asteroza + endpoint   78

GraphQL in a Microservices Architecture – ITNEXT
So, using schema stiching to stitch multiple backend microservices which present their own graphQL endpoints into a single external ingress graphQL endpoint makes client app development much easier.
GraphQL  schema  stiching  single  endpoint  microservice  webdev  devops 
march 2019 by asteroza
Digita Security
GamePlan uses Apple's inbuilt game engine as an endpoint signature logic processor.
mac  OSX  game  logic  rule  eengine  endpoint  signature  security  software 
march 2019 by asteroza
Clever Tool Uses Apple’s Videogame Logic Engine to Protect Macs | WIRED
Using built in game logic rule engine to run endpoint security signature rules is pretty neat. But, for a second there, I thought they were doing some kind of deception network thing, or using game AI to go threat hunting...
mac  OSX  security  blueteam  defense  game  logic  rule  engine  signature  endpoint 
march 2019 by asteroza
G Suite Updates Blog: Control access to corporate data on Chrome, Mac, and Windows devices with endpoint verification
There's a helper app for windows and mac to do endpoint verification, beyond the chrome browser extension. This allows registering and managing access.
google  cloud  endpoint  registration  verification  sysadmin  device  management  security 
march 2019 by asteroza
Windows 10 connection endpoints | Microsoft Docs
Wow, nice concentration of windows 10 telemetry endpoints
windows  10  telemetry  endpoint  list  DNS  FQDN  name 
july 2018 by asteroza
Endpoint Verification - Chrome Web Store
Google now has an endpoint scanner as a chrome plugin ( native app install...) to do health checks of BYOD devices before accessing Gsuite stuff.
google  security  BYOD  health  check  test  chrome  browser  plugin  addon  extension  endpoint  verification  OS  status  inventory  asset  management  monitoring 
july 2018 by asteroza
Introducing DNS Resolver for Tor
Hrm, interesting, but that then could tie two circuits together for correlation...
cloudflare  Tor  DNS  endpoint  hidden  service  internet  infrastructure  server 
june 2018 by asteroza
AWS PrivateLink Update – VPC Endpoints for Your Own Applications & Services | AWS News Blog
Custom endpoints for when you span multiple AWS accounts and multiple VPC environments. Also provides some isolation.
AWS  custom  VPC  API  endpoint  network  networking  webAPI  security  private  cloud 
december 2017 by asteroza
Kolide - Your infrastructure as a database
Based on osquery, the facebook opensource endpoint monitoring agent.
cloud  service  endpoint  monitoring  logging  Delicious 
september 2016 by asteroza
The Tor exit node of | Hints for Tor Users
Apparently even more tor exit nodes have become actively hostile with XMPP MitM, so these guys built a hidden service endpoint for your XMPP needs...
tor  MitM  XMPP  hidden  service  exit  node  endpoint  security  Delicious 
june 2016 by asteroza
OnionCat | An Anonymous VPN-Adapter
IPv6 overlay VPN between two tor hidden service endpoints, so it sorta lets you do UDP over tor, at least to the other VPN endpoint. What happens after is up to the endpoint though.
tor  VPN  software  hidden  service  endpoint  IPv6  overlay  UDP  Delicious 
march 2016 by asteroza
Alternate TP-Link portable network router firmware to enforce security/privacy, and to have an airtight TOR entrance gateway.
opensource  software  security  OpenWRT  wifi  wireless  network  router  firmware  OS  research  TOR  VPN  endpoint  portal  TP-link  Delicious 
august 2014 by asteroza
My エンドポイントプロテクター | アップタウン株式会社
Apparently these guys are teaming up with a Romanian security company to deliver a cloud DLP security service. Easier said than done, in terms of OS stability, unless you do some really brutal device control tricks and even then the reliability is so-so. The price is right for cheapskate companies that don't know better though.
japan  cloud  ASP  security  service  DLP  data  loss  prevention  software  agent  windows  mac  OSX  CoSoSys  endpoint  protector  SaaS  Delicious 
june 2010 by asteroza

related tags

acceptable  access  account  active  ActiveSentry  AD  addon  AEPnetworks  agent  AI  AirWalk  amazon  analysis  analytics  analyzer  antimalware  antispyware  antivirus  API  appliance  application  articles  ASP  asset  audit  auditing  AUP  automation  AWS  azure  base  behavior  behavioral  bigbrother  Bit9  BlackDog  blacklist  block  blocker  blocking  blueteam  bluetooth  Bromium  browser  BYOD  case  CD  CDMA  CDN  cellular  certificate  check  chrome  CIPA  client  clipboard  cloud  cloudflare  compiled  compliance  computing  console  container  content  ContextIQ  control  Controlguard  controls  corporate  CoSoSys  CPS  custom  data  database  debug  debugging  decompilation  defense  Delicious  desktop  detection  development  device  devices  devops  DFIR  Digital  directory  DLP  DNS  drive  EdgePoint  EDS  eengine  electronics  email  encrypted  encryption  endpoint  enforcement  engine  enterprise  EPS  EV-DO  event  exit  extension  extrusion  facebook  femtocell  file  filter  filtering  FireEye  firewall  firewire  firmware  flash  forensic  FQDN  framework  free  freeware  game  gateway  global  Glue  google  GraphQL  gray  Guardian  GuardianEdge  guide  hacking  hardware  hash  health  hidden  HIDS  HIPAA  HIPS  host  howto  humor  Huntsman  identity  IDL  IDS  ILP  incident  information  infrastructure  inspection  instrumentation  internet  inventory  IoC  IP  IPS  IPv6  IrDA  isolation  japan  lambda  LAN  laptop  lateral  leak  leakage  least  liability  linux  list  live  lock  log  logging  logic  loss  mac  malware  managed  management  Mandiant  mapping  Marubeni  masking  memory  microservice  MIDL  mitigation  MitM  mobile  monitoring  movement  mSystems  mTrust  NAC  name  NAT  netflow  network  networking  networks  nevironment  node  Oakley  office365  opensource  OpenWRT  Orchestria  OS  OSX  overlay  p2p  packet  patching  PC  pentesting  performance  perimeter  peripheral  phone  platform  plugin  pointsec  policy  port  portable  portal  prevention  print  private  PrivateLink  priveledge  programming  proof-of-concept  proofpoint  protection  protector  proxy  python  quarantine  Raytheon  realtime  recon  Redline  reference  registration  remediation  remote  removable  research  restriction  risk  router  RPC  RSA  rule  S3  SaaS  Sanctuary  sandbox  SANS  scanner  scanning  schema  script  SD  SecureItEasy  security  Senforce  sensor  server  serverless  service  session  sflow  signature  single  sll  sniffing  SNMP  software  solution  SOX  SQL  station  status  stiching  study  Symantec  sysadmin  sysmon  system  technology  telemetry  test  theft  tips  tools  tor  TP-link  tracking  traffic  transceiver  transparency  tricks  tutorial  UDP  USB  use  user  utilities  VDI  Verdasys  Vericept  verification  violation  virtualization  Vista  VM  Vontu  VPC  vpn  web  webAPI  webdev  webfilter  webhook  websense  website  whitelist  whitepaper  wifi  windows  wireless  xen  XMPP  XP  Zecurion  Zlock 

Copy this bookmark: