unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
FortiJump: Yet Another Critical Fortinet 0-Day RCE
Remote code execution vulnerability still not acknowledged by Fortinet after 10+ days’ exploitati...
2024-10-23 23:22:27 | 阅读: 11 |
收藏
|
Security Boulevard - securityboulevard.com
security
exploited
richi
radical
DEF CON 32 – AppSec Village – Using EPSS for Better Management Vulnerability Management
Wednesday, October 23, 2024 Community Chats Webinars LibraryHomeCybersecurity News...
2024-10-23 23:0:0 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
security
network
webinars
boulevard
youtube
The Definitive Guide to SaaS Security eBook
Proactive strategies to protect your critical data, strengthen your SaaS security a...
2024-10-23 23:0:0 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
security
appomni
identify
definitive
ebook
News alert: INE Security shares cyber hygiene guidance for small- and medium-sized businesses
Cary, NC, Oct. 22, 2024, CyberNewswire — INE Security offers essential advice to prot...
2024-10-23 22:59:19 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
security
ine
network
software
Kasada Achieves AWS Security Competency Status
October 23, 2024 – SYDNEY and NEW YORK – Kasada, the pioneers transcending bot management by counte...
2024-10-23 21:49:37 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
kasada
competency
security
threats
delivering
How to evaluate OT security program maturity
An OT security program can lead to better resource use, improved security operations,...
2024-10-23 21:21:1 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
security
partial
sectrio
62443
iec
IBM Addresses AI, Quantum Security Risks with New Platform
IBM is rolling out a new platform aimed at giving organizes the tools needed to protect their data...
2024-10-23 20:43:20 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
security
guardian
generative
software
development
Keep your secrets secret: 5 core tips — and a call to action on modernizing
Many organizations have experienced significant data breaches after inadvertently exposing secrets...
2024-10-23 20:0:0 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
security
cloud
caspi
developers
enforce
10 Network Segmentation Best Practices
The security of your network is critical, and segmenting it is one of the most effective strategies...
2024-10-23 19:24:19 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
network
security
segments
firemon
Bolstering CTEM with AI and Purple Team Security
Continuous Threat Exposure Management (CTEM) is the shiny new gizmo in today’s cybersecurity toolbo...
2024-10-23 19:18:27 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
security
purple
ctem
cloud
preemptive
AI is Revolutionizing Cybersecurity — But Not in the Ways You Might Think
From the moment OpenAI introduced ChatGPT to the public, IT professionals braced themselves for the...
2024-10-23 17:22:48 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
network
llms
attackers
Election Security: Here’s What We Should Really Be Worried About
The chatter about hypothetical election vulnerabilities is overwhelming, drowning out the real thre...
2024-10-23 16:36:34 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
election
elections
political
electoral
security
Who Owns SaaS Identity Risk Management, Anyway? | Grip
The current state of SaaS security is sometimes like a game of hot potato—everyone knows it’s criti...
2024-10-23 16:24:58 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
security
shadow
governance
ownership
gaps
Showcasing our Industry-First BDR Solution in Singapore
SquareX @ Cyber Security World Asia + GovWare 2024October 2024 marked an exciting time for Square...
2024-10-23 11:7:28 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
security
squarex
govware
bdr
DEF CON 32 – AppSec Village – Lessons Learned from Building and Defending LLM Applications
Tuesday, October 22, 2024 Community Chats Webinars LibraryHomeCybersecurity NewsFe...
2024-10-23 08:2:34 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
security
webinars
boulevard
presenters
USENIX NSDI ’24 – Harvesting Idle Memory for Application-managed Soft State with Midas
Authors/Presenters:Yifan Qiao, Zhenyuan Ruan, Haoran Ma, Adam Belay, Miryung Kim, Harry...
2024-10-23 07:0:0 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
youtube
presenters
usenix
marc
21st
Modernizing Data Security: Imperva and IBM zSystems in Action
As data security continues to evolve, businesses require solutions that scale to modern...
2024-10-23 05:15:54 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
security
imperva
mainframe
zsystems
USENIX NSDI ’24 – SIEVE is Simpler than LRU: An Efficient Turn-Key Eviction Algorithm for Web Caches
Community Award Winner!Authors/Presenters:Yazhuo Zhang, Juncheng Yang, Yao Yue, Ymir V...
2024-10-23 05:0:0 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
presenters
usenix
youtube
rashmi
permalink
Non-Human Identity in the AI Age: A Technical Deep Dive
The concept of identity has expanded far beyond human users. Non-human identity (HNI) refers to th...
2024-10-23 04:2:14 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
identities
security
cloud
crucial
How Security Automation Platforms Streamline SOC Operations
What is a security automation platform?A security automation platform automates key tasks in secur...
2024-10-23 04:0:55 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
security
threats
processes
automating
turbine
Previous
26
27
28
29
30
31
32
33
Next