unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
RF Fortune Telling: Frequency Hopping Predictability
In the world of wireless communications, security vulnerabilities in implemented protocols canre...
2024-11-26 10:18:3 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
hopping
security
prng
attacker
11 Tips to Streamline Your Data Center Operations with DCIM Software
Managing a data center is a complex task, requiring seamless coordination of resources, equipment,...
2024-11-26 09:9:44 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
dcim
software
asset
cooling
maintenance
Understanding the NYDFS Cybersecurity Regulation
Whether you’re a small financial service provider or a major institution, if you’re doing busine...
2024-11-26 05:57:44 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
nydfs
security
regulation
york
CMMC Compliance Requirements: A Complete Guide
Department of Defense (DoD) data is some of the most sensitive out there. That’s why the DoD des...
2024-11-26 05:56:55 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
cmmc
dod
security
threats
What Is CI/CD Security? Risks and Best Practices
Continuous integration and continuous delivery (CI/CD) pipelines are invaluable in software deve...
2024-11-26 05:23:24 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
security
stage
pipelines
legit
Life in the Swimlane with Dylan Dartnell, Professional Services Engineer
Welcome to the “Life in the Swimlane” blog series. Here we will feature interviews with Swimlaners...
2024-11-26 05:9:23 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
swimlane
passionate
teaching
security
mountains
DEF CON 32 – From Getting JTAG On The iPhone 15 To Hacking Apple’s USB-C Controller
Monday, November 25, 2024...
2024-11-26 04:0:0 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
security
network
webinars
presenters
You Have Less Than Two Months to Become DORA Compliant
If you represent a financial services company that is based in the European Union or does busine...
2024-11-26 03:14:29 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
dora
azul
compliant
ict
security
5 Traditional Approaches to Generating Test Data
“As a rule, software systems...
2024-11-26 03:5:36 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
mock
dummy
software
subsetting
development
Machine Learning in Cyber Security: Harnessing the Power of Five AI Tribes
Machine learning algorithms form a critical defense mechanism against cyber threats, enhancing t...
2024-11-26 02:2:8 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
security
machine
tribes
reasoning
analogizers
Randall Munroe’s XKCD ‘Arizona Chess’
via the c...
2024-11-26 02:0:0 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
xkcd
comic
wit
permalink
3014
The Quest to Minimize False Positives Reaches Another Significant Milestone
It was just a few months ago that we announced GitGuardian's bespoke machine learning model, FP...
2024-11-26 01:9:54 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
positives
remover
gitguardian
precision
security
Privileged Account Security in Active Directory
Privileged accounts in Active Directory (AD) are the keys to your organization’s most sensitive...
2024-11-26 00:1:3 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
privileged
security
enzoic
passwords
monitoring
DEF CON 32 – Behind Enemy Lines: Going Undercover To Breach LockBit Ransomware Op
Monday, November 25, 2024...
2024-11-26 00:0:0 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
security
webinars
network
presenters
boulevard
OWASP Top 10 for LLM adds risks: Get on target to secure your AI models
An updated version of the OWASP Top 10 for LLM Applications has been released, with a key outli...
2024-11-25 23:35:27 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
llm
security
deepfake
threats
bleeker
How to Read, Review, and Analyze a SOC 2 Report
We get it – the hype surrounding the infamous SOC 2 compliance report is real. But trust us: ge...
2024-11-25 23:12:11 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
security
opinion
auditor
scytale
assertion
Huge Leak of Customer Data Includes Military Personnel Info
A company with a California address that runs an online promotional gift platform exposed emails...
2024-11-25 23:7:1 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
military
cybernews
exposure
enamelpins
emblems
Walking the Walk: How Tenable Embraces Its “Secure by Design” Pledge to CISA
As a cybersecurity leader, Tenable was proud to be one of the original signatories of CISA’s “Secur...
2024-11-25 22:0:0 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
security
tenable
pledge
passwords
In a Growing Threat Landscape, Companies Must do Three Things to Get Serious About Cybersecurity
Every enterprise should see itself as a cybersecurity company. It doesn’t matter what industry t...
2024-11-25 21:44:39 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
security
ciso
leaders
posture
Better Prioritization and Network Clarity Can Close the Gap Between Application Security and Speed
Organizations striving to stay ahead in the digital landscape often crown speed and agility as t...
2024-11-25 21:30:38 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
security
centric
network
software
Previous
-16
-15
-14
-13
-12
-11
-10
-9
Next