. After the
development of public-key cryptography, the most famous cryptosystem in the
world is RSA. In order to maintain proper security, the decryption exponent of
RSA必须大于cer
3 min
自动化和编排
什么是数据加密标准(DES)?
Synopsis
The Data which is encrypted by symmetric key method is called Data Encryption
Standard (DES). 1974年由IBM团队编写,并宣布为国家标准
standard in 1977. 政府也在使用密码学,特别是在
外交沟通与军事. 没有密码学就很难
解读军事通讯. 密码学也被用于商业
sector. Federal Information Processing Standard (FIPS) was also working on DES.
FIPS与计算机集成
4 min
Komand
如何使用你的威胁模型作为安全的路标
The threats you face are unique to your company's size, industry, customer base,
and many other factors. 所以你保护你的
组织的数字数据也应该是独一无二的.
In this post, we’ll cover a framework to develop an effective threat model that
将适合您的组织的独特需求.
决定你的独特威胁模型的因素
有许多因素可以决定您的威胁模型. And while this will
每个公司都不一样,我们已经确定了