unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Kasada Achieves AWS Security Competency Status
October 23, 2024 – SYDNEY and NEW YORK – Kasada, the pioneers transcending bot management by counte...
2024-10-23 21:49:37 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
kasada
competency
security
threats
delivering
How to evaluate OT security program maturity
An OT security program can lead to better resource use, improved security operations,...
2024-10-23 21:21:1 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
security
partial
sectrio
62443
iec
IBM Addresses AI, Quantum Security Risks with New Platform
IBM is rolling out a new platform aimed at giving organizes the tools needed to protect their data...
2024-10-23 20:43:20 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
security
guardian
generative
software
development
Keep your secrets secret: 5 core tips — and a call to action on modernizing
Many organizations have experienced significant data breaches after inadvertently exposing secrets...
2024-10-23 20:0:0 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
security
cloud
caspi
developers
enforce
10 Network Segmentation Best Practices
The security of your network is critical, and segmenting it is one of the most effective strategies...
2024-10-23 19:24:19 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
network
security
segments
firemon
Bolstering CTEM with AI and Purple Team Security
Continuous Threat Exposure Management (CTEM) is the shiny new gizmo in today’s cybersecurity toolbo...
2024-10-23 19:18:27 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
security
purple
ctem
cloud
preemptive
AI is Revolutionizing Cybersecurity — But Not in the Ways You Might Think
From the moment OpenAI introduced ChatGPT to the public, IT professionals braced themselves for the...
2024-10-23 17:22:48 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
network
llms
attackers
Election Security: Here’s What We Should Really Be Worried About
The chatter about hypothetical election vulnerabilities is overwhelming, drowning out the real thre...
2024-10-23 16:36:34 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
election
elections
political
electoral
security
Who Owns SaaS Identity Risk Management, Anyway? | Grip
The current state of SaaS security is sometimes like a game of hot potato—everyone knows it’s criti...
2024-10-23 16:24:58 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
security
shadow
governance
ownership
gaps
Showcasing our Industry-First BDR Solution in Singapore
SquareX @ Cyber Security World Asia + GovWare 2024October 2024 marked an exciting time for Square...
2024-10-23 11:7:28 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
security
squarex
govware
bdr
DEF CON 32 – AppSec Village – Lessons Learned from Building and Defending LLM Applications
Tuesday, October 22, 2024 Community Chats Webinars LibraryHomeCybersecurity NewsFe...
2024-10-23 08:2:34 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
security
webinars
boulevard
presenters
USENIX NSDI ’24 – Harvesting Idle Memory for Application-managed Soft State with Midas
Authors/Presenters:Yifan Qiao, Zhenyuan Ruan, Haoran Ma, Adam Belay, Miryung Kim, Harry...
2024-10-23 07:0:0 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
youtube
presenters
usenix
marc
21st
Modernizing Data Security: Imperva and IBM zSystems in Action
As data security continues to evolve, businesses require solutions that scale to modern...
2024-10-23 05:15:54 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
security
imperva
mainframe
zsystems
USENIX NSDI ’24 – SIEVE is Simpler than LRU: An Efficient Turn-Key Eviction Algorithm for Web Caches
Community Award Winner!Authors/Presenters:Yazhuo Zhang, Juncheng Yang, Yao Yue, Ymir V...
2024-10-23 05:0:0 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
presenters
usenix
youtube
rashmi
permalink
Non-Human Identity in the AI Age: A Technical Deep Dive
The concept of identity has expanded far beyond human users. Non-human identity (HNI) refers to th...
2024-10-23 04:2:14 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
identities
security
cloud
crucial
How Security Automation Platforms Streamline SOC Operations
What is a security automation platform?A security automation platform automates key tasks in secur...
2024-10-23 04:0:55 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
security
threats
processes
automating
turbine
USENIX NSDI ’24 – Accelerating Skewed Workloads With Performance Multipliers in the TurboDB Distributed Database
Authors/Presenters:Jennifer Lam, Jeffrey Helt, Wyatt Lloyd, Haonan LuOur sincere than...
2024-10-23 03:0:0 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
usenix
presenters
youtube
0o97p
lu
DEF CON 32 – AppSec Village – Lessons Learned from Building and Defending LLM Applications
DEF CON 32 – Lessons Learned from Building and Defending LLM ApplicationsAuthors/Prese...
2024-10-23 03:0:0 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
youtube
presenters
timely
originating
syndicated
Is an AI-augmented SOC The Way Forward?
Even with the growing focus on innovation, fear, uncertainty, and doubt (FUD) continue to influence...
2024-10-23 01:57:43 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
security
nuspire
augmented
threats
socs
Elevating SaaS Security: The Strategic Role of Bug Bounty Programs
For engineers and security professionals working within SaaS environments, the standard suite of se...
2024-10-23 01:22:49 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
security
ethical
development
hackerone
Previous
28
29
30
31
32
33
34
35
Next