본문 바로가기

IT 와 Social 이야기/Security419

[Shawn Tuma] Data Security and Privacy by Contract: Hacking Us All Into Business Associates - 비즈니스 협력 계약시 점검해야 할 보안 요소 Data Security and Privacy by Contract: Hacking Us All Into Business Associates, SMU Science & Technology Law Review’s Cybersecurity Symposium (10/23/15) from Shawn Tuma 2015. 10. 27.
[US-CERT: Bulletin(SB15-299)] 2015년 10월 19일까지 발표된 보안 취약점 The vulnerabilities are based on the CVE vulnerability naming standard and are organized according to severity, determined by the Common Vulnerability Scoring System (CVSS) standard. The division of high, medium, and low severities correspond to the following scores: High - Vulnerabilities will be labeled High severity if they have a CVSS base score of 7.0 - 10.0 Medium - Vulnerabilities will be.. 2015. 10. 27.
[IBM Security] State of Application Security Vol. 4 - 애플리케이션 보안 현황 분석 인포그래프 State of Application Security Vol. 4 from IBM Security 2015. 10. 22.
[US-CERT: Bulletin(SB15-292)] 2015년 10월 12일까지 발표된 보안 취약점 The vulnerabilities are based on the CVE vulnerability naming standard and are organized according to severity, determined by the Common Vulnerability Scoring System (CVSS) standard. The division of high, medium, and low severities correspond to the following scores: High - Vulnerabilities will be labeled High severity if they have a CVSS base score of 7.0 - 10.0 Medium - Vulnerabilities will be.. 2015. 10. 20.