unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
CRQ Loss Exceedance Curves for Risk Management | Kovrr
TL;DROn-demand cyber risk quantification (CRQ) platforms leverage probabilistic statistical mode...
2024-9-25 01:11:10 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
exceedance
crq
curves
lec
kovrr
Randall Munroe’s XKCD ‘Maslow’s Pyramid’
via the comic humor & dry wit of Randall Munroe, creator of XKCDPermalink*** Th...
2024-9-25 01:0:0 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
xkcd
humor
network
comic
randall
SBOM-a-Rama Fall 2024: Sonatype’s top 5 takeaways
Tuesday, September 24, 2024 Community Chats Webinars LibraryHomeCybersecurity News...
2024-9-25 01:0:0 | 阅读: 7 |
收藏
|
Security Boulevard - securityboulevard.com
security
webinars
governance
crq
pushes
Microsoft Pushes Governance, Sheds Unused Apps in Security Push
Microsoft executives said the IT giant has taken numerous steps as it bulks up the security of its...
2024-9-25 00:32:14 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
microsoft
security
cloud
sfi
senior
Join KubeCrash Fall 2024 for Platform Engineering the Cloud Native Way
I’m excited to be back at KubeCrash this fall! Mark your calendars to join us on Wednesday, October...
2024-9-25 00:25:33 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
kubecrash
cloud
cncf
fairwinds
intuit
SaaS Data Breaches on the Rise
SaaS is an integral part of the IT infrastructure for companies of all sizes nowadays. This model l...
2024-9-25 00:11:24 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
security
nuspire
cloud
dormant
GUEST ESSAY: Massive NPD breach tells us its high time to replace SSNs as an authenticator
By Ambuj KumarEver since the massive National Public Data (NPD) breach was disclosed a few weeks...
2024-9-24 23:46:44 | 阅读: 7 |
收藏
|
Security Boulevard - securityboulevard.com
npd
security
ssn
bureaus
pii
Anatomy of an Attack | ADR vs WAF and EDR Technology | Contrast Security
In today’s rapidly evolving cyber threat landscape, organizations face increasingly...
2024-9-24 21:0:0 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
security
contrast
adr
threats
influencers
Modernize your chaos engineering with commercial software transparency
While surprise is a major advantage in battle, it’s a nightmare for application security (AppSec) t...
2024-9-24 20:0:0 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
software
sscs
security
birenshtok
experiments
Israel’s Pager Attacks and Supply Chain Vulnerabilities
Israel’s brazen attacks on Hezbollah last week, in which hundreds of pagers and two-way radios expl...
2024-9-24 19:5:34 | 阅读: 8 |
收藏
|
Security Boulevard - securityboulevard.com
israel
hezbollah
security
chains
eavesdrop
Sophisticated Spear Phishing Attack Falls Flat Against ITDR
Last month, a threat actor used stolen credentials in an unsuccessful attempt to access a client’s...
2024-9-24 18:37:22 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
college
phishing
shield
adaptive
Ubuntu 22.04.5 LTS Released with Linux Kernel 6.8
Canonical has officially released Ubuntu 22.04.5 LTS, the fifth and final planned point release of...
2024-9-24 17:0:41 | 阅读: 6 |
收藏
|
Security Boulevard - securityboulevard.com
security
kernelcare
software
flavors
tuxcare
TuxCare Expands Presence in South America through New Strategic Partnership
PALO ALTO, Calif. – September 24, 2024 – TuxCare, a global innovator in enterprise-grad...
2024-9-24 16:0:51 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
tuxcare
iss
security
kernelcare
partnership
HTTP Headers Phishing Campaigns Used For Credential Theft
With rapid advancements in technology, threat actor attack methodologies are now evolving at an unp...
2024-9-24 15:0:13 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
phishing
malicious
tuxcare
harvesting
How to Choose the Right VMDR Tool?
The increasing complexity of IT infrastructure is creating new hurdles for organizations trying to...
2024-9-24 13:51:23 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
autosect
security
vmdr
threats
ColorTokens Acquires PureID to Advance Zero-Trust IT
ColorTokens, a provider of an Xshield platform for applying microsegmentation to networks, has acqu...
2024-9-24 13:48:28 | 阅读: 8 |
收藏
|
Security Boulevard - securityboulevard.com
identities
pureid
software
muralidhar
Key Takeaways from the Thales Data Threat Report: EME Edition
Key Takeaways from the Thales Data Threat Report: EME EditionmadhavTue, 09/24/2024 –...
2024-9-24 13:23:35 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
eme
respondents
thales
emerging
security
What Is Noise-Down Automation?
You may have noticed a strong theme recently on our website, social media, and content: noise. No m...
2024-9-24 06:16:11 | 阅读: 6 |
收藏
|
Security Boulevard - securityboulevard.com
noise
security
soar
playbooks
positives
Qmulos at the Forefront of OSCAL: Empowering Federal Agencies to Achieve OMB M-24-15 with Modern Compliance Technology
What is M-24-15 and What are the Challenges of ComplianceM-24-15 builds on the FedRAMP Authorizati...
2024-9-24 04:30:34 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
security
fedramp
cloud
oscal
processes
The CMMC Rule is Final!
Last week, the CMMC Final Rule (known as CFR 32) was released from OIRA, meaning no more changes ca...
2024-9-24 03:4:48 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
cmmc
assessments
preveil
contractors
compliant
Previous
52
53
54
55
56
57
58
59
Next