unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Is an AI-augmented SOC The Way Forward?
Even with the growing focus on innovation, fear, uncertainty, and doubt (FUD) continue to influence...
2024-10-23 01:57:43 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
security
nuspire
augmented
threats
socs
Elevating SaaS Security: The Strategic Role of Bug Bounty Programs
For engineers and security professionals working within SaaS environments, the standard suite of se...
2024-10-23 01:22:49 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
security
ethical
development
hackerone
Randall Munroe’s XKCD ‘Temperature Scales’
via the comic humor & dry wit of Randall Munroe, creator of XKCDPermalink*** Th...
2024-10-23 01:0:0 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
xkcd
randall
permalink
humor
USENIX NSDI ’24 – THC: Accelerating Distributed Deep Learning Using Tensor Homomorphic Compression
Authors/Presenters:Minghao Li, Ran Ben Basat, Shay Vargaftik, ChonLam Lao, Kevin Xu, Mi...
2024-10-23 01:0:0 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
presenters
youtube
usenix
commitment
INE Security Launches New Training Solutions to Enhance Cyber Hygiene for SMBs
Cary, NC, October 22nd, 2024, CyberNewsWireINE Security offers essential advice to protect digita...
2024-10-22 23:29:27 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
security
ine
network
software
USENIX NSDI ’24 – Approximate Caching for Efficiently Serving Text-to-Image Diffusion Models
Authors/Presenters:Shubham Agarwal, Subrata Mitra, Sarthak Chakraborty, Srikrishna Kara...
2024-10-22 23:0:0 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
presenters
youtube
usenix
publishing
saini
DEF CON 32 – AppSec Village – Your CI CD Pipeline Is Vulnerable, But It’s Not Your Fault
Authors/Presenters:Elad Pticha, Oreen LivniOur sincere appreciation to DEF CON, and t...
2024-10-22 23:0:0 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
presenters
youtube
nocookie
vegas
publishing
The Power of Taint Analysis: Uncovering Critical Code Vulnerability in OpenAPI Generator
The OpenAPI Generator is a popular tool with more than 20k stars on GitHub that allows users to aut...
2024-10-22 23:0:0 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
openapi
sonarcloud
taint
security
Best Cybersecurity Metrics to Use in the Boardroom | Kovrr
The Challenge of Elevating Cyber Risk Into the Boardroom As the cost and frequency of cyber eve...
2024-10-22 22:31:34 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
cisos
exposure
ciso
security
MixMode Recognized By USA Today As One Of The Top 10 AI Companies To Watch in 2024
Karen BuffoKaren Buffo is the Chief Marketing Officer (CMO) at MixMode. In this role,...
2024-10-22 22:15:3 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
mixmode
threats
buffo
karen
SOC 2 Compliance Requirements and Criteria
Meeting SOC 2 standards demonstrates your commitment to security and boosts trust—especially when y...
2024-10-22 21:58:50 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
security
legit
pii
firm
auditors
Russian Disinformation Group Behind Bogus Walz Conspiracy: Report
A Russian disinformation group reportedly was behind a false conspiracy targeting Democratic vice p...
2024-10-22 21:30:40 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
russia
1516
walz
harris
trump
ShadyShader: Crashing Apple M-Series Devices with a Single Click
IntroductionA while ago, we discovered an interesting vulnerability in Apple’s M-series chips that...
2024-10-22 21:0:57 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
shader
shadyshader
crash
crashing
loops
SailPoint Adds Raft of Capabilities to Better Manage Privileges
SailPoint Technologies today added a bevy of capabilities that makes it possible for organizations...
2024-10-22 21:0:29 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
identities
sailpoint
machine
security
atlas
Putting the “R” back in GRC – Insights from Gartner on Emerging Cyber GRC Technologies
Cyber GRC (Governance, Risk, and Compliance) tools are software solutions that help...
2024-10-22 20:35:10 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
cybersaint
governance
grc
centralized
siddiqui
Proofpoint Alternatives and Competitors: Find the Best
Reading Time: 6 minPowerDMARCValimaildmarcianEasyDMARCSendmarcDMARCLYSimple DMARCDMARC R...
2024-10-22 14:21:31 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
dmarc
proofpoint
security
powerdmarc
OWASP Mobile Top 10 2024: Update Overview
75% of Mobile Apps Fail Basic Security Tests. Hackers are increasingly focusing on the mobile chann...
2024-10-22 13:40:47 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
security
pii
developers
inadequate
Identity Revolution: Welcome to the Dynamic World of IAM 360
Identity Revolution: Welcome to the Dynamic World of IAM 360madhavTue, 10/22/2024 – 0...
2024-10-22 13:2:2 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
cpl
thalesgroup
thales
revolution
ISO 27001 Certification: A Detailed Guide on How to Get Certified
Editor’s note: This blog post is an excerpt from our eBook, Getting to Know the ISO 27001 Standard...
2024-10-22 10:23:21 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
security
isms
27001
objectives
leadership
Inside the Dark Web: How Threat Actors Are Selling Access to Corporate Networks
In recent weeks, underground forums on the dark web have continued to flourish as bustling marketpl...
2024-10-22 07:56:5 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
sectors
forums
underground
attackers
Previous
27
28
29
30
31
32
33
34
Next