unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
It’s 11:30 pm, do you know what AI your apps are hanging out with? Discover your AI attack surface
Digital Transformation and Expanded AI Attack SurfacesA key trend that we continue to see amongst...
2024-8-6 21:0:27 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
cequence
security
approved
workloads
dss
White House Memo Pushes Federal Agencies on Cybersecurity
August 6, 2024On July 10th, the White House released Memorandum M24-14, giving administrative agen...
2024-8-6 21:0:0 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
software
memo
development
ciphers
ADR Security Technology for AppSec Vulnerabilities | Contrast Security
On Aug. 6, Contrast Security introduced a new security technology we call Applicati...
2024-8-6 21:0:0 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
security
contrast
adr
appsec
seeks
Meet BIX: Your New AI Ally in Cyber Risk and Exposure Management
What if I told you that managing cyber risk could be as easy as asking a colleague a qu...
2024-8-6 20:58:31 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
balbix
instruct
cio
security
bloggers
Navigating the DORA Landscape with AttackIQ’s Automated Assessment
The financial services and insurance industries have always been in the center of targeted waves...
2024-8-6 20:35:21 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
dora
security
assessments
attackiq
Orca Security Extends Visibility Into the Cloud Security
Orca Security this week added an ability to classify cloud security threats in a way th...
2024-8-6 20:35:20 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
cloud
security
orca
geron
Minimizing the Impact of Ransomware in the Cloud
It’s no secret that ransomware is a critical threat in today’s business landscape. According to one...
2024-8-6 20:12:39 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
security
ransomware
cloud
processes
mgm
I Have An SBOM, Now What ?!?
A Software Bill of Material (SBOM) lists the software components that are used in a piece of softwa...
2024-8-6 20:7:33 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
software
development
licensing
analysis
Cyber Risk Landscape Peer Report: 4 action items for your organization
Traditional measures to detect and respond to cyberattacks are inadequate to protect organizations...
2024-8-6 20:0:0 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
security
watkins
software
reduction
5 Best Practices for Managing Endpoints On a Global Scale
Managing hundreds or thousands of endpoints is hard enough when they’re all located in the same off...
2024-8-6 19:32:37 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
network
zones
geographic
distances
software
APIs, Web Applications Under Siege as Attack Surface Expands
Attackers are increasingly targeting web applications and APIs, with a nearly 50% year-over-year gr...
2024-8-6 16:34:58 | 阅读: 12 |
收藏
|
Security Boulevard - securityboulevard.com
security
development
injection
governance
How to Secure Your Organization from Shadow IT?
“Shadow IT” isn’t just a catchy term; it goes beyond official procedures. It also shows unmet emplo...
2024-8-6 14:24:3 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
shadow
security
cloud
kratikal
costs
7 Data Security Systems & Products Driving Value
In 2022, it’s not enough for businesses to rely on antivirus products or malware protection alone....
2024-8-6 12:42:39 | 阅读: 7 |
收藏
|
Security Boulevard - securityboulevard.com
security
symmetry
cloud
dataguard
operational
MSN: Russia takes aim at Sitting Ducks domains, bags 30,000+
Community Chats Webinars LibraryHomeCybersecurity NewsFeaturesIndustry SpotlightNews R...
2024-8-6 05:26:53 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
security
webinars
boulevard
gradient
Human vs AI Agents in Cybersecurity: Who Should Guard Your Data?
In the ever-evolving landscape of cybersecurity, we face a pivotal question: Should we entrust the...
2024-8-6 04:36:18 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
agents
threats
humans
hydra
USENIX Security ’23 – Gradient Obfuscation Gives a False Sense of Security in Federated Learning
Authors/Presenters:Kai Yue, Richeng Jin, Chau-Wai Wong, Dror Baron, Huaiyu Dai Many t...
2024-8-6 03:0:0 | 阅读: 8 |
收藏
|
Security Boulevard - securityboulevard.com
usenix
security
youtube
jin
network
How Using a VPN May Benefit Your Privacy
In the title of this post, keep in mind the keyword is may; as a forewarning, this is not a post...
2024-8-6 01:30:0 | 阅读: 8 |
收藏
|
Security Boulevard - securityboulevard.com
network
unfamiliar
parties
security
tunnel
Randall Munroe’s XKCD ‘Exam Numbers’
Community Chats Webinars LibraryHomeCybersecurity NewsFeaturesIndustry SpotlightNews R...
2024-8-6 01:0:0 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
webinars
security
boulevard
ftc
TikTok Abuses Kids, say DoJ and FTC
U.S. Justice Dept. and Federal Trade Commission file lawsuit, alleging TikTok broke COPPA law.T...
2024-8-6 00:19:9 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
lawsuit
collecting
richi
kid
addressed
Black Hat Fireside Chat: Token’s wearable MFA solution combines PKI, biometrics — in a ring
By Byron V. AcohidoLAS VEGAS — Humans, unsurprisingly, remain the weak link in cybers...
2024-8-6 00:7:16 | 阅读: 6 |
收藏
|
Security Boulevard - securityboulevard.com
acohido
sensor
security
network
hardware
Previous
99
100
101
102
103
104
105
106
Next