Master

In a 24/7, always-on, digital world, securing your systems and data is more important than ever. Find out more about some of the hottest topics in security.

DevSecOps

DevSecOps is a term coined to integrate security practices inside the development environment and operations collaborations that we know as DevOps.

Read more

IAST/RASP

Data or information privacy is the practice of protecting data through its life wherever it lives or wherever it is sent, to assure the owner of that data that only permitted actors can access it.

Read more

Zero-trust architecture

Zero trust is a security concept where access to systems — both internally and externally — should demand authentication.

Read more

业务连续性计划

The execution of a predetermined plan to keep your IT systems on their feet after an event compromises the core systems.

Read more

事件响应

Data or information privacy is the practice of protecting data through its life wherever it lives or wherever it is sent, to assure the owner of that data that only permitted actors can access it.

Read more

去中心化身份

Decentralized identity is a concept that puts individuals in control of their personal information, who it is shared with and who can access it.

Read more

合规即代码

Data or information privacy is the practice of protecting data through its life wherever it lives or wherever it is sent, to assure the owner of that data that only permitted actors can access it.

Read more

同态加密

An encryption method that allows a user to carry out defined operations on a set of encrypted data without ever getting the opportunity to decrypt any parts.

Read more

威胁建模

Data or information privacy is the practice of protecting data through its life wherever it lives or wherever it is sent, to assure the owner of that data that only permitted actors can access it.

Read more

安全策略即代码

Data or information privacy is the practice of protecting data through its life wherever it lives or wherever it is sent, to assure the owner of that data that only permitted actors can access it.

Read more

将隐私保护融入设计

Privacy by Design

Read more

数据隐私保护

Data or information privacy is the practice of protecting data through its life wherever it lives or wherever it is sent, to assure the owner of that data that only permitted actors can access it.

Read more

无密码认证

Data or information privacy is the practice of protecting data through its life wherever it lives or wherever it is sent, to assure the owner of that data that only permitted actors can access it.

Read more

渗透测试

Penetration testing, or pen testing, is the practice of deliberately trying to break into a system from the outside to expose its vulnerabilities.

Read more

灾难恢复

The execution of a predetermined plan and infrastructure to get your IT systems back from the brink after an event compromises the core systems.

Read more

物联网安全

Data or information privacy is the practice of protecting data through its life wherever it lives or wherever it is sent, to assure the owner of that data that only permitted actors can access it.

Read more

生物识别

Biometrics

Read more

红队、蓝队、紫队

Data or information privacy is the practice of protecting data through its life wherever it lives or wherever it is sent, to assure the owner of that data that only permitted actors can access it.

Read more

隐私保护通信

Privacy-aware communication

Read more

Would you like to suggest a topic to be decoded?

Just leave your email address and we'll be in touch the moment it's ready.