存档

‘云安全’ 分类的存档

2016Q2 Cybersecurity 500 点评

2016年8月2日 没有评论

列表在 http://cybersecurityventures.com/cybersecurity-500/#home/?view_1_per_page=500&view_1_page=1

首先要看看他收录的是什么公司“The Cybersecurity 500 is the definitive list of the world’s hottest and most innovative companies in the cybersecurity industry”,热门和创新。

1、大而全的列表,几乎还不错的安全公司都入榜了。能帮助大家快速感知整个行业的玩家,但是良莠不齐,需要自己过滤。

2、阿里云安全这个重量级玩家缺席。

3、能看到一些公司在挑战传统的安全产品和传统的售卖方式。这个点赞。

分类: 云安全 标签:

中国网络安全企业50强(2016年上半年)

2016年6月21日 没有评论

前言

自2015年10月,《中国网络安全企业50强》(以下简称“50强”)首次发布以来,安全牛就一直在筹划《50强》的第二次发布,并于今年3月初正式启动调查工作。经过三个多月的调研、审核及评定工作之后,于今日凌晨正式发布。

本次调查从近500家安全企业中筛选出150家候选企业,通过公开资料收集、调查表填写、电话会议及当面沟通等形式获得基础资料。再由专业调查人员结合技术专家及行业资深人员组成的调查委员会,根据本次的调查指标和方法论进行审核、打分和评比,最终评选出50家网络安全公司,调查数据基于2015年全年度的数据和信息。

本次《50强》调查,取消了传统、新兴企业和大型企业网安部门之分,统一进行排名。并且,在榜单的最后,还特别推荐了在各个安全新兴领域,最具有发展潜力的20家初创企业。入选这个名单的初创企业,还将优先进入到今年中国互联网安全大会的“创新沙盒”中做候选。

值得关注的是,经统计,本次榜单中的50强企业,在2015年企业安全业务的销售总收入约为180亿元,较为客观真实地反映了中国网络安全自由市场的真实规模。

本榜单全文于2016年6月21日由安全牛微信和网站平台首发,并将面向全球发布英文版,为国内外相关行业和机构了解中国网络安全企业的基本状况提供借鉴与参考。

中国网络安全企业50强

一、50强榜单

阅读全文…

分类: 云安全 标签:

Docker Security: Best Practices for your Vessel and Containers

2016年3月25日 没有评论

Everything you need to know about Docker security.Docker security

 

 新版本可能有些变化。

阅读全文…

CYBERSECURITY MARKET REPORT FROM THE EDITORS AT CYBERSECURITY VENTURES

2016年1月7日 没有评论

According to IDC, the hot areas for growth are security analytics / SIEM (10 percent); threat intelligence (10 percent +); mobile security (18 percent); and cloud security (50 percent). According to a report from Markets and Markets, the cloud security market is expected to be worth $8.7 billion by 2019. //cool

原文在 http://cybersecurityventures.com/cybersecurity-market-report/

阅读全文…

分类: 云安全 标签:

dpdk in docker

2015年12月18日 没有评论

https://github.com/jeremyeder/docker-dpdk

 

As part of our participation in hundreds of open source communities, Red Hat engineers are often involved in research and development efforts that may or may not become a part of Red Hat’s supported offerings.

Intel’s Data-plane Development Kit (DPDK) is a set of libraries and drivers for Linux and BSD built for fast packet processing, for the burgeoning “Network Function Virtualization“, or NFV discipline.  Typical verticals interested in turning Linux boxes into packet-processing machines are telecom, financial services, military, energy research, datacenter operators, internet service providers and many more.

阅读全文…

分类: 云安全 标签: ,

docker 基础技术 基础知识学习站

2015年12月17日 没有评论

http://coolshell.cn/tag/docker 看docker基础技术系列文章

自己去找吧,作者写的不错,虽然在安全方面有一些待探讨的地方

FreeBSD Jails feature

2015年12月17日 没有评论

窃以为docker是和freebsd jail很类似的东西,更详细的看 https://wiki.freebsd.org/Jails 和 https://www.freebsd.org/cgi/man.cgi?jail

Considered stable technology, since it is a feature inside FreeBSD since 4.0;
It takes the best of ZFS filesystem at the point where you could clone jails and create jail templates to easily deploy more jails. Some more ZFS madness;
Well documented, and evolving;
Hierarchical Jails allow you to create jails inside a jail (we need to go deeper!). Combine with allow.mount.zfs to achieve more power, and other variables like children.max do define max children jails.
rctl(8) will handle resource limits of jails (memory, CPU, disk, …);
FreeBSD jails handle Linux userspace;
Network isolation with vnet, allowing each jail to have its own network stack, interfaces, addressing and routing tables;
nullfs to help linking folders to ones that are located on the real server to inside a jail;
ezjail utility to help mass deployments and management of jails;
Lots of kernel tunables (sysctl). security.jail.allow.* parameters will limit the actions of the root user of that jail.
Maybe, FreeBSD jails will extend some of the VPS project features like live migration in a near future.
There is some effort of ZFS and Docker integration running. Still experimental.
Alternatives: FreeBSD VPS project

Docker Container Break-out Exploit

2015年12月17日 没有评论

Amidst various blog postings on Docker, a security issue announced yesterday that detailed an exploit of Docker that makes it possible to do container breakout. This exploit would allow the ability to any data, including sensitive data, on the host system.

How does it work? Essentially, the file system struct of the container is shared with the host which allows a program on the container to run that can open file handles– which consist of a 64-bit string and a 32-bit inode number. Starting at an inode value of 2, which is / (root filesystem), the file system path is then walked and the use of brute force the 32-bit inode number to find the desired file.

The code to test this, shocker.c, which was developed by Sebastian Krahmer (Thank you!) can be used to demonstrate this exploit, and indeed I was able to:

阅读全文…

Back to 28: Grub2 Authentication 0-Day

2015年12月16日 没有评论

原文在 http://hmarco.org/

http://hmarco.org/bugs/CVE-2015-8370-Grub2-authentication-bypass.html

阅读全文…

分类: 云安全 标签: ,

hypervisor security

2015年12月16日 没有评论

https://raw.githubusercontent.com/citypw/security-regression-testing-for-suse/master/other/vulns_hardening_assessment.log 干货

更多信息 http://www.solidot.org/story?sid=42174