unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Cryptographic design review of Ockam
By Marc Ilunga, Jim Miller, Fredrik Dahlgren, and Joop van de PolIn October 2023, Ockam hired Trai...
2024-3-5 22:0:38 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
ockam
security
identities
guarantees
modeling
5 Security Benefits of Configuration as Code (CaC)
Configuration-as-code (CaC) is a DevOps practice where infrastructure setup and management are auto...
2024-3-5 22:0:18 | 阅读: 7 |
收藏
|
Security Boulevard - securityboulevard.com
security
reducing
identify
consistency
Evolving Threats from Within: Insights from the 2024 Data Exposure Report
In today’s hyper-connected world, insider-driven data loss remains a significant threat across ind...
2024-3-5 22:0:0 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
security
dlp
insider
leaders
NIST updates supply chain guidance: 3 ways to pump up your CI/CD security
The final version of guidelines to help organizations secure their software supply chain has been r...
2024-3-5 21:0:0 | 阅读: 10 |
收藏
|
Security Boulevard - securityboulevard.com
software
security
development
attestation
hughes
Tax Season Phishing Surge: Cyber Exploits with AsyncRAT
Rise of AsyncRAT: Navigating Tax-Themed Cyber Threats and WinRAR Vulnerabilities In t...
2024-3-5 20:56:51 | 阅读: 6 |
收藏
|
Security Boulevard - securityboulevard.com
tax
asyncrat
security
phishing
winrar
Pure360 SPF and DKIM configuration: Step By Step Guideline
This instructional article will demonstrate the Pure360 configuration process of Sender...
2024-3-5 20:53:51 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
spf
dkim
pure360
easydmarc
spf1
Oracle RightNow SPF and DKIM configuration: Step By Step Guideline
This instructional article will demonstrate the Oracle RightNow configuration process o...
2024-3-5 20:47:35 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
spf
dkim
rightnow
easydmarc
spf1
Sensitive data exposure: How to prevent it and where do we stand in 2024
Do you fully grasp the magnitude of sensitive data exposure? It stands as one of the most prevalen...
2024-3-5 17:23:56 | 阅读: 8 |
收藏
|
Security Boulevard - securityboulevard.com
exposure
security
phishing
A Step-by-Step Guide to Creating an AWS IAM Policy Document
Keeping your cloud resources safe from prying eyes and bad actors is a continuous and relentless ch...
2024-3-5 16:43:20 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
apono
security
cloud
buckets
reviewing
Overview of AI Regulations and Regulatory Proposals of 2023
“AI is too important not to regulate—and too important not to regulate well,” asserts Google, captu...
2024-3-5 13:59:55 | 阅读: 7 |
收藏
|
Security Boulevard - securityboulevard.com
regulatory
regulations
development
regulation
AI Supply Chain Security: Hugging Face Malicious ML Models
Introduction to Hugging Face Malicious ML ModelsBackgroundA recent report by JFrog researchers f...
2024-3-5 12:20:33 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
malicious
hugging
security
machine
pickle
How to create the safest cybersecurity and student safety tech stack for your district
In today’s digital age, ensuring the safety and security of students and staff in K-12 school dist...
2024-3-5 07:21:59 | 阅读: 11 |
收藏
|
Security Boulevard - securityboulevard.com
district
azusa
unified
cipa
Prevention & Cure: Countermeasures Against Healthcare Cyberattacks
A recent successful cyberattack on a large technology provider for hospitals and pharmacies in the...
2024-3-5 07:0:21 | 阅读: 11 |
收藏
|
Security Boulevard - securityboulevard.com
healthcare
logrhythm
ransomware
ttps
LogRhythm Promotes Joanne Wong to Interim Chief Marketing Officer
A pioneer of LogRhythm’s Asia Pacific operations, Joanne Wong’s appointment reinforces LogRhythm’s...
2024-3-5 07:0:20 | 阅读: 9 |
收藏
|
Security Boulevard - securityboulevard.com
logrhythm
wong
joanne
security
officer
TrustCloud Welcomes Security and Compliance Expert Dixon Wright as VP GRC Transformation
Wright Joins TrustCloud as the company expands solutions for customers, partners and auditors, and...
2024-3-5 06:37:39 | 阅读: 12 |
收藏
|
Security Boulevard - securityboulevard.com
trustcloud
grc
security
wright
dixon
Data Security Posture Management Should Focus on Securing the Data
Organizations use and store many types of data. Some of it is high value containing bus...
2024-3-5 05:0:58 | 阅读: 9 |
收藏
|
Security Boulevard - securityboulevard.com
security
posture
ron
Entro Streamlines Machine Identity Life Cycle Management
Entro has added a life cycle management capability to its namesake platform for discovering and man...
2024-3-5 04:29:11 | 阅读: 10 |
收藏
|
Security Boulevard - securityboulevard.com
identities
machine
software
alvas
USENIX Security ’23 – Shawn Shan, Jenna Cryan, Emily Wenger, Haitao Zheng, Rana Hanocka, Ben Y. Zhao – Glaze: Protecting Artists From Style Mimicry By Text-to-Image Models
Distinguished Paper Award Winner and Co-Winner of the 2023 Internet Defense PrizeMany...
2024-3-5 04:0:0 | 阅读: 7 |
收藏
|
Security Boulevard - securityboulevard.com
winner
security
usenix
youtube
anaheim
Researchers Give Birth to the First GenAI Worm
It was bound to happen — researchers have created a 1st generation AI worm that can s...
2024-3-5 03:9:0 | 阅读: 7 |
收藏
|
Security Boulevard - securityboulevard.com
worm
malicious
genai
propagate
security
Daniel Stori’s ‘Obfuscated Code’
via the inimitable Daniel Stori at Turnoff.US.Permalink*** This is a Security B...
2024-3-5 02:0:0 | 阅读: 6 |
收藏
|
Security Boulevard - securityboulevard.com
turnoff
inimitable
geek
daniel
Previous
238
239
240
241
242
243
244
245
Next