wireless sgx
Работа с индикаторами компрометации
CTT Downloader

The edge is no longer just a server in a regional facility. Today’s edge is a telco tower on a mountain, a 5G small cell on a light pole, or a drone flying over a farm. These environments are physically hostile. An attacker can simply walk up to a remote radio unit (RRU) or a baseband unit (BBU) and plug in a JTAG debugger.

The tower is untrusted. The cabinet is open. The CPU, however, is a fortress.

Wireless SGX: Securing the Edge of the Unconnected World Subtitle: How Hardware Trust Extends Beyond the Data Center

Enter .

wireless sgx
Основные функции
wireless sgx
Загрузка индикаторов компрометации по REST API из источников данных
wireless sgx
Конвертирование индикаторов, загруженных из источника, в формат JSON, CSV
wireless sgx
Фильтрация индикаторов по: требуемому набору полей, индикаторам с заданными тегами и т.д
wireless sgx
Сохранение загруженных данных на локальном на диске

Wireless Sgx -

The edge is no longer just a server in a regional facility. Today’s edge is a telco tower on a mountain, a 5G small cell on a light pole, or a drone flying over a farm. These environments are physically hostile. An attacker can simply walk up to a remote radio unit (RRU) or a baseband unit (BBU) and plug in a JTAG debugger.

The tower is untrusted. The cabinet is open. The CPU, however, is a fortress.

Wireless SGX: Securing the Edge of the Unconnected World Subtitle: How Hardware Trust Extends Beyond the Data Center

Enter .