IT 와 Social 이야기/Security419 [CYREN] Can a Light Bulb Really Pose a Security Threat? 형광등이 해킹 당할 수 있을까? Webinar: Can a Light Bulb Really Pose a Security Threat? A Practical Look at Internet of Things and Cybersecurity from CYREN 2015. 2. 4. [Anastasios Economides] Internet of things and security challenges Internet of things and security challenges from Anastasios Economides 2015. 2. 3. [National Retail Federation] What retailers want you to know about data security What retailers want you to know about data security from National Retail Federation 2015. 2. 3. [US-CERT: Bulletin(SB15-033)] 2015년 1월 26일까지 발표된 보안 취약점 [US-CERT: Bulletin(SB15-033)] 2015년 1월 26일까지 발표된 보안 취약점 The vulnerabilities are based on the CVE vulnerability naming standard and are organized according to severity, determined by the Common Vulnerability Scoring System (CVSS) standard. The division of high, medium, and low severities correspond to the following scores: High - Vulnerabilities will be labeled High severity if they have a CVSS b.. 2015. 2. 2. 이전 1 ··· 44 45 46 47 48 49 50 ··· 105 다음