主页 / 2018 ISC互联网安全大会 / DISAPPEARING PERIMETERS Combating Security challenge swith cloud security

-
作者Aseem Ahmed Sr.Product Manager-Cloud Security,Akamai Technologie
-
简介
- Evolution of web
- Rich and vulnerable with APIs..
- API Attacks overview
- API Attacks:Common vulnerabilities target
- JWT Decoded:Authorization attacks
- Deserialization Problems:RCE Attacks
- Logical DoS Attacks
- Enhancing API Security
- Elastic and vulnerable with IoTs
- SSH as SOCKS Proxy:Exploitation of IoT devices
- Attacks are doubling in size every 2 years
- Are you still fighting with attackers the old way?
- Cloud must become the new perimeter
- Cloud Delivery Platforms to build your Digital and Security strategy
- Cloud Security–Key elements
-
提示本站仅做资料的整理和索引,转载引用请注明出处
相关推荐
-
2020-12-10 15:21:14.680184
-
2020-08-24 11:58:08.042294
-
2021-12-03 14:07:07.836947
-
2019-09-11 13:38:24
附件下载
-
5.Akamai.消失的边界.pdf