enterprise security
-
The flaw in the ICS system - the grave of the business
enterprises are the favorite target of malicious agents on cyberspace. -
WannaCry remains one of the most dangerous global security threats
wannacry is a ransomware that spreads itself on computers using windows operating systems. -
Awareness and experience - the most important factor in every network security process
need to improve information security capacity in 3 basic elements: people, processes, and technology solutions -
Alarming statistics on the situation of network security in our country in the first half of 2019
the number of cyber attacks on our country's computer systems in the first 6 months of 2019 had a record increase. -
Overview of building enterprise security detection and response system
security policies of enterprises are usually built through the specific identification of the types of data assets, information needed or play an important role in ensuring the stable performance of the apparatus. -
Top 5 trends in endpoint security for 2018
endpoint security is a type of security that is growing rapidly. -
Samsung postponed the release of KNOX security application
the new york times reported that samsung had to postpone the release of its knox security software for business customers. -
Free the Trend Micro Worry-Free v8.0 software key for businesses
cooperation program between tipsmake.com and thai phong peak company distributor trend micro in vietnam -
Deep Learning - new cybersecurity tool?
artificial intelligence (ai) is increasingly contributing to every area of human life. among the sub-domains of artificial intelligence in general and machine learning in particular, it can be said that deep learning is a truly outstanding technological breakthrough. -
Endpoint Detection and Response threats, an emerging security technology
endpoint threat detection and response (etdr) is a term first introduced by security expert anton chuvakin from gartner in 2013 to refer to the tools mainly focus on detecting and investigating suspicious activities (as well as traces of other phenomena that don't always happen) on the server or