Tag

threat monitoring

1 views collected around this technical thread.

HomeTech
HomeTech
Jul 31, 2019 · Information Security

Enterprise Intrusion Detection System Architecture and Feature Overview

This document outlines the background, challenges, and a comprehensive enterprise intrusion detection solution that combines host‑based and network‑based monitoring, automated CVE and GitHub leak collection, a modular agent‑middle‑display architecture, and future plans for multi‑dimensional threat modeling to enhance preventive security capabilities.

CVE collectionIntrusion DetectionSOC
0 likes · 10 min read
Enterprise Intrusion Detection System Architecture and Feature Overview
Efficient Ops
Efficient Ops
Sep 6, 2018 · Information Security

Key Findings from China’s 2018 Q2 Internet Security Threat Report

The 2018 second‑quarter report by the Ministry of Industry and Information Technology details the monitoring of approximately 18.4 million internet security threats, highlighting compromised user email accounts, attacks on industrial IoT platforms and devices, the rise of illegal cryptocurrency mining, and outlines the major mitigation actions taken, including vulnerability remediation, network protection for major events, and coordinated emergency drills.

cryptocurrency miningemail hijackingindustrial IoT
0 likes · 8 min read
Key Findings from China’s 2018 Q2 Internet Security Threat Report