unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Microsoft Is Adding New Cryptography Algorithms
Microsoft is updating SymCrypt, its core cryptographic library, with new quantum-secure algorithms....
2024-9-12 23:42:49 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
kem
microsoft
symcrypt
shor
Threat Actors Are Finding it Easier Than Ever to Breach Cyber-Defenses: Enter Data-Centric Security
Global end-user spending on information security is projected to hit $212bn next year, an incre...
2024-9-12 23:15:55 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
security
spending
comforte
9n
projected
Blocking in Production Requires a Modern Security DevEx | Impart Security
Blocking in Production Requires a Modern Security DevExI’ve spoken to many security leaders who ar...
2024-9-12 23:0:0 | 阅读: 6 |
收藏
|
Security Boulevard - securityboulevard.com
security
devex
development
software
developer
USENIX Security ’23 – Every Signature is Broken: On the Insecurity of Microsoft Office’s OOXML Signatures
Thursday, September 12, 2024 Community Chats Webinars LibraryHomeCybersecurity New...
2024-9-12 23:0:0 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
security
usenix
network
webinars
insecurity
Aembit’s Vision for Non-Human Identity and Access Management Gains $25 Million in Backing
Building Aembit to Solve NHI ChallengesAembit’s mandate is to secure how non-human identities acce...
2024-9-12 22:24:7 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
aembit
security
nhi
identities
hear
Aembit Raises $25 Million in Series A Funding for Non-Human Identity and Access Management
Silver Spring, United States, September 12th, 2024, CyberNewsWireThe investment will drive the co...
2024-9-12 22:0:16 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
aembit
security
workloads
workload
identities
Two Lies, One Truth in Securing Your SaaS Stack
Mythology surrounding technology is pervasive. Although ideas like Macs can’t get viruses, charging...
2024-9-12 21:2:28 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
security
posture
sspm
casbs
adaptive
How to Strengthen and Improve Your Company’s Security Posture
Maintaining security posture is key to protecting organizations against cyberattacks. Here’s how to...
2024-9-12 20:31:45 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
security
posture
software
legit
Tines Leverages LLMs to Simplify Security Automation
Tines today added an artificial intelligence (AI) chat interface to its no-code platfor...
2024-9-12 20:26:52 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
tines
simpler
workbench
hinchy
The SBOM has a long history — but what’s next is what matters
Software bills of materials (SBOMs) are having their day — they’re even government-mandated at time...
2024-9-12 20:0:0 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
sboms
woods
software
security
adoption
BYOD Policies Fueling Security Risks
The use of employee mobile devices at work, known as bring your own device (BYOD), is a significant...
2024-9-12 18:19:28 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
security
threats
caralis
sectors
phishing
Ubuntu 24.04.1 LTS Released: This is What’s New
Canonical’s Ubuntu 24.04 LTS, codenamed “Noble Numbat” has received its first major update: Ubuntu...
2024-9-12 17:0:33 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
security
tuxcare
enhanced
US Elections: Iranian Hackers Target Political Campaigns
With elections, there have always been accusations of rigging and corruption and it’s possible that...
2024-9-12 15:0:44 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
elections
phishing
political
iranian
The Importance of IAM in Critical Infrastructure
The Importance of IAM in Critical Infrastructure madhavThu, 09/12/2024 – 06:23Over...
2024-9-12 14:23:3 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
security
threats
phishing
resistant
News alert: Criminal IP partners with IPLocation.io to deliver new tech to mitigate IP address evasion
Torrance, Calif., Sept. 11, 2024, CyberNewsWire — Criminal IP, a distinguished leader...
2024-9-12 13:6:2 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
criminal
spera
iplocation
database
News alert: Opus Security’s new ‘Advanced Multi-Layered Prioritization Engine’ elevates VM
Palo Alto, Calif., Sept.11, 2024, CyberNewsWire — Opus Security, the leader in unifie...
2024-9-12 12:40:26 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
security
opus
layered
Criminal IP Teams Up with IPLocation.io to Deliver Unmatched IP Solutions to Global Audiences
Torrance, United States / California, September 11th, 2024, CyberNewsWireCriminal IP, a distingui...
2024-9-12 11:25:20 | 阅读: 11 |
收藏
|
Security Boulevard - securityboulevard.com
criminal
spera
iplocation
database
cti
NSFOCUS Recognized in Eight Security Innovations in the Gartner® Hype Cycle™ for Security in China, 2024 Report
Gartner® has recently unveiled its Hype Cycle for Security in China, 2024 and NSFOCUS has been rec...
2024-9-12 09:8:29 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
security
analysis
software
network
bas
Imperva Protects Against Critical Apache OFBiz Vulnerability (CVE-2024-45195)
Recently, a critical vulnerability in the widely used Apache OFBiz framework was disclo...
2024-9-12 06:54:3 | 阅读: 6 |
收藏
|
Security Boulevard - securityboulevard.com
imperva
ofbiz
security
45195
protects
5 Stages of Shadow IT Grief | Grip
Shadow IT? It’s not an organizational priority…or is it? Shadow IT: You’ve heard the term more tim...
2024-9-12 06:53:42 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
shadow
security
grief
stage
grip
Previous
21
22
23
24
25
26
27
28
Next