unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Steps Organizations Can Take to Improve Cyber Resilience
Organizations’ devices, data and digital security infrastructure are constantly under threat fro...
2024-11-8 17:53:38 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
resilience
security
threats
leaders
The CISO Evolution: From Tactical Defender to Strategic Business Partner
The chief information securit...
2024-11-8 17:0:49 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
security
cisos
riemer
officer
leaders
What is Software Composition Analysis and It’s Importance?
Software composition analysis (SCA) is a cybersecurity process that provides an in-depth examina...
2024-11-8 16:44:56 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
software
security
analysis
composition
Highlights from the InCyber Montreal Forum
I had a tremendous time at...
2024-11-8 07:2:0 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
incyber
security
montreal
japan
speakers
From Data to Cloud: Bridging Security Gaps with DSPM and CSPM
Over the past few years, busi...
2024-11-8 06:39:0 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
security
cspm
dspm
bridging
DEF CON 32 – QuickShell Sharing Is Caring About RCE Attack Chain On QuickShare – Or Yair, Shmuel Cohen
Thursday, November 7, 2024...
2024-11-8 04:0:0 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
security
network
webinars
yair
The Future of Work: Understanding AI Agents and Digital Coworkers
The workplace is transformin...
2024-11-8 03:9:51 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
agents
coworkers
robots
humans
The Global Effort to Maintain Supply Chain Security | Part Two
Various Cybersecurity Experts, CISO GlobalNovember 7, 2024A well-run kitchen requires a...
2024-11-8 03:3:44 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
security
kitchen
ingredients
ciso
software
A Critical Guide to Securing Large Language Models
A Critical Guide to Securing...
2024-11-8 02:7:40 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
ciphertrust
encryption
llms
cte
thales
Randall Munroe’s XKCD ‘Probabilistic Uncertainty’
via the c...
2024-11-8 02:0:0 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
xkcd
marc
permalink
syndicated
handelman
Bot Attacks Are Coming to Town: How to Safeguard Your Customers’ Holiday Travel
The Importance of Customer Security for Travel PlatformsPurchasing a plane ticket, booking a hotel...
2024-11-8 01:36:54 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
travel
phishing
threats
datadome
signals
Fortinet Extends Generative AI Reach Across Portfolio
Fortinet today extended the reach of its generative artificial intelligence (AI) capabilities to...
2024-11-8 01:27:25 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
agents
generative
employing
maddison
The Story of BIX, a Specialized AI Agent for Cybersecurity, Built with NVIDIA AI
BIX isn’t just an AI assistan...
2024-11-8 00:46:47 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
balbix
bix
changer
reduction
gaurav
DEF CON 32 – Windows Downdate: Downgrade Attacks Using Windows Updates
Authors/Presenters: Alon Levi...
2024-11-8 00:0:0 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
youtube
presenters
authored
handelman
CVE-2024-38213: From Crumbs to Full Compromise in a Stealthy Cyber Attack
Threat actors are becoming increasingly creative, using vulnerabilities to infiltrate organizations...
2024-11-7 23:37:33 | 阅读: 22 |
收藏
|
Security Boulevard - securityboulevard.com
38213
malicious
windows
veriti
AppOmni and Cisco Partner to Extend SaaS Security with End-to-End Zero Trust From Endpoint to the Application
Cisco selects AppOmni to join its Global Price List as part of its SolutionsPlus Program for eas...
2024-11-7 23:32:11 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
appomni
security
partnership
principles
Prevent Security Breaches in Self-Hosted Environments with GitGuardian’s Custom Host for Validity Checks
As organizations grow more complex, secrets are increasingly leaking at various stages of the S...
2024-11-7 23:30:40 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
validity
security
gitguardian
noise
bitbucket
A Beginner’s Guide to PCI DSS 4.0: Requirements 1-4
Valid card data is highly...
2024-11-7 23:30:0 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
comforte
dss
security
40bn
onerous
Shifting Left for Proactive IT Security and ITSM
As organizations prioriti...
2024-11-7 23:15:0 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
security
itsm
cimcor
proactive
shifting
Adversary AI Threat Intelligence Content Added to the Tidal Cyber Knowledge Base
GenAI has become more preva...
2024-11-7 23:0:0 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
tidal
rachel
repository
threats
Previous
12
13
14
15
16
17
18
19
Next