unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Why Zero Trust is a Must for Strong Corporate Governance
Gone are the days of delegating technology and cybersecurity concerns to be solved sole...
2024-4-26 04:0:55 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
governance
csf
strategic
leadership
Securing CI/CD Pipelines: The Role of Workload Identity Federation
Increased Attack SurfaceLong-lived credentials stored in CI/CD pipelines increase an organization’...
2024-4-26 03:50:21 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
workload
federation
lived
security
pipelines
Quick Guide to the OWASP OSS Risk Top 10
CVEs, or known and cataloged software vulnerabilities, dominate the discussion about open source so...
2024-4-26 03:7:53 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
developers
security
software
cves
N.A. Developers Optimistic About Generative AI and Code Security
Developers in North America are more likely than their counterparts in other regions to see generat...
2024-4-26 03:0:0 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
generative
development
security
developers
USENIX Security ’23 – LibScan: Towards More Precise Third-Party Library Identification for Android Applications
Authors/Presenters: *Yafei Wu, Cong Sun, Dongrui Zeng, Gang Tan, Siqi Ma, Peicheng Wang...
2024-4-26 03:0:0 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
security
youtube
usenix
siqi
cong
Defending Against ArcaneDoor: How Eclypsium Protects Network Devices
IntroductionIn coordination with multiple government agencies, Cisco announced yesterday the disco...
2024-4-26 02:59:16 | 阅读: 14 |
收藏
|
Security Boulevard - securityboulevard.com
arcanedoor
network
security
eclypsium
dancer
MDR Can Make an Impact on Cyber Insurance
Over the past few years, cyberattacks have increased in number and complexity, and the cost to rec...
2024-4-26 02:58:14 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
mdr
insurance
insurers
dwell
cyberattack
AI Adoption Prompts Security Advisory from NSA
The National Security Agency (NSA) has issued a report warning of the risks from insecurely deploye...
2024-4-26 02:39:24 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
security
fowler
christman
crucial
AI Data Poisoning: How Misleading Data Is Evading Cybersecurity Protections
You’d be hard-pressed to find a cybersecurity provider that doesn’t tout its AI-based defenses as a...
2024-4-26 02:38:15 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
security
kasada
harvested
poisoning
defenses
Nemesis 1.0.0
In August of last year, @tifkin_, @0xdab0, and I released Nemesis, our offensive data enrichment pl...
2024-4-26 02:28:18 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
nemesis
helm
chart
hasura
c2
How Momentum is Building for the US Government to Play a Larger Role in Protecting K12 Schools from Cyberattacks
Ransomware (a type of malicious software designed to block access to a computer system or encrypt f...
2024-4-26 02:24:52 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
schools
security
k12
council
The Role of Threat Intelligence in Financial Data Protection
As the financial industry increasingly adopts digital processes, it faces a growing array of cybers...
2024-4-26 01:3:50 | 阅读: 8 |
收藏
|
Security Boulevard - securityboulevard.com
security
threats
monitoring
Randall Munroe’s XKCD ‘Pendulum Types’
Community Chats Webinars LibraryHomeCybersecurity NewsFeaturesIndustry SpotlightNews R...
2024-4-26 01:0:0 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
security
webinars
boulevard
usenix
Architecting Cyber Resilience: Building Your Breach and Attack Simulation Program
In recent years, breach and attack simulation (BAS) has gained significant traction among enterpri...
2024-4-26 00:32:52 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
security
bas
safebreach
regeneron
humana
Watch: “Behavior Doesn’t Lie:” The Power of ML for Identity Threat Detection and Response
Traditional security controls like MFA and PAM are bypassed easily by threat actors on a regular b...
2024-4-25 23:54:34 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
security
jim
pam
combat
accurately
Sonatype Lifecycle best practices: Getting started and managing SBOMs
Community Chats Webinars LibraryHomeCybersecurity NewsFeaturesIndustry SpotlightNews R...
2024-4-25 23:36:16 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
security
webinars
ciso
boulevard
It’s All About Data: How to Drive Secure Use of AI
Although artificial intelligence (AI) has been with us for some time, the technolog...
2024-4-25 22:42:11 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
comforte
network
estimates
competitive
Navigating the Evolving Threat Landscape: Addressing 2024 CISO and Security Team Goals with MixMode
Joe Ariganello VP of Product Marketing Joe is the VP of Product Marketing at MixMode....
2024-4-25 22:0:0 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
mixmode
security
cisos
joe
The Ultimate Guide to Excelling in Your External Audit: 5 Proven Strategies
Have you ever navigated an external or third-party audit? What sets these audits apart is their ind...
2024-4-25 21:59:47 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
security
audits
auditors
Episode 16
JOIN US FOR AN EVENING OF THREAT HUNTING FUN!Cyborg Security has launched a podcast wi...
2024-4-25 21:25:13 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
security
cyborg
woods
hunters
evening
Previous
134
135
136
137
138
139
140
141
Next