企业不愿与业内竞争对手分享网络威胁信息。
Companies hesitate to share cyber threat information with industry competitors.
注:IACI旨在帮助人们解决网络安全威胁信息方面的挑战。
Note: IACI is designed to help people solve the challenges of network security threat information.
最后的条件是这中搭便车行为必须显著削弱对信息收集的刺激,并因此威胁信息的质量和存在。
Finally, the free-riding must significantly reduce the incentive to gather information, and so threaten its quality or existence.
最新:这些黑客们可能以为他们正在攻击CNN的网站,因为在早些时候的威胁信息中曾炫耀过这件事。
Update: It's possible that the hackers actually thought they were taking down CNN's sports site, based on early Twitter messages about it.
千万不要理睬如下信息或公告栏的内容:暗示信息、挑衅信息、威胁信息……它们会让你感到不舒服的。
Never respond to messages or bulletin board items that are: suggestive, belligerent, threatening... They will make you feel uncomfortable.
和动物一样,人类进化出了一套复杂的机制,来处理有关潜在威胁的信息。
Like animals, humans evolved with an elaborate mechanism for processing information about potential threats.
信息时代的代工厂有一天也会处于相似的威胁下吗?
Might the foundries of the information age one day be under a similar threat?
电影中不仅这座捷克核电站被描述成对奥地利的威胁,而且事件发生后捷克官方还向邻国隐瞒了重要的信息。
Not only is the Czech plant portrayed as a menace to Austrians, but the Czech authorities withhold vital information from their neighbours after the accident.
该协议涵盖企业安全,并呼吁支持信息技术服务,对新出现的网络威胁和网络入侵提高认识。
The agreement covers enterprise security and calls for support of information technology services that improve awareness of emerging cyber threats and network intrusions.
他认为,面孔辨认软件和云计算的对个人隐私的威胁越来越大。云计算——有能力将大量信息储存在数据中心。
He sees increasing threats to privacy in facial recognition software and cloud computing — the ability to store huge amounts of information in data centers.
大湖渔业委员会的新闻发言人马克盖登表示,新的项目将致力于消除加拿大和美国两个项目的差别,并对鲤鱼威胁提供新的信息。
The new project will aim to resolve differences between them while yielding new information about the carp threat, said Marc Gaden, spokesman for the Great Lakes Fishery Commission.
通常,开发人员不认为移动云能免受安全威胁,就如同他们不认为其他任何信息技术(IT)模式能支持业务一样。
Generally, developers don't expect the mobile cloud to be free from security threats any more than they expect that of any other information technology (it) model used to support business.
除了认证问题外,能够对数据库服务器的安全形成威胁的还包括对敏感信息未经授权的访问。
In addition to authentication issues, threats to the security of a database server involve unauthorized access to sensitive information.
人们容易把注意力集中在具有潜在威胁的信息上,这是合乎逻辑的。
It is logical that attention would be focused on potentially threatening information, "says Kensinger."
他们担心这种信息可能会被用来威胁他们。
They fear that sort of information could be used against them.
将会接受生命周期的早期产生的反馈信息(反映系统资产、漏洞、威胁、策略和管理方面的的重大更改),从而继续该过程。
The process continues with feedbacks from earlier stages of the life cycle in response to economically significant changes in systems assets, vulnerabilities, threats, policies, and regulations.
即使在IUCN的名录上,也有14%的物种因缺乏足够的信息而无法评估它们在野外的生存状况(即受威胁的等级)。
Even among those on the IUCN's list, 14 percent lack enough information to judge their health (or threat level) in the wild.
你已经说过了,事后想来,你可以看到这些信息有要求或威胁或激起了我们看到的那些袭击。
And you've said, with hindsight, you could see those messages as having called for or threatened or inspired the very attacks that we saw.
如果恶意用户获得了这些密钥信息,那么主机的安全性就很容易受到威胁。
If a malicious user gets hold of this key information, then the security of that host machine can be compromised very easily.
死亡威胁、恐吓信息,已经成为哥伦比亚乡野日常生活中可怕的一景。
Death threats and menacing messages are a grim part of everyday life in rural Colombia.
既然SAML是一种多方验证和授权系统,一个SAML事务中的合法参与者就有可能是用对其他事务有威胁的信息。
Given that SAML is a multi-party authentication and authorization system, it's possible for a valid participant in an SAML transaction to use the information maliciously in another transaction.
您也可以在得使您相信有人试图威胁系统安全的信息后,执行审计。
You can also perform an audit after receiving information that would lead you to believe someone is trying to compromise the security of your system.
通过对威胁和脆弱点的深入观察,他提醒人们,缺乏适当的保护可能会造成信息破坏。
Taking a deeper look at threats and vulnerabilities, he cautions on the possibility of information being compromised without proper safeguards in place.
在考虑脚本kiddy 的威胁时,应该谨慎考虑可能的攻击目标,这一信息可以为保护您或您的组织提供重要帮助。
When considering script kiddies as threats, carefully consider what their goals may be. This information can yield valuable intelligence on how to protect yourself or your organization.
在考虑脚本kiddy 的威胁时,应该谨慎考虑可能的攻击目标,这一信息可以为保护您或您的组织提供重要帮助。
When considering script kiddies as threats, carefully consider what their goals may be. This information can yield valuable intelligence on how to protect yourself or your organization.
应用推荐