unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Generative AI and Cybersecurity: The Impact on CISOs and Security Teams
Generative AI, a subset of artificial intelligence (AI), has emerged as a transformative force in t...
2024-2-20 01:39:15 | 阅读: 11 |
收藏
|
Security Boulevard - securityboulevard.com
generative
security
cisos
evolving
EU Court of Human Rights Rejects Encryption Backdoors
read file error: read notes: is a directory...
2024-2-20 00:15:17 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
echr
schneier
society
encryption
governments
Automated remediation of exposed secrets: Pros and cons
In the face of a cyberattack, every second can be the thin line between maintaining your reputation...
2024-2-19 23:26:12 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
security
threats
entro
ensuring
Google Initiative Aims to Boost AI for Cybersecurity
Google is pushing AI as the technology that will shift the balance of power from cyberattackers to...
2024-2-19 23:19:38 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
security
defenders
hansen
initiative
Join our new Escape community on Slack!
We're migrating Escape Community from Discord to Slack! After feedback from our commu...
2024-2-19 23:2:3 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
security
aim
migrate
academy
armor
3 Ways the CTO Can Fortify the Organization in the Age of Generative AI
Few technologies have captured the public imagination quite like generative AI. It seems that with...
2024-2-19 23:0:47 | 阅读: 26 |
收藏
|
Security Boulevard - securityboulevard.com
cto
generative
security
strategic
trained
Data Security: Beyond Threat Hunting to Monitoring Data Flow and User Behavior
Cybersecurity, once a fortress built on rigid protocols and reactive measures, is undergoing a tran...
2024-2-19 22:0:56 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
threats
security
ueba
proactive
XSS Marks the Spot: Digging Up Vulnerabilities in ChatGPT
With its widespread use among businesses and individual users, ChatGPT is a prime target for attack...
2024-2-19 21:30:0 | 阅读: 6 |
收藏
|
Security Boulevard - securityboulevard.com
chatgpt
citation
openai
security
Demystifying JWT, OAuth, OIDC, and SAML: A Technical Guide
Applications and APIs today need to handle user authentication, authorized access controls, and id...
2024-2-19 21:18:6 | 阅读: 10 |
收藏
|
Security Boulevard - securityboulevard.com
openid
oidc
security
claims
How Data Exfiltration is Changing the Ransomware Landscape
A staggering 91% of ransomware attacks now involve data exfiltration, typically to servers in Chi...
2024-2-19 19:25:1 | 阅读: 6 |
收藏
|
Security Boulevard - securityboulevard.com
ransomware
extortion
blackfog
demands
forums
Streamlining certificate management: The case for eliminating Microsoft Active Directory Certificate Services
Enhance security and productivity with automated certificate management. Move beyond Mi...
2024-2-19 16:38:0 | 阅读: 7 |
收藏
|
Security Boulevard - securityboulevard.com
sectigo
security
renewal
microsoft
Presidents Day 2024
Permalink*** This is a Security Bloggers Network syndicated blog from Infosecuri...
2024-2-19 16:0:0 | 阅读: 7 |
收藏
|
Security Boulevard - securityboulevard.com
authored
marc
presidents
permalink
security
Drata vs Vanta Compared: Similarities and Differences
In today’s rapidly evolving information security landscape, organizations are increasingly turning...
2024-2-19 14:53:47 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
security
drata
vanta
scytale
processes
Does moving to the cloud mean compromising on security?
Cloud security means multiple teams with a shared responsibility.The transition to cloud compu...
2024-2-19 01:25:18 | 阅读: 10 |
收藏
|
Security Boulevard - securityboulevard.com
security
cloud
regulatory
monitoring
USENIX Security ’23 – Zhuo Zhang, Zhiqiang Lin, Marcelo Morales, Xiangyu Zhang, Kaiyuan Zhang – Your Exploit is Mine: Instantly Synthesizing Counterattack Smart Contract
Home » Security Bloggers Network » USENIX Security ’23 – Zhuo Zhang, Zhiqiang Lin, Marcelo Morale...
2024-2-19 00:0:0 | 阅读: 11 |
收藏
|
Security Boulevard - securityboulevard.com
security
usenix
network
youtube
bloggers
Generative AI Guardrails: How to Address Shadow AI
New terminology and cyber questions about generative artificial intelligence keep popp...
2024-2-18 18:31:44 | 阅读: 8 |
收藏
|
Security Boulevard - securityboulevard.com
generative
genai
shadow
lohrmann
Lean In for Yourself
Small family farming is a labor intensive way to go broke. When I was young I spent some weeks ea...
2024-2-18 09:36:0 | 阅读: 8 |
收藏
|
Security Boulevard - securityboulevard.com
sandberg
young
grandmother
career
men
USENIX Security ’23 – Xiaoguang Li, Ninghui Li, Wenhai Sun, Neil Zhenqiang Gong, Hui Li – Fine-grained Poisoning Attack to Local Differential Privacy Protocols for Mean and Variance Estimation
Home » Security Bloggers Network » USENIX Security ’23 – Xiaoguang Li, Ninghui Li, Wenhai Sun, Ne...
2024-2-18 00:0:0 | 阅读: 16 |
收藏
|
Security Boulevard - securityboulevard.com
security
usenix
bloggers
youtube
network
The D3 Integration Development Cycle: A Journey of Precision, Innovation, and Adaptability
The quality of integrations within your SOAR (Security Orchestration, Automation, and Response) sys...
2024-2-17 07:3:34 | 阅读: 8 |
收藏
|
Security Boulevard - securityboulevard.com
d3
development
soar
security
State Government Organization Network Breach: SafeBreach Coverage for US-CERT Alert (AA24-046A)
Author: Kaustubh Jagtap, Product Marketing Director, SafeBreach On February 15th,...
2024-2-17 04:2:51 | 阅读: 7 |
收藏
|
Security Boulevard - securityboulevard.com
safebreach
network
aa24
046a
security
Previous
252
253
254
255
256
257
258
259
Next