unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Balancing AI Performance and Safety: Lessons from PyData Berlin
Hi Nicolas! How was PyData in Berlin? Have you ever participated in a conference like this before?...
2024-7-1 23:48:0 | 阅读: 7 |
收藏
|
Security Boulevard - securityboulevard.com
machine
gitguardian
generative
pydata
Kasada’s Reflections on the Q3 2024 Forrester Wave™ – Bot Management Evaluation
“Security teams seeking a customer-obsessed partner should look at Kasada.” – The Forrester Wave™...
2024-7-1 23:22:27 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
kasada
evaluation
wave
forrester
criteria
June Recap: New AWS Sensitive Permissions and Services
As AWS continues to evolve, new services and permissions are frequently introduced to e...
2024-7-1 22:40:20 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
grants
tactic
mlflow
security
sagemaker
What is the Role of Explainable AI (XAI) In Security?
Artificial intelligence (AI) has been around for decades, but we are only starting to realize its f...
2024-7-1 20:17:33 | 阅读: 9 |
收藏
|
Security Boulevard - securityboulevard.com
xai
security
threats
The Urgent Need for Digital Executive Protection: A CEO’s Perspective
The role of the CEO and the entire C-suite extends far beyond the traditional boardroom. Executives...
2024-7-1 20:15:22 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
security
blackcloak
leadership
ceos
urgent
Does the GDPR Really Say That? Clearing Up Common Misunderstandings
The General Data Protection Regulation (GDPR) is a comprehensive data privacy law enacted by the E...
2024-7-1 19:37:24 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
employer
interests
obligation
lawful
employment
Model Extraction from Neural Networks
A new paper, “Polynomial Time Cryptanalytic Extraction of Neural Network Models,” by Ad...
2024-7-1 19:5:25 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
network
polynomial
schneier
relu
Google to distrust Entrust SSL/TLS certificates: What this means for the industry
In a significant move to enhance digital certificate security, Google has announced its decision to...
2024-7-1 19:4:0 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
entrust
security
sectigo
cas
lifecycle
5 New Features that Streamline Security and Compliance with LogRhythm Axon
The output of a security and information event management (SIEM) platform is only as good as the da...
2024-7-1 19:3:1 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
logrhythm
axon
quarter
security
streamline
Expand Log Source Collection and Flexibility with LogRhythm 7.17
Behind every LogRhythm product release, our team puts customers at the very core. That’s part of ou...
2024-7-1 19:1:5 | 阅读: 9 |
收藏
|
Security Boulevard - securityboulevard.com
logrhythm
security
licensing
flexibility
Benefits of JSON Log Source Collection for LogRhythm Customers
When it comes to log sources, LogRhythm recognizes there are limitless options. After all, more tha...
2024-7-1 19:0:58 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
logrhythm
lumberjack
cisos
LogRhythm’s Machine Data Intelligence Fabric Empowers AI-Ready Organizations to Enter the Modern Era with Confidence
LogRhythm, the company helping security teams stop breaches by turning disconnected dat...
2024-7-1 19:0:24 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
logrhythm
security
efficiency
mdi
network
Cyber Trust Mark: The Impacts and Incentives of Early Adoption
The internet of things (IoT) is at an inflection point. Years of high-profile cyberattacks, growing...
2024-7-1 18:0:53 | 阅读: 22 |
收藏
|
Security Boulevard - securityboulevard.com
security
retailers
regulations
adopters
Cybersecurity Workforce Sustainability has a Problem. DEI Could be the Solution.
It’s been a difficult few years for diversity, equity and inclusion (DEI) programs in the workplace...
2024-7-1 17:0:28 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
talent
security
dei
hiring
New Tech Q&A: Adaptiva – CrowdStrike alliance highlights trend of blending IT and security systems
By Byron V. AcohidoThe coalescing of the next-gen security platforms that will carry us forward c...
2024-7-1 15:30:14 | 阅读: 8 |
收藏
|
Security Boulevard - securityboulevard.com
crowdstrike
adaptiva
security
singh
Remote Rigor: Safeguarding Data in the Age of Digital Nomads
Digital nomads are not the same as work-from-home employees. They are a subset of workers prioritiz...
2024-7-1 15:24:38 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
regulatory
security
remote
encryption
nomads
USENIX Security ’23 – Beyond The Gates: An Empirical Analysis of HTTP-Managed Password Stealers and Operators
Authors/Presenters:Athanasios Avgetidis, Omar Alrawi, Kevin Valakuzhy, Charles Lever, P...
2024-6-30 23:0:0 | 阅读: 6 |
收藏
|
Security Boulevard - securityboulevard.com
security
youtube
usenix
avgetidis
monrose
Montgomery County, Md.’s Chatbot Shows GenAI in Action
I’m always looking for best practices and examples to share around government AI and c...
2024-6-30 17:17:10 | 阅读: 7 |
收藏
|
Security Boulevard - securityboulevard.com
chatbot
monty
county
resident
residents
Staying Ahead of Adversarial AI with Incident Response Automation
5 min read·Just now—A Security Engineering Commentary from industry insider Rohan...
2024-6-30 08:5:32 | 阅读: 7 |
收藏
|
Security Boulevard - securityboulevard.com
security
secops
adversarial
invest
chains
USENIX Security ’23 – A Plot is Worth a Thousand Words: Model Information Stealing Attacks via Scientific Plots
Authors/Presenters:Boyang Zhang and Xinlei He, Yun Shen, Tianhao Wang, Yang Zhang Ma...
2024-6-29 23:0:0 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
security
usenix
youtube
nocookie
network
Previous
133
134
135
136
137
138
139
140
Next