Introduction There are various types of diagnosis such as targets and items, even if it is called security diagnosis. Here are two typical diagnoses. One is “Web Application Diagnostics” and the …
Security
Denial of Service (DoS) and Distributed Denial of Service (DDoS), how many times have you heard of them… You know when you’re stuck in a kilometer queue on the highway …
Remote monitoring using IoT, the favorite of DX for manufacturing equipment manufacturers
Transformation using advanced digital technology is occurring in all industries. Manufacturers of manufacturing equipment are no exception. Manufacturing equipment manufacturers, which have been in a highly competitive market for some time, are …
[Telework] What is remote access? Introducing the difference from VPN in an easy-to-understand manner!
Due to the influence of the new coronavirus, the number of companies that recommend telework is increasing rapidly. To start telework, we will use a technology called “remote access”. Therefore, …
What is remote access? Differences from VPN/setting methods/comparison of tools!
This time, we will explain in an easy-to-understand manner the outline and connection method of [remote access], which has become more and more known due to the spread of remote …
Currently, the new coronavirus is raging not only in Japan, but all over the world. Under such circumstances, many companies have introduced remote work. In this article, we will introduce …
In recent years, the number of information leaks has increased. “Virus infection/unauthorized access” accounts for more than 50% of the causes. In addition, as remote work is promoted and opportunities for …
What is a security engineer? Is your work hard? Explains qualifications and future potential
Information security has become a particular focus in recent years. As a national qualification, attention is focused on training and securing security engineers who are involved in security-related work, such as …
Introduction A security patch is a program that fixes a problem when a vulnerability is discovered in a software product. By retrofitting existing programs, security vulnerabilities are addressed. Attacks that …
*This article was contributed by AI Defense Laboratory, a joint research organization of ChillStack Co., Ltd. and Mitsui Bussan Secure Directions Co., Ltd. This series, titled “AI* 1 Security Super Primer”, covers …
- 1
- 2