Information Technology Broadcasting - اطلاع‌رسانی فناوری اطلاعات
408 subscribers
13.9K photos
41 videos
505 files
489 links
Information Technology, Cloud computing, Digital transformation, IoT, Edge computing, IT governance, Fog computing, IT security, IT regulation, IT trends, Programming، Big data, Monitoring, Databases, Api, Service
Download Telegram
An overview of SIEM components and capabilities:

Alerting-Identifies urgent issues by analyzing

events and sending alerts

Threat Hunting- Allows security staff to search logs

and events for threats proactively Forensic analysis- Provides insight into security

incidents by exploring log and event data

Data Aggregation- Gathers and aggregates data from security systems and network devices

Threat Intelligence- Integrates internal data with third-party data on threats and vulnerabilities

Dashboards-Presents visualizations that help staff

identify patterns and anomalies in event data

Incident response-It helps security teams identify, and respond to security incidents, bringing in all relevant data rapidly to respond on time.

Retention- Data and metrics are recorded for a long time, which is quite useful for forensic investigations and compliance in the future.

SOC automation- SIEMS with advanced capabilities can respond to security incidents by orchestrating multiple security systems (SOAR)

Analytics- A range of statistical models and machine learning algorithms are used to identify relationships between data elements within metrics.
2357346552690.pdf
3 MB
گزارش صنعت نسل ۴ برای توسعه فراگیرجهان در آغاز یک انقلاب جدید فناوری مبتنی بر فناوری‌های صنعتی نسل 4.0 مانند هوش مصنوعی، روباتیک و اینترنت اشیا است. در این راستا ستاد اقتصاد دیجیتال و هوشمندسازی این گزارش را به زبان فارسی در اختیار علاقمندان قرار می‌دهد.
Forwarded from SecCode (Meisam Monsef)
WSTG.pdf
17.3 MB
دانلود کتاب فارسی WSTG
استاندارد جامعی که اغلب در فرآیند تست نفوذ وب مورد استفاده قرار می گیرد، استاندارد WSTG یا Web Security Testing Guide است.
نویسنده : مهندس نیک آور
@SecCode
How Android's Private Compute Core works

Android's Private Compute Core essentially keeps sensitive data for features like Live Translate, Now Playing, and Smart Reply confidential from other subsystems. To do so, Google utilizes techniques like Interprocess Communications (IPC) binds and isolated processes. These techniques are included in the Android Open Source Project and can be controlled by publicly available surfaces like Android framework APIs.