unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
USENIX NSDI ’24 – Crescent: Emulating Heterogeneous Production Network at Scale
Authors/Presenters:Zhaoyu Gao, Anubhavnidhi Abhashkumar, Zhen Sun, Weirong Jiang, Yi Wa...
2024-10-20 03:0:0 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
usenix
presenters
youtube
abhashkumar
regency
USENIX NSDI ’24 – A High-Performance Design, Implementation, Deployment, and Evaluation of The Slim Fly Network
Authors/Presenters:Nils Blach, Maciej Besta, Daniele De Sensi, Jens Domke, Hussein Hara...
2024-10-19 23:0:0 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
youtube
presenters
usenix
regency
security
Managing Foreign Government Information (FGI) on a Network
If you’re a firm that works with foreign governments, in addition to certifications like ISO 27001...
2024-10-19 07:12:7 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
fgi
marking
security
classified
Pentesting Authentication
Why Pentest Authentication?Authentication controls are the first line of defense to protect applic...
2024-10-19 05:46:6 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
security
bypass
pentesters
Get an Untrusted Security Advisor! Have Fun, Reduce Fail!
Many organizations are looking for trusted advisors, and this applies to our beloved domain of cybe...
2024-10-19 05:35:28 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
security
llms
llm
advisor
genai
Is End-User Cybersecurity Training Useless? Spoiler Alert: It’s Not!
Chris Clements, VP of Solutions Architecture October 18, 2024Because of the frequency of p...
2024-10-19 03:33:40 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
phishing
security
chris
seatbelts
USENIX NSDI ’24 – MESSI: Behavioral Testing of BGP Implementations
Authors/Presenters:Rathin Singha, Rajdeep Mondal, Ryan Beckett, Siva Kesava Reddy Kakar...
2024-10-19 03:0:0 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
presenters
usenix
youtube
nocookie
AI-Generated Personas: Trust and Deception
And the Ethical Dilemma of Using AI to Create Fake Online PersonalitiesIn recent years, advancemen...
2024-10-19 02:36:43 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
personas
ethical
dod
stylegan
moral
Seceon at GITEX Global 2024: Driving Cybersecurity Innovation with Tech First Gulf
In today’s ever-evolving cybersecurity landscape, organizations are grappling with a delicate balan...
2024-10-19 01:53:55 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
seceon
gitex
gulf
efficiency
Daniel Stori’s Turnoff.US: ‘bash-gptl’
via the inimitable Daniel Stori at Turnoff.US!Permalink*** This is a Security B...
2024-10-19 01:0:0 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
turnoff
geek
security
bloggers
USENIX NSDI ’24 – Netcastle: Network Infrastructure Testing At Scale
Authors/Presenters:Rob Sherwood, Jinghao Shi, Ying Zhang, Neil Spring, Srikanth Sundare...
2024-10-18 23:0:0 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
presenters
usenix
shi
youtube
saha
The transformation of open source: Lessons from the past decade
Over the past decade, the world of open source software has undergone a seismic tra...
2024-10-18 22:45:0 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
sonatype
decade
syndicated
network
Celebrating Excellence in Financial Services
Like most businesses, banks are facing a highly competitive future built on digital...
2024-10-18 22:8:12 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
comforte
facing
wealth
stoesser
modernize
Army Cloud Program to Help SMBs Meet DoD Cyber Requirements
The U.S. Army is building a secure cloud environment that small businesses can use to meet increasi...
2024-10-18 21:23:9 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
dod
army
cmmc
dib
Cybersecurity Insights with Contrast CISO David Lindner | 10/18/24
Insight #1: Data breach costs are climbingAccording to IBM’s latest Cost of a Da...
2024-10-18 21:0:0 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
security
insight
leaders
costs
malicious
Cybersecurity Snapshot: Tenable Report Warns About Toxic Cloud Exposures, as PwC Study Urges C-Suite Collaboration for Stronger Cyber Resilience
Check out invaluable cloud security insights and recommendations from the “Tenable Cloud Risk Repor...
2024-10-18 21:0:0 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
security
cloud
benchmarks
software
CISOs Concerned Over Growing Demands of Role
There are growing concerns among chief information security officers (CISOs) about the evolving dem...
2024-10-18 20:50:46 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
cisos
ciso
security
regulatory
Beyond Passwords: Advanced API Authentication Strategies for Enhanced Security
Passwordless authentication for end users is taking the world by storm, offering organizations and...
2024-10-18 18:29:58 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
security
wallarm
openapi
Understanding the Importance of MFA: A Comprehensive Guide
Protecting digital identities is essential for individuals and organizations in a world where cyb...
2024-10-18 18:8:52 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
security
passwords
phishing
How to Master CentOS Commands: The Ultimate Cheat Sheet
Mastering CentOS commands can help you effectively manage CentOS systems, perform common tasks, an...
2024-10-18 16:0:49 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
processes
security
tuxcare
remote
df
Previous
30
31
32
33
34
35
36
37
Next