Database Hardening
Nowadays, any serious application needs a database to store information. DBMS allows you to save data, quickly find and retrieve what you need using queries. But in order…
Nowadays, any serious application needs a database to store information. DBMS allows you to save data, quickly find and retrieve what you need using queries. But in order…
The "Platform Engineering" trend proposed by analytical agencies has become interesting not only to companies that transform their processes, teams, and tools according…
Methods for detecting malicious code are improving, as is the malicious code itself. In the past, antivirus systems used signature analysis to detect viruses, but now…
My team and I decided to create a cloud. Not the kind of cloud that says "move your files to the cloud," and not even the kind that says "deploy your site on our CMS,…
My name is Damir Gibadullin, product manager of the "Digital Headquarters" system. My experience in selling IT solutions and broad outlook have combined and crystallized…
Quantum key distribution [1] is one of the most rapidly developing areas in modern science. The most important advantage of QKD is the security of personal data transmission…
I have already done material on domestic NGFW from one of the cyber security companies, so I decided to continue the practice and talk about other NGFWs. And in May 2024…
Recently, I finally got around to studying Wazuh - to make the learning process useful, I set it up for testing in a small hospital and identified the tasks it should…
Immediately after the laws on changing the laws on liability for improper handling of personal data were passed, we at IDX, like everyone who deals with personal data,…
The Gramota.ru portal claims that "A layout is an object that accurately reproduces in a reduced size or full size any other object."
Hello, tekkix! We at the Security Analysis Department of the "Astra Group" recently had our first experience participating in the Big Mathematical Workshop, and we would…
Hello! Today we continue to implement encryption. In this article, we will look at the Magma cipher algorithm, which was developed and used in the USSR.
Over the past decade, we have realized that manually performing investigation and response processes limits us in speed, which greatly affects our ability to handle the…
On the vast expanses of the network, you can find many publications on the topic of conducting various pentests: stages, tools used, results obtained, reporting, etc.
Why securely erase data at all? The main thing is that the user cannot retrieve it through the DBMS interface. Who cares about data remnants in files, it's not a problem.…
In this article, I will talk about a relevant issue for many — migration from UserGate 6 to version 7. After the departure of foreign developers from the Russian market,…
There are currently many debates and discussions about the future of C++.
The very first Samsung rugged device appeared back in 2011. It looks like a reinforced case and a replaceable battery, which extends the life of the smartphone, but it's…