보안402 [Info-Tech Research Group] Develop and Implement a Security Incident Management Program Develop and Implement a Security Incident Management Program from Info-Tech Research Group 2015. 6. 8. [US-CERT: Bulletin(SB15-152)] 2015년 5월 25일까지 발표된 보안 취약점 The vulnerabilities are based on the CVE vulnerability naming standard and are organized according to severity, determined by the Common Vulnerability Scoring System (CVSS) standard. The division of high, medium, and low severities correspond to the following scores: High - Vulnerabilities will be labeled High severity if they have a CVSS base score of 7.0 - 10.0 Medium - Vulnerabilities will be.. 2015. 6. 2. [michaelxin2015] OpenStack Security CI/CD Way OpenStack Security CI/CD Way from michaelxin2015 2015. 5. 29. [PubNub] 10 Challenges to Securing IoT Communications 10 Challenges to Securing IoT Communications from PubNub 2015. 5. 26. 이전 1 ··· 59 60 61 62 63 64 65 ··· 101 다음