unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Clearing the Clutter: Simplifying Security Operations with Tool Consolidation
Tool redundancy within organizations presents significant challenges that impede operational effici...
2024-11-8 22:0:0 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
security
votiro
overlap
Cybersecurity Insights with Contrast CISO David Lindner | 11/8/24
Insight #1: Time for a n...
2024-11-8 22:0:0 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
security
insight
adr
prioritize
lindner
Understand CVE vs CVSS for Improved Cybersecurity
CWEs and CVEs have similarities and differences. Understanding both can help you keep your organ...
2024-11-8 21:18:33 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
security
scoring
scores
AI Industry is Trying to Subvert the Definition of “Open Source AI”
The Open Source Initiative ha...
2024-11-8 20:3:23 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
schneier
network
security
osi
syndicated
Observability in Security: Strategies for the Modern Enterprise
Cloud migrations, remote work and IoT devices have dissolved the traditional network perimeter,...
2024-11-8 18:47:13 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
security
threats
posture
processes
Steps Organizations Can Take to Improve Cyber Resilience
Organizations’ devices, data and digital security infrastructure are constantly under threat fro...
2024-11-8 17:53:38 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
resilience
security
threats
leaders
The CISO Evolution: From Tactical Defender to Strategic Business Partner
The chief information securit...
2024-11-8 17:0:49 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
security
cisos
riemer
officer
leaders
What is Software Composition Analysis and It’s Importance?
Software composition analysis (SCA) is a cybersecurity process that provides an in-depth examina...
2024-11-8 16:44:56 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
software
security
analysis
composition
Highlights from the InCyber Montreal Forum
I had a tremendous time at...
2024-11-8 07:2:0 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
incyber
security
montreal
japan
speakers
From Data to Cloud: Bridging Security Gaps with DSPM and CSPM
Over the past few years, busi...
2024-11-8 06:39:0 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
security
cspm
dspm
bridging
DEF CON 32 – QuickShell Sharing Is Caring About RCE Attack Chain On QuickShare – Or Yair, Shmuel Cohen
Thursday, November 7, 2024...
2024-11-8 04:0:0 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
security
network
webinars
yair
The Future of Work: Understanding AI Agents and Digital Coworkers
The workplace is transformin...
2024-11-8 03:9:51 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
agents
coworkers
robots
humans
The Global Effort to Maintain Supply Chain Security | Part Two
Various Cybersecurity Experts, CISO GlobalNovember 7, 2024A well-run kitchen requires a...
2024-11-8 03:3:44 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
security
kitchen
ingredients
ciso
software
A Critical Guide to Securing Large Language Models
A Critical Guide to Securing...
2024-11-8 02:7:40 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
ciphertrust
encryption
llms
cte
thales
Randall Munroe’s XKCD ‘Probabilistic Uncertainty’
via the c...
2024-11-8 02:0:0 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
xkcd
marc
permalink
syndicated
handelman
Bot Attacks Are Coming to Town: How to Safeguard Your Customers’ Holiday Travel
The Importance of Customer Security for Travel PlatformsPurchasing a plane ticket, booking a hotel...
2024-11-8 01:36:54 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
travel
phishing
threats
datadome
signals
Fortinet Extends Generative AI Reach Across Portfolio
Fortinet today extended the reach of its generative artificial intelligence (AI) capabilities to...
2024-11-8 01:27:25 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
agents
generative
employing
maddison
The Story of BIX, a Specialized AI Agent for Cybersecurity, Built with NVIDIA AI
BIX isn’t just an AI assistan...
2024-11-8 00:46:47 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
balbix
bix
changer
reduction
gaurav
DEF CON 32 – Windows Downdate: Downgrade Attacks Using Windows Updates
Authors/Presenters: Alon Levi...
2024-11-8 00:0:0 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
youtube
presenters
authored
handelman
CVE-2024-38213: From Crumbs to Full Compromise in a Stealthy Cyber Attack
Threat actors are becoming increasingly creative, using vulnerabilities to infiltrate organizations...
2024-11-7 23:37:33 | 阅读: 22 |
收藏
|
Security Boulevard - securityboulevard.com
38213
malicious
windows
veriti
Previous
11
12
13
14
15
16
17
18
Next