Skip to content
Levange is a venture-studio journal on AI product strategy, growth engineering, and data-driven design. - levange

levange

  • Home
  • Technological Innovation
Subscribe

Technology

  • Home
  • Technology
  • Page 2
Posted inTechnology

CVE vs NVD: Understanding the Relationship Between Common Vulnerabilities and Exposures and the National Vulnerability Database

CVE vs NVD: Understanding the Relationship Between Common Vulnerabilities and Exposures and the National Vulnerability Database In the field of cybersecurity, two names often appear together: CVE and NVD. While…
Posted by levange 2025年10月18日
Posted inTechnology

Effective SIEM Security: Strengthening Defenses with Proactive Monitoring

Effective SIEM Security: Strengthening Defenses with Proactive Monitoring In today’s threat landscape, SIEM security stands as a cornerstone of enterprise protection. Organizations face a constant barrage of adversary techniques, misconfigurations,…
Posted by levange 2025年10月17日
Posted inTechnology

Elasticsearch and GDPR: Practical Guide for Data Privacy and Compliance

Elasticsearch and GDPR: Practical Guide for Data Privacy and Compliance The combination of powerful search and analytics with elastic data storage creates new opportunities—and new obligations. When your organization uses…
Posted by levange 2025年10月16日
Posted inTechnology

Understanding Website Application Firewall: What It Is, Why It Matters, and How to Use It

Understanding Website Application Firewall: What It Is, Why It Matters, and How to Use It A website application firewall, commonly known as a WAF, is a security layer designed to…
Posted by levange 2025年10月15日
Posted inTechnology

Containerization Best Practices for Modern Applications

Containerization Best Practices for Modern Applications Containerization has transformed how software is developed, packaged, and operated. By encapsulating applications and their dependencies into portable units, teams can achieve faster delivery,…
Posted by levange 2025年10月14日
Posted inTechnology

CVSS v2 vs CVSS v3: Differences, Scoring, and Practical Implications

CVSS v2 vs CVSS v3: Differences, Scoring, and Practical Implications The Common Vulnerability Scoring System (CVSS) is a standardized framework used to rate the severity of software vulnerabilities. Over the…
Posted by levange 2025年10月13日
Posted inTechnology

DevOps Security: Integrating Security into CI/CD and Beyond

DevOps Security: Integrating Security into CI/CD and Beyond In modern software delivery, DevOps security is not optional; it is a competitive necessity. Teams that weave security into the daily cadence…
Posted by levange 2025年10月12日
Posted inTechnology

A Practical Guide to AWS Cybersecurity: Protecting Your Cloud Infrastructure

A Practical Guide to AWS Cybersecurity: Protecting Your Cloud Infrastructure In today’s digital landscape, organizations moving workloads to Amazon Web Services (AWS) gain scale and agility, but they also inherit…
Posted by levange 2025年10月11日
Posted inTechnology

Nazar Ring: Meaning, Design, and How to Wear the Evil Eye Symbol

Nazar Ring: Meaning, Design, and How to Wear the Evil Eye Symbol The Nazar Ring, often known as the evil eye ring, has charmed jewelry lovers around the world for…
Posted by levange 2025年10月5日
Posted inTechnology

Understanding the Vulnerability Scanning Process: A Practical Guide

Understanding the Vulnerability Scanning Process: A Practical Guide In today’s increasingly connected world, organizations rely on proactive security measures to protect critical assets. The vulnerability scanning process is a foundational…
Posted by levange 2025年10月4日

Posts pagination

Previous page 1 2 3 4 … 9 Next page

Recent Articles

  • TP-Link VX220-G2V: A Practical Guide to Setup, Use, and Performance
  • What Is Blockchain? A Practical Guide for the Curious
  • TL-WA850RE Setup: A Practical Guide to Extending Your WiFi
  • Understanding the Box Plot Meaning: A Practical Guide for Readers and Analysts
  • 英文标题

Classification

  • Technology
Scroll to Top