unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
DEF CON 32 – AppSec Village – Your CI CD Pipeline Is Vulnerable, But It’s Not Your Fault
Authors/Presenters:Elad Pticha, Oreen LivniOur sincere appreciation to DEF CON, and t...
2024-10-22 23:0:0 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
presenters
youtube
nocookie
vegas
publishing
The Power of Taint Analysis: Uncovering Critical Code Vulnerability in OpenAPI Generator
The OpenAPI Generator is a popular tool with more than 20k stars on GitHub that allows users to aut...
2024-10-22 23:0:0 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
openapi
sonarcloud
taint
security
Best Cybersecurity Metrics to Use in the Boardroom | Kovrr
The Challenge of Elevating Cyber Risk Into the Boardroom As the cost and frequency of cyber eve...
2024-10-22 22:31:34 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
cisos
exposure
ciso
security
MixMode Recognized By USA Today As One Of The Top 10 AI Companies To Watch in 2024
Karen BuffoKaren Buffo is the Chief Marketing Officer (CMO) at MixMode. In this role,...
2024-10-22 22:15:3 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
mixmode
threats
buffo
karen
SOC 2 Compliance Requirements and Criteria
Meeting SOC 2 standards demonstrates your commitment to security and boosts trust—especially when y...
2024-10-22 21:58:50 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
security
legit
pii
firm
auditors
Russian Disinformation Group Behind Bogus Walz Conspiracy: Report
A Russian disinformation group reportedly was behind a false conspiracy targeting Democratic vice p...
2024-10-22 21:30:40 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
russia
1516
walz
harris
trump
ShadyShader: Crashing Apple M-Series Devices with a Single Click
IntroductionA while ago, we discovered an interesting vulnerability in Apple’s M-series chips that...
2024-10-22 21:0:57 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
shader
shadyshader
crash
crashing
loops
SailPoint Adds Raft of Capabilities to Better Manage Privileges
SailPoint Technologies today added a bevy of capabilities that makes it possible for organizations...
2024-10-22 21:0:29 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
identities
sailpoint
machine
security
atlas
Putting the “R” back in GRC – Insights from Gartner on Emerging Cyber GRC Technologies
Cyber GRC (Governance, Risk, and Compliance) tools are software solutions that help...
2024-10-22 20:35:10 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
cybersaint
governance
grc
centralized
siddiqui
Proofpoint Alternatives and Competitors: Find the Best
Reading Time: 6 minPowerDMARCValimaildmarcianEasyDMARCSendmarcDMARCLYSimple DMARCDMARC R...
2024-10-22 14:21:31 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
dmarc
proofpoint
security
powerdmarc
OWASP Mobile Top 10 2024: Update Overview
75% of Mobile Apps Fail Basic Security Tests. Hackers are increasingly focusing on the mobile chann...
2024-10-22 13:40:47 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
security
pii
developers
inadequate
Identity Revolution: Welcome to the Dynamic World of IAM 360
Identity Revolution: Welcome to the Dynamic World of IAM 360madhavTue, 10/22/2024 – 0...
2024-10-22 13:2:2 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
cpl
thalesgroup
thales
revolution
ISO 27001 Certification: A Detailed Guide on How to Get Certified
Editor’s note: This blog post is an excerpt from our eBook, Getting to Know the ISO 27001 Standard...
2024-10-22 10:23:21 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
security
isms
27001
objectives
leadership
Inside the Dark Web: How Threat Actors Are Selling Access to Corporate Networks
In recent weeks, underground forums on the dark web have continued to flourish as bustling marketpl...
2024-10-22 07:56:5 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
sectors
forums
underground
attackers
Are Leaders Ready to Break the Ransomware Cycle
It is good to see US government leaders realize thatransomware is a growing existent...
2024-10-22 05:1:0 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
ransomware
security
insurance
extortion
attacker
USENIX NSDI ’24 – DISTMM: Accelerating Distributed Multimodal Model Training
Authors/Presenters:Jun Huang, Zhen Zhang, Shuai Zheng, Feng Qin, Yida WangOur sincere...
2024-10-22 05:0:0 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
youtube
usenix
presenters
21st
qin
Types of Security Audits: Overview and Best Practices
Cybersecurity audits are key to maintaining compliance with regulations and upholding a strong secu...
2024-10-22 03:51:52 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
security
audits
posture
FedRAMP Certification and Compliance: What It Is and Why It Matters
Cloud technologies increase access to information, streamline communication between government agen...
2024-10-22 03:49:52 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
fedramp
security
cloud
3pao
jab
Survey Surfaces Depth and Scope of Identity Management Challenge
A survey of 510 IT security and risk practitioners finds 93% have access to a comprehensive invento...
2024-10-22 03:41:50 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
security
identities
cloud
respondents
finds
USENIX NSDI ’24 – Accelerating Neural Recommendation Training with Embedding Scheduling
Authors/Presenters:Chaoliang Zeng, Xudong Liao, Xiaodian Cheng, Han Tian, Xinchen Wan,...
2024-10-22 03:0:0 | 阅读: 7 |
收藏
|
Security Boulevard - securityboulevard.com
presenters
youtube
usenix
symposium
21st
Previous
28
29
30
31
32
33
34
35
Next