unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
White House Memo Pushes Federal Agencies on Cybersecurity
August 6, 2024On July 10th, the White House released Memorandum M24-14, giving administrative agen...
2024-8-6 21:0:0 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
software
memo
development
ciphers
ADR Security Technology for AppSec Vulnerabilities | Contrast Security
On Aug. 6, Contrast Security introduced a new security technology we call Applicati...
2024-8-6 21:0:0 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
security
contrast
adr
appsec
seeks
Meet BIX: Your New AI Ally in Cyber Risk and Exposure Management
What if I told you that managing cyber risk could be as easy as asking a colleague a qu...
2024-8-6 20:58:31 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
balbix
instruct
cio
security
bloggers
Navigating the DORA Landscape with AttackIQ’s Automated Assessment
The financial services and insurance industries have always been in the center of targeted waves...
2024-8-6 20:35:21 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
dora
security
assessments
attackiq
Orca Security Extends Visibility Into the Cloud Security
Orca Security this week added an ability to classify cloud security threats in a way th...
2024-8-6 20:35:20 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
cloud
security
orca
geron
Minimizing the Impact of Ransomware in the Cloud
It’s no secret that ransomware is a critical threat in today’s business landscape. According to one...
2024-8-6 20:12:39 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
security
ransomware
cloud
processes
mgm
I Have An SBOM, Now What ?!?
A Software Bill of Material (SBOM) lists the software components that are used in a piece of softwa...
2024-8-6 20:7:33 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
software
development
licensing
analysis
Cyber Risk Landscape Peer Report: 4 action items for your organization
Traditional measures to detect and respond to cyberattacks are inadequate to protect organizations...
2024-8-6 20:0:0 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
security
watkins
software
reduction
5 Best Practices for Managing Endpoints On a Global Scale
Managing hundreds or thousands of endpoints is hard enough when they’re all located in the same off...
2024-8-6 19:32:37 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
network
zones
geographic
distances
software
APIs, Web Applications Under Siege as Attack Surface Expands
Attackers are increasingly targeting web applications and APIs, with a nearly 50% year-over-year gr...
2024-8-6 16:34:58 | 阅读: 12 |
收藏
|
Security Boulevard - securityboulevard.com
security
development
injection
governance
How to Secure Your Organization from Shadow IT?
“Shadow IT” isn’t just a catchy term; it goes beyond official procedures. It also shows unmet emplo...
2024-8-6 14:24:3 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
shadow
security
cloud
kratikal
costs
7 Data Security Systems & Products Driving Value
In 2022, it’s not enough for businesses to rely on antivirus products or malware protection alone....
2024-8-6 12:42:39 | 阅读: 7 |
收藏
|
Security Boulevard - securityboulevard.com
security
symmetry
cloud
dataguard
operational
MSN: Russia takes aim at Sitting Ducks domains, bags 30,000+
Community Chats Webinars LibraryHomeCybersecurity NewsFeaturesIndustry SpotlightNews R...
2024-8-6 05:26:53 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
security
webinars
boulevard
gradient
Human vs AI Agents in Cybersecurity: Who Should Guard Your Data?
In the ever-evolving landscape of cybersecurity, we face a pivotal question: Should we entrust the...
2024-8-6 04:36:18 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
agents
threats
humans
hydra
USENIX Security ’23 – Gradient Obfuscation Gives a False Sense of Security in Federated Learning
Authors/Presenters:Kai Yue, Richeng Jin, Chau-Wai Wong, Dror Baron, Huaiyu Dai Many t...
2024-8-6 03:0:0 | 阅读: 7 |
收藏
|
Security Boulevard - securityboulevard.com
usenix
security
youtube
jin
network
How Using a VPN May Benefit Your Privacy
In the title of this post, keep in mind the keyword is may; as a forewarning, this is not a post...
2024-8-6 01:30:0 | 阅读: 8 |
收藏
|
Security Boulevard - securityboulevard.com
network
unfamiliar
parties
security
tunnel
Randall Munroe’s XKCD ‘Exam Numbers’
Community Chats Webinars LibraryHomeCybersecurity NewsFeaturesIndustry SpotlightNews R...
2024-8-6 01:0:0 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
webinars
security
boulevard
ftc
TikTok Abuses Kids, say DoJ and FTC
U.S. Justice Dept. and Federal Trade Commission file lawsuit, alleging TikTok broke COPPA law.T...
2024-8-6 00:19:9 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
lawsuit
collecting
richi
kid
addressed
Black Hat Fireside Chat: Token’s wearable MFA solution combines PKI, biometrics — in a ring
By Byron V. AcohidoLAS VEGAS — Humans, unsurprisingly, remain the weak link in cybers...
2024-8-6 00:7:16 | 阅读: 6 |
收藏
|
Security Boulevard - securityboulevard.com
acohido
sensor
security
network
hardware
National Public Data Sued for Hack that Exposed Data of 2.9 Billion People
A class-action complaint has been filed against a background-check company in connection to a data...
2024-8-6 00:2:33 | 阅读: 8 |
收藏
|
Security Boulevard - securityboulevard.com
complaint
pii
plaintiff
court
plaintiffs
Previous
44
45
46
47
48
49
50
51
Next