×

You are using an outdated browser Internet Explorer. It does not support some functions of the site.

Recommend that you install one of the following browsers: Firefox, Opera or Chrome.

Contacts:

+7 961 270-60-01
ivdon3@bk.ru

  • Analysis of current threats and development of approaches to the protection of web applications

    The article analyzes the current threats and vulnerabilities of web applications. Based on the analysis, approaches to protection and recommendations for ensuring the security of web applications are proposed, taking into account current challenges and problems. The article may be useful for information security specialists, software developers and heads of organizations interested in the security of web applications being developed or used.

    Keywords: cyber threat, cyber attack, exploitation of web vulnerabilities, web application

  • Security features of cloud systems

    The article analyzes the features of the protection of modern cloud systems and the distribution of responsibility between the interacting parties, and offers recommendations for improving the security of cloud resources. Based on the analysis, comprehensive protection measures and recommendations for improving the security of cloud resources are proposed, which can be useful to information security specialists and IT specialists to understand the features of protecting cloud systems, as well as in choosing a cloud provider and preparing for the transition to the cloud.

    Keywords: cloud computing, cloud provider, shared responsibility model, cloud resource security