unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Prevent Path Traversal Attacks with ADR | Contrast Security
Community Chats Webinars LibraryHomeCybersecurity NewsFeaturesIndustry SpotlightNews R...
2024-10-11 23:55:52 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
security
webinars
boulevard
pii
ADDO session: Secure your application supply chain on AWS
We’ve wrapped up our 9th All Day DevOps (ADDO) event, where we’ve learned from the...
2024-10-11 22:54:10 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
sonatype
software
addo
materials
slsa
(In)Fidelity Admits Data Breach 8 Weeks Ago — 77K PII Lost
Huge investment firm won’t say how it was hacked.Fidelity Investments was breached in mid-August,...
2024-10-11 22:43:32 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
fidelity
security
richi
asset
blogwatch
ISO 27001 – 2013 vs 2022: Changes, Transition & More
Information and digital security frameworks like FedRAMP, CMMC, and ISO 27001 are not static docume...
2024-10-11 22:19:38 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
27001
security
isms
monitoring
transition
Exploring Goldilocks: ‘Just Right’ Resource Management
Managing resource requests and limits in Kubernetes can be challenging, especially for teams that a...
2024-10-11 21:51:18 | 阅读: 7 |
收藏
|
Security Boulevard - securityboulevard.com
goldilocks
limits
kubernetes
workloads
pods
Generative AI Fueling More Sophisticated Cyberattacks: Survey
While the use of generative AI by hackers is making cyberthreats more frequent, more sophisticated,...
2024-10-11 21:35:4 | 阅读: 13 |
收藏
|
Security Boulevard - securityboulevard.com
phishing
security
keeper
threats
Cybersecurity Insights with Contrast CISO David Lindner | 10/11/24
Insight #1: CISOs, you need insurance coverageAccording to German multinational...
2024-10-11 21:0:0 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
security
insurance
threats
insight
lindner
The Ripple Effect: .io Domain Disappearance and Its Impact on the Tech Industry
The .io TLD, originally assigned to the British Indian Ocean Territory, has become a f...
2024-10-11 20:42:59 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
transition
tld
british
islands
CornCon X: Powering Cybersecurity Innovation Through Human Connection
Only one section of the Mississippi River runs East to West. That stretch of the Big Muddy is home...
2024-10-11 19:0:23 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
security
humans
corncon
ryan
Passwordless Authentication without Secrets!
Passwordless Authentication without Secrets!divyaFri, 10/11/2024 – 08:54As user ex...
2024-10-11 16:54:14 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
thales
badge
security
The Sky is Falling! (Again)
We’ve been here before, haven’t we? Every other week, a new vulnerability with a sky-high CVSS scor...
2024-10-11 16:0:23 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
cups
printer
network
sky
printing
Cloud Ransomware Attack: Microsoft Sees Storm-0501 As Threat
Microsoft has recently identified a threat actor known as Storm-0501 targeting government, manufact...
2024-10-11 15:0:17 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
ransomware
cloud
0501
microsoft
network
Resilience in extreme conditions: Why DDIL environments need continuous identity access
Ensuring seamless operations in even the harshest environments is a necessity today. For organizat...
2024-10-11 13:32:1 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
strata
ddil
continuity
security
News alert: SpyCloud accelerates supply chain risk analysis with new ‘IDLink’ correlation capability
Austin, TX, Oct. 10th, 2024, CyberNewswire — SpyCloud, the leader in Identity Threat...
2024-10-11 06:37:8 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
spycloud
idlink
security
analysis
ADDO session: Building observability to increase resiliency
As part of the DevOps and DevSecOps track during Sonatype’s 9th All Day DevOps (ADD...
2024-10-11 06:30:0 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
sonatype
addo
resiliency
disruptions
Podcast Episode 20: Interview with Alan Delahunty, his role as Vice President/Commercial Lines Agent
Unlock the secrets to navigating the ever-evolving world of cybersecurity and commer...
2024-10-11 04:22:50 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
insurance
alan
security
delahunty
assura
How the Auth0 and Aembit Integration Boosts Non-Human Access Security
Thankfully, Auth0 has also implemented the ability for developers to outsource this element of acce...
2024-10-11 03:45:10 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
client
workload
aembit
auth0
developers
Remediation vs. Mitigation: The Choice Between Instant or Indirect Action
Organizations are constantly faced with the challenge of addressing vulnerabilities...
2024-10-11 03:0:28 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
security
permanent
veriti
immediate
remediate
USENIX NSDI ’24 – Resiliency at Scale: Managing Google’s TPUv4 Machine Learning Supercomputer
Authors/Presenters:Yazhou Zu, Alireza Ghaffarkhah, Hoang-Vu Dang, Brian Towles, Steven...
2024-10-11 03:0:0 | 阅读: 6 |
收藏
|
Security Boulevard - securityboulevard.com
usenix
youtube
presenters
vu
yazhou
Vulnerability Prioritization & the Magic 8 Ball
Last month marks 25 years of operation for the CVE (Common Vulnerabilities and Exposure...
2024-10-11 02:57:21 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
security
eclypsium
ball
shady
Previous
38
39
40
41
42
43
44
45
Next