unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Cybersecurity Compliance and Beyond: How Protocols Drive Innovation and Growth
In today’s digital age, cybersecurity compliance is no longer just a legal necessity or a defensive...
2024-9-13 14:37:9 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
security
innovation
threats
regulations
Why Breaking into Cybersecurity Isn’t as Easy as You Think
We’re told over and over again that there are hundreds of thousands of cybersecurity vacancies in t...
2024-9-13 14:13:1 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
security
hiring
college
degree
resumes
Application Security — The Complete Guide
What is application security?Application security is the combination of tools, practices, and poli...
2024-9-13 05:51:42 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
security
software
development
developers
mend
Comprehensive Guide to Infrastructure Robustness Metrics
In the world of IT infrastructure and systems management, understanding and implementing robust me...
2024-9-13 04:57:23 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
criticality
acceptable
failures
rto
Navigating the Shared Responsibility Model: Lessons Learned from the Snowflake Cybersecurity Incident
September 12, 2024Jerry Dawkins, PhDIn the world of cybersecurity, the recent i...
2024-9-13 03:21:50 | 阅读: 7 |
收藏
|
Security Boulevard - securityboulevard.com
security
snowflake
ciso
jerry
USENIX Security ’23 – Downgrading DNSSEC: How to Exploit Crypto Agility for Hijacking Signed Zones
Thursday, September 12, 2024 Community Chats Webinars LibraryHomeCybersecurity New...
2024-9-13 03:0:0 | 阅读: 9 |
收藏
|
Security Boulevard - securityboulevard.com
security
usenix
webinars
network
Emulating the Persistent and Stealthy Ebury Linux Malware
Ebury is a sophisticated Linux malware, first discovered in 2011, that targets SSH servers to estab...
2024-9-13 02:4:35 | 阅读: 8 |
收藏
|
Security Boulevard - securityboulevard.com
security
ebury
ssh
attackiq
network
Microsoft’s September 2024 Patch Tuesday Addresses 4 Zero-Days, 79 Vulnerabilities
On September 10, 2024, Microsoft released its latest round of security updates as part...
2024-9-13 01:51:41 | 阅读: 6 |
收藏
|
Security Boulevard - securityboulevard.com
nuspire
microsoft
security
tuesday
Proofpoint Adds Ability to Dynamically Apply Granular Security Controls
Proofpoint this week at its Protect conference launched a series of efforts through which it plans...
2024-9-13 01:37:28 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
proofpoint
choi
security
granular
Randall Munroe’s XKCD ‘Water Filtration’
Application Security Check Up ...
2024-9-13 01:0:0 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
security
Defensive Stack Optimization: A Threat-Informed Defense Use Case
In this blog series, we dive into the challenges faced by our heroes of Threat-Inform...
2024-9-13 00:45:0 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
security
tidal
informed
defensive
threats
A proactive defense: Utilize SBOMs and continuous monitoring
Thursday, September 12, 2024 Community Chats Webinars LibraryHomeCybersecurity New...
2024-9-13 00:30:0 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
security
webinars
cloud
boulevard
4 Best Practices for Using Cloud-Native Infrastructure for AI Workloads
Artificial intelligence (AI) is one of the hottest buzzwords these days, dominating headlines and r...
2024-9-13 00:17:17 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
cloud
kubernetes
workloads
scalability
security
Microsoft Is Adding New Cryptography Algorithms
Microsoft is updating SymCrypt, its core cryptographic library, with new quantum-secure algorithms....
2024-9-12 23:42:49 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
kem
microsoft
symcrypt
shor
Threat Actors Are Finding it Easier Than Ever to Breach Cyber-Defenses: Enter Data-Centric Security
Global end-user spending on information security is projected to hit $212bn next year, an incre...
2024-9-12 23:15:55 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
security
spending
comforte
9n
projected
Blocking in Production Requires a Modern Security DevEx | Impart Security
Blocking in Production Requires a Modern Security DevExI’ve spoken to many security leaders who ar...
2024-9-12 23:0:0 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
security
devex
development
software
developer
USENIX Security ’23 – Every Signature is Broken: On the Insecurity of Microsoft Office’s OOXML Signatures
Thursday, September 12, 2024 Community Chats Webinars LibraryHomeCybersecurity New...
2024-9-12 23:0:0 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
security
usenix
network
webinars
insecurity
Aembit’s Vision for Non-Human Identity and Access Management Gains $25 Million in Backing
Building Aembit to Solve NHI ChallengesAembit’s mandate is to secure how non-human identities acce...
2024-9-12 22:24:7 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
aembit
security
nhi
identities
hear
Aembit Raises $25 Million in Series A Funding for Non-Human Identity and Access Management
Silver Spring, United States, September 12th, 2024, CyberNewsWireThe investment will drive the co...
2024-9-12 22:0:16 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
aembit
security
workloads
workload
identities
Two Lies, One Truth in Securing Your SaaS Stack
Mythology surrounding technology is pervasive. Although ideas like Macs can’t get viruses, charging...
2024-9-12 21:2:28 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
security
posture
sspm
casbs
adaptive
Previous
3
4
5
6
7
8
9
10
Next