You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Imagine that a malicious whistleblower sends us a malicious file (pdf, excel, javascript, payloads, or any type of malicious code) that can compromise the security of our servers.
Does GlobaLeaks include a sandbox to review malicious files uploaded by whistleblowers without compromising our servers?
Where can I document myself on these IDS/IPS, SANDBOX security features implemented in GlobaLeaks?
How does the analysis of malicious files work within GlobaLeaks? What is the security architecture focused on the detection and prevention of malicious files?
Can GlobaLeaks be integrated with Google Recaptcha or whatever to prevent the reporting portal from being easily saturated by robots?
reacted with thumbs up emoji reacted with thumbs down emoji reacted with laugh emoji reacted with hooray emoji reacted with confused emoji reacted with heart emoji reacted with rocket emoji reacted with eyes emoji
-
Good morning Rima, Giovanni, sferro,
Imagine that a malicious whistleblower sends us a malicious file (pdf, excel, javascript, payloads, or any type of malicious code) that can compromise the security of our servers.
Does GlobaLeaks include a sandbox to review malicious files uploaded by whistleblowers without compromising our servers?
Where can I document myself on these IDS/IPS, SANDBOX security features implemented in GlobaLeaks?
How does the analysis of malicious files work within GlobaLeaks? What is the security architecture focused on the detection and prevention of malicious files?
Can GlobaLeaks be integrated with Google Recaptcha or whatever to prevent the reporting portal from being easily saturated by robots?
Thank you
Cheers!
Beta Was this translation helpful? Give feedback.
All reactions