unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
3 Opportunities for Cybersecurity Leaders Who Choose to Stay
Several years into your role as a security leader at a company, you’ll reach a point when you ask y...
2024-1-18 21:40:23 | 阅读: 14 |
收藏
|
Lenny Zeltser - zeltser.com
security
decide
pace
accelerate
pursue
Distribute Cybersecurity Tasks with Diffusion of Responsibility in Mind
The notion that security is everyone’s responsibility in computer systems dates back to at least th...
2023-11-4 01:46:53 | 阅读: 11 |
收藏
|
Lenny Zeltser - zeltser.com
security
diffusion
How Security Can Better Support Software Engineering Teams
As the CISO at a tech company, my responsibilities include empowering our software engineering team...
2023-10-6 02:53:35 | 阅读: 12 |
收藏
|
Lenny Zeltser - zeltser.com
security
software
objectives
involves
A Report Template for Incident Response
Preparing for cybersecurity and data privacy incidents involves creating checklists and documented...
2023-9-13 22:39:17 | 阅读: 21 |
收藏
|
Lenny Zeltser - zeltser.com
axonius
security
coordinator
responders
Security Leaders Can Lower Expenses While Reducing Risk
As companies seek to optimize operations and constrain expenses, cybersecurity leaders worry about...
2023-8-23 19:14:0 | 阅读: 17 |
收藏
|
Lenny Zeltser - zeltser.com
security
expenses
funding
unnecessary
Withholding Single Sign-On from SaaS Customers is Bad for Business and Security
Despite years of public shaming by security professionals, some SaaS vendors only offer Single Sign...
2023-5-26 09:32:6 | 阅读: 22 |
收藏
|
Lenny Zeltser - zeltser.com
sso
security
withholding
increases
pricing
Three Ways CISOs Can Drive More Meaningful Collaboration
Today’s CISOs are more than technologists—we strive to make ourselves well-rounded business leaders...
2023-5-16 09:41:38 | 阅读: 17 |
收藏
|
Lenny Zeltser - zeltser.com
security
cisos
objectives
How to Tackle the Cybersecurity Careers Gap
Too many people are unsure how to enter or grow in the cybersecurity industry. It's a relatively yo...
2023-5-12 08:39:43 | 阅读: 22 |
收藏
|
Lenny Zeltser - zeltser.com
career
security
careers
gap
As a CISO, Are You a Builder, Fixer, or Scale Operator?
When contemplating the next step in your career as a cybersecurity leader, understand what you do b...
2023-5-11 00:20:17 | 阅读: 16 |
收藏
|
Lenny Zeltser - zeltser.com
security
ciso
fixer
enjoy
Untangling the Complexity of SaaS Ownership in the Enterprise
Security and IT leaders are concerned about the speed and ease with which employees can bring SaaS...
2023-4-28 05:36:16 | 阅读: 20 |
收藏
|
Lenny Zeltser - zeltser.com
security
oversight
ownership
Shift Your Mindset from Conflict to Collaboration to Succeed in Security
In the two decades I've spent in cybersecurity, I've observed and experienced the fighting spirit o...
2023-3-29 22:24:13 | 阅读: 22 |
收藏
|
Lenny Zeltser - zeltser.com
security
objectives
goals
Cybersecurity vs. Everyone
Cybersecurity leaders not only go against threat actors to defend the organization but also find th...
2022-12-31 01:40:37 | 阅读: 26 |
收藏
|
Lenny Zeltser - zeltser.com
security
leaders
executives
fuel
How to Ask Questions to Succeed with Security Projects
No matter the years of experience in cybersecurity, security professionals are often in situations...
2021-10-14 23:53:00 | 阅读: 25 |
收藏
|
zeltser.com
security
advancing
degree
How You Can Start Learning Malware Analysis
Malware analysis sits at the intersection of incident response, forensics, system and network admin...
2021-01-07 01:09:04 | 阅读: 155 |
收藏
|
zeltser.com
analysis
malicious
examine
debugger
remnux
REMnux Tools List for Malware Analysis
REMnux® offers a curated collection of free tools for reverse-engineering or otherwise analyzing ma...
2020-10-14 01:14:40 | 阅读: 248 |
收藏
|
zeltser.com
malicious
remnux
analysis
security
degree
Version 7 of the REMnux Distro Is Now Available
10 years after the initial release of REMnux, I’m thrilled to announce that REMnux version 7 is now...
2020-07-22 22:51:50 | 阅读: 86 |
收藏
|
zeltser.com
remnux
distro
security
examining
download
Unemployment Insurance Fraud and Identity Theft: Up Close and Personal
In June 2020, the Federal Trade Commission (FTC) warned that “imposters are filing claims for unemp...
2020-07-02 12:24:04 | 阅读: 111 |
收藏
|
zeltser.com
victim
scammer
letter
york
How You Can Write Better Threat Reports
Writing about cybersecurity threats, such as phishing campaigns, malware infections, and attack gro...
2020-07-01 22:42:51 | 阅读: 98 |
收藏
|
zeltser.com
security
degree
decide
readers
Learning Malware Analysis and Cybersecurity Writing Online
You can now take my malware analysis and cybersecurity writing courses online in two formats at SAN...
2020-04-20 12:31:40 | 阅读: 94 |
收藏
|
zeltser.com
ondemand
materials
taught
sec402
How to Set Up a SpiderFoot Server for OSINT Research
SpiderFoot is a tool for gathering Open Source Intelligence (OSINT) and threat intelligence about I...
2020-04-17 10:10:28 | 阅读: 102 |
收藏
|
zeltser.com
spiderfoot
security
ssh
python3
Previous
-1
0
1
2
3
4
5
6
Next