Absrtact: The new sharp technology media tiger sniffing network attacks the incident, causing concern in the industry. February 27 Night, the Tiger Sniff network interrupted visit, the tiger sniff net Sina official Weibo immediately issued a statement, said the site was malicious attack, then the Tiger sniffing network in the cloud server provider Ali new technology media Tiger Sniff network attack incidents, causing concern in the industry. February 27 Night, the Tiger Sniff network interrupted visit, the tiger sniff net Sina official Weibo immediately issued a statement, said that the site was maliciously attacked, then the tiger sniffing network in the cloud server provider Aliyun with the assistance of resuming normal access. According to the Tiger Sniff net announcement, 27th Night 1 ...
Abstract: The U.S. Science and Technology blog TNW, personal cloud services will be widely used in the future, become more convenient and more secure, but the current cloud services are still facing fragmentation, inefficiencies and security issues, only to solve these problems, personal cloud services can be successful. TNW, the American Science and Technology blog, said that personal cloud services will be widely used in the future, becoming more convenient and more secure, but cloud services are still facing fragmentation, inefficiency and security issues, only to solve these problems, personal cloud services can be successful. The following is the main content of this article: "Cloud" has replaced "social" to become ...
"Editor's note" At present, for DDoS attacks on the cloud than ever before, the largest DDoS attack in 2013 reached 309 Gbps, as more and more organizations migrate business and services to the cloud, a separate component may cause cascading failures. This is the next generation of security and DDoS devices to solve the problem. The following is a translation: At a recent large medical organization security meeting, I was fortunate to see the log of the private cloud infrastructure I had helped design. They showed me a set of interesting numbers that I think might appear to come from DDoS attacks. Ann ...
The cloud era needs to match the security solution. Single-point, passive traditional security solutions can not meet the cloud computing virtual, dynamic, heterogeneous environment. It is based on such considerations, the tide in the 2014 "Inspur World" wave technology and Application Summit announced the launch of cloud Host Security product solutions, based on a trusted server, through the construction of trusted servers, virtualization security, operating system consolidation to the application of container security integrity of the "chain of trust" to achieve complete, Proactive security. "Kind" can not solve the new problem "the current situation of China's security protection is still inclined ...
"Editor's note" as a cloud services solution, Alert logic integrates advanced 24x7 security tools to protect against threats and compliance, and is an advanced technology partner and security provider for AWS. This article comes from Stephen Coty, chief security officer at Alert Logic, who shares the best practices in cloud security. Here's what Stephen Coty shared: Many years ago, I created a security and development company with huge dreams and little money. However ...
By the National Computer Network Emergency Management Coordination Center, China Information Security Evaluation Center, National Computer virus Emergency treatment center and China Internet Association guidance, 360 The China Internet Security Congress (ISC2014), sponsored by the Internet Security Center and the China Internet Association Network and Information Security Working Committee, was held in September 24-25th at the Beijing National Convention Center. As the most authoritative annual summit in the Asia-Pacific Information Security field, this conference brings together the father of computer virus, the father of Internet security in China, the top security experts in China's information security field and so on.
[Guide] In recent years, the security industry has never been a trust crisis, "anti-virus software regardless of use", "anti-virus software can not kill Trojan" and other views are rife. 1988-1998 was the era of the DOS virus, when the mainstream security products are hardware anti-virus card; 1999-2007 is the Windows Virus era, mainstream security products are a variety of anti-virus software; 2008 began, the virus has been completely internet, into the "cloud security" era. In recent years, the security industry has never been a trust crisis, "anti-virus software regardless of", "antivirus soft ..."
The advent of cloud computing has changed the business model of the past, enabling people to enjoy the infrastructure resources needed at a more affordable price, like water, electricity and coal. However, how many people are willing to accept this service model for their users? According to the survey, enterprise users have been able to accept the private cloud, but when they convert these enterprise users to individual users, they begin to become hesitant to face the public cloud. Undoubtedly, cloud security has become the biggest "stumbling block" to cloud computing, how to break this bottleneck? Symantec Wu Xiyuan, president of the China region, recently received an interview with the media, explaining his ...
Recently, the Network Qin officially released its annual new-Net-Qin Security 5.0 Professional Edition, as the first new heavyweight Network Qin, NetQin Security 5.0 Professional Edition is the first real full line into mobile "cloud security" service mobile security products. "Cloud security" has become a hot topic in the security industry in recent years, after Microsoft, the internet giant Google announced will join the "Cloud Security Alliance" (Cloud), dedicated to providing the best security practice opportunities to the potential to join the cloud computing industry ...
Riverbed announces acquisition of virtual devices and cloud load Balancing Company-Zeus Technologies. Zeus is a nearly 15-year-old new venture, its main competitor is F5 and Citrix NetScaler. In fact, there are some unique values that can be analyzed. Zeus is a unique technique. Almost all of the development teams are from the University of Cambridge's computer science department, which uses software architectures to load balance, but has outperformed most hardware-type load-balancing devices, and it has more ...
Understanding Cloud Security "cloud security" plan is the latest embodiment of information security in the network age, it integrates the new technologies and concepts such as parallel processing, grid computing, unknown virus behavior judgment, and obtains the Internet Trojan, The latest information of the malicious program, pushed to the server side for automated analysis and processing, and then the virus and Trojan solution distributed to each client. Future anti-virus software will not be able to effectively handle the increasing number of malicious programs. ...
When I read various blogs, IT industry analytics, and media coverage, I found many conflicting points of view. Some authors consider cloud computing to be safer, while others emphasize new security challenges in particular. As the concept of "cloud" is still in its infancy, there are many plausible arguments everywhere. Here are the five cloud-computing blind spots I hear most about: Blind 1 infrastructure services (Infrastructure-as-a-service, IaaS) The virtual private "cloud" provided by a vendor is as secure as an enterprise's internal data center ...
As China's cloud computing industry leader, Shuguang is looking for a national, layout cloud computing, by summing up the dawning company in the field of cloud computing, it is no exaggeration to say that the dawn of the company's development strategy is the pursuit of China's cloud computing ideal realm. Vision Dawn "cloud computing" Center for the spirit of the national Internet is freedom, equality and sharing, as one of the most embodiment of the internet spirit of the computing model, cloud computing shows a strong vitality. It describes an extensible application that can be accessed over the internet ...
A period of time ago sent 2 posts cloud security is safe and cloud security is two, did not expect to attract a lot of saliva. And some friends simply put cloud security as the representative of Jinshan, 360 as the representative of active defense, and compare the two. There is clearly a misunderstanding, here further to the cloud security and active defense to do an explanation, welcome to discuss, do not spit. First said active defense, this is the micro point of Mister Xu first proposed, Xu Everyone is not necessarily very familiar with, but in the industry this is a very cattle name, because he is also the original rising anti-virus software designers and inventors, our country ...
The industry-renowned RSA Conference of information security events will be held in Beijing from November 2, 2011 to 3rd, the Second International Forum on Information Security held by RSA in China. Today, the RSA General Assembly Technical Committee officially released the theme and main topics of this meeting. RSA chief Technology Officer Bret Hartman said that the RSA 2011 Forum theme was Alice & Bob, still continuing the theme of this year's San Francisco Congress in February. Because Alice and Bob's initials were a ...
The "Ninth China CSO Congress", held in the middle of this month at the Ambassador Hotel in Beijing, is a grand gathering of the network security community this year. Based on the theme of "Information security in China under the Twelve-Five plan", this conference discusses the new challenges of network security and the key points of information security Twelve-Five construction in China. The Conference received the Ministry of Industry and Information Technology Department for the Security Coordination, the Ministry of Public Security Network Supervision Bureau of the Strong support of the Ministry of Industry and Information Security Coordination Division OUYANGWU Deputy Director, the Ministry of Public Security 11 Bureau Guo Qiquan director and other leaders personally visited the venue ...
The demand for mobile internet services is increasingly high, no longer limited to the computer network in front of the world, people need to be able to use mobile phone to browse the Web, counseling, games, social and shopping. Mobile browser as a user into the internet window, the basic performance of the promotion is becoming more important, and "cloud security" service should be for users to use mobile phone browser added an umbrella. It is reported that in order to better meet user security needs, QQ mobile phone browser will be introduced in the recent new technical framework--xcloud, comprehensive support for "cloud security", so that all platform QQ ...
Trend technology company officially announced a formal partnership with Sony, since June 10, 2011, sony Sony VAIO series nine computer products (including seven Vaio series notebook products and two Vaio Series desktop products) will be fully pre-installed trend technology cillin cloud security software 2011 Fully Functional Enhanced version (60 days full free version) products, and in China, Japan, Korea, South Africa, New Zealand, Thailand, Singapore, the Philippines, United Arab Emirates, Tunisia and other 19 countries and regions in a variety of languages to distribute synchronously. To make a ...
With the development of domestic cloud computing industry, the construction of cloud computing infrastructure has been paid attention by many software vendors, and "cloud security" has become an important link in cloud computing development. Relatively speaking, the traditional operating system security problems will only affect the single machine, and the cloud operating system security problems will be running on the underlying platform of all virtual machines, the loss to users is immeasurable. Therefore, in the construction of cloud computing infrastructure platform, how to ensure the security of the basic platform has become the focus of attention of users. Winning the bid for Kirin as the flagship enterprise of domestic operating system ...
Enfodesk think tank analysis that: 2011 years is not only Tencent, An Yugia and other emerging manufacturers happy enclosure active period, but also Network Qin, Kaspersky and other old manufacturers because of the problem of absorbing fees facing reshuffle adjustment period, the mobile phone security industry has basically said goodbye to SP pay the main killing function competition, into a free cloud application as the core of the Pan-security Service era. In the 2012, the mainstream manufacturers ' contention for the right to speak is no longer limited to the application itself, but to the security of the mobile phone as the bottom, the integration of mobile browsers, mobile phone application stores and other user portals ...
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.