unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Analysis of OT cyberattacks and malwares
The Digital revolution has transformed our world, and its impact is particularly evident in the rea...
2024-1-9 14:17:8 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
network
industroyer
iec
attacker
analysis
Discover the Consequences of a Data Breach
The average price of a data breach internationally in 2023 turned to $4.45 million, a 15% rise in t...
2024-1-9 13:37:8 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
security
threats
nuclear
attackers
NSFOCUS named a Major Player in IDC MarketScape: Worldwide Risk-Based Vulnerability Management Platforms 2023 Vendor Assessment
SANTA CLARA, Calif., January 9, 2024 – NSFOCUS, a global provider of intelligent hybrid security so...
2024-1-9 09:12:0 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
security
marketscape
network
Life in the Swimlane with Principal Data Scientist, Dima Skorokhodov
Welcome to the “Life in the Swimlane” blog series. Here we will feature interviews with Swimlaners...
2024-1-9 08:14:7 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
swimlane
enjoy
olympiads
solving
Ditch the Passwords: Discover the Magic of WebAuthn and Passkeys
In today’s digital age, passwords have become a necessary evil. We rely on them to protect our sen...
2024-1-9 06:5:35 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
webauthn
passkeys
passwords
security
USENIX Security ’23 – ‘Know Your Cybercriminal: Evaluating Attacker Preferences by Measuring Profile Sales on an Active, Leading Criminal Market for User Impersonation at Scale’
No one specificallySomeone on our general security teamA dedicated person/team that handles...
2024-1-9 04:0:0 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
security
cloud
architects
developers
Malicious Insiders: Definition, Motivation and Examples
Malicious insiders are only a small portion of threats that companies face today, but make no mist...
2024-1-9 03:36:3 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
malicious
insiders
insider
security
threats
The CISO’s Guide to a Modern GRC Program with Trust Assurance
The position of CISO is not an enviable one. Modern CISOs face enormous challenges like managing th...
2024-1-9 02:45:47 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
assurance
grc
security
cisos
processes
D3 Security is a proud participant in the Microsoft Security Copilot Partner Private Preview
VANCOUVER, BC, CANADA — 1/8/2024 — D3 Security today announced its participation in the Microsoft S...
2024-1-9 02:44:45 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
security
d3
microsoft
copilot
soar
Mastering the ‘cd’ Command: Tips and Tricks for Efficient Directory Navigation
Hot TopicsMastering the ‘cd’ Command: Tips and Tricks for Efficient Directory Navigation Ran...
2024-1-9 02:30:56 | 阅读: 9 |
收藏
|
Security Boulevard - securityboulevard.com
navigation
tips
navigating
security
spaces
Randall Munroe’s XKCD ‘Range Safety’
Cloud Security, Governance and Skills in 2024Step 1 of 6Who in your organization is responsib...
2024-1-9 02:0:0 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
cloud
security
governance
architects
developers
Secure Your Secrets with .env
Using environment variables to store secrets instead of writing them directly into your code is on...
2024-1-9 01:49:41 | 阅读: 6 |
收藏
|
Security Boulevard - securityboulevard.com
toecreds
leaderboard
tictactoe
repository
ssh
NIST: Better Defenses are Needed for AI Systems
The accelerating development and expanding deployment of AI systems is creating significant securit...
2024-1-9 01:28:3 | 阅读: 9 |
收藏
|
Security Boulevard - securityboulevard.com
security
machine
adversarial
generative
vassilev
NIS2 Compliance: Updated for 2024, Complete Guide
The Network Information Systems Directive (NIS) was published in 2016 and required EU critical inf...
2024-1-9 01:2:28 | 阅读: 7 |
收藏
|
Security Boulevard - securityboulevard.com
nis2
security
nis
network
USENIX Security ’23 – Zixin Wang, Danny Yuxing Huang, Yaxing Yao – ‘Exploring Tenants’ Preferences of Privacy Negotiation in Airbnb’
No one specificallySomeone on our general security teamA dedicated person/team that handles...
2024-1-9 00:0:0 | 阅读: 13 |
收藏
|
Security Boulevard - securityboulevard.com
security
cloud
developers
architects
Beyond Baby Steps: Fostering Diversity & Inclusion in the Parental Leave Adventure
Hot TopicsUSENIX Security ’23 - ‘Know Your Cybercriminal: Evaluating Attacker Preferences by...
2024-1-8 23:43:26 | 阅读: 12 |
收藏
|
Security Boulevard - securityboulevard.com
parents
parenting
datadome
botbuster
young
DOE Puts Up $70 Million to Secure US Energy Infrastructure
The federal government will spend as much as $70 million for technologies that will create a more r...
2024-1-8 23:10:46 | 阅读: 11 |
收藏
|
Security Boulevard - securityboulevard.com
water
security
threats
colonial
Votiro Cloud Protects Microsoft Teams from File-borne Threats
Virtual collaboration tools like Microsoft Teams are vital for business productivity – especially t...
2024-1-8 22:0:0 | 阅读: 16 |
收藏
|
Security Boulevard - securityboulevard.com
votiro
microsoft
cloud
threats
malicious
2023 Wrapped: Most Viewed Blogs of 2023
Hot TopicsRandall Munroe’s XKCD ‘Range Safety’ NIST: Better Defenses are Needed for AI Syste...
2024-1-8 21:5:38 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
security
onapsis
viewed
partnership
wrapped
SEC Cyber Incident Reporting Rules Pressure IT Security Leaders
As the Security and Exchange Commission (SEC) gets tough on businesses’ cybersecurity posture, IT s...
2024-1-8 21:0:4 | 阅读: 11 |
收藏
|
Security Boulevard - securityboulevard.com
security
materiality
requirement
comply
Previous
238
239
240
241
242
243
244
245
Next