DataLocker Excludes Chinese Encryption Chips to Ensure Absolute Security

重點速覽 DataLocker 發表聲明,強調其加密儲存產品從未使用中國製的加密晶片,並承諾未來也不會採用,藉此回應某些加密儲存設備可能存在中國政府控制的「後門」的擔憂。目前DataLocker僅使用…

Continue ReadingDataLocker Excludes Chinese Encryption Chips to Ensure Absolute Security

Honghong Shares丨DataLocker is an industry leader in FIPS 140-3 Level 3 security, with multiple devices on the NIST MIP list

重點速覽 領先的加密儲存解決方案品牌DataLocker宣布取得一項重大成就,成為目前唯一一家在NIST FIPS 140-3 模組製品 (MIP) 清單中列出多個安全 USB 裝置的品牌。憑藉其產品…

Continue ReadingHonghong Shares丨DataLocker is an industry leader in FIPS 140-3 Level 3 security, with multiple devices on the NIST MIP list

Honghong Shares丨Identify and Prevent Security Risks of Blast-RADIUS Vulnerability with ProfiShark and IOTA

Introduction With the increasing number of threats to network security, it is critical to understand and prevent possible attacks. Blast-RADIUS is a security vulnerability that severely affects the RADIUS protocol, allowing attackers to bypass authentication and gain unauthorized access. This article...

Continue ReadingHonghong Shares丨Identify and Prevent Security Risks of Blast-RADIUS Vulnerability with ProfiShark and IOTA

Honghong Sharing | IT and OT Networks: Structure, Challenges and the Future of Precision Analysis

IT Networks (Traditional Networks) IT networks are the backbone of modern computing, providing the infrastructure for data exchange, communication and processing. Typical applications include: Office Networks Data Centers Cloud Services Internet Connectivity These networks rely on standard protocols such as TCP/IP, DNS and HTTP...

Continue ReadingHonghong Sharing | IT and OT Networks: Structure, Challenges and the Future of Precision Analysis

Hong Hong Dry Goods | Network Forensic Analysis and Intrusion Analysis Training is coming, let's have a serious preview first! What is IOC and how to recognize and respond to it?

文章速覽: ● 網路安全中的IOC是什麼?● IOC和IOA有什麼區別?● IOC有哪些類型?● IOC的常見實例有哪些?● IOC解決方案和工具 近期,Wireshark 大學和宏虹Allegro …

Continue ReadingHong Hong Dry Goods | Network Forensic Analysis and Intrusion Analysis Training is coming, let's have a serious preview first! What is IOC and how to recognize and respond to it?