unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Securing Financial Operations: Know Your SaaS
Regulatory concerns may have slowed initial SaaS adoption for financial services companies, but tod...
2024-10-22 00:54:23 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
security
regulatory
regulations
threats
sspm
Data Breach Statistics [2024] : Penalties and Fines for Major regulations
In today’s data-driven world, data breaches are one of the most significant threats facing organiza...
2024-10-21 23:34:4 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
fines
regulations
penalties
ccpa
violation
USENIX NSDI ’24 – OPPerTune: Post-Deployment Configuration Tuning of Services Made Easy
Authors/Presenters:Gagan Somashekar, Karan Tandon, Anush Kini, Chieh-Chun Chang, Petr H...
2024-10-21 23:0:0 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
presenters
usenix
youtube
superb
clara
Testing Security Controls in the Indo-Pacific: A Critical DoD Imperative
AttackIQPublishedOctober 21, 2024The Indo-Pacific region has emerged as a focal...
2024-10-21 21:56:12 | 阅读: 7 |
收藏
|
Security Boulevard - securityboulevard.com
security
dod
threats
pacific
indo
What is Vulnerability Management? Compliance, Challenges, & Solutions
Is your vulnerability management game on point? If it’s not, you’re handing attackers an open invit...
2024-10-21 21:6:28 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
security
strobes
rbvm
attackers
Chinese Research Using Quantum System to Crack Encryption a ‘Cautionary Tale’
Chinese researchers this month threw a scare in the IT industry by saying they had used a quantum c...
2024-10-21 21:4:15 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
encryption
threats
wave
security
Phishing Attacks Snare Security, IT Leaders
Despite 80% of IT leaders expressing confidence that their organization won’t fall for phishing att...
2024-10-21 20:2:41 | 阅读: 6 |
收藏
|
Security Boulevard - securityboulevard.com
security
leaders
phishing
marrè
gap
AI and the SEC Whistleblower Program
Tax farming is the practice of licensing tax collection to private contractors. Used heavily in anc...
2024-10-21 19:9:33 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
firms
tips
K-12 Google & Microsoft 365 Data Loss Prevention using Cloud Monitor by ManagedMethods
Far too often, we hear about schools facing cybersecurity crises because of a simple human err...
2024-10-21 19:5:0 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
cloud
district
dlp
microsoft
Escape vs Qualys
Qualys has often been synonymous with DAST and has been a major player in the application security...
2024-10-21 18:25:0 | 阅读: 0 |
收藏
|
Security Boulevard - securityboulevard.com
qualys
security
dast
developers
New Anti-Bot Services on the Dark Web Help Phishing Pages Bypass Google’s Red Page
Novel anti-bot services are being advertised on the dark web, offering cybercriminals advanced too...
2024-10-21 17:0:32 | 阅读: 10 |
收藏
|
Security Boulevard - securityboulevard.com
phishing
security
slashnext
bots
otus
Policy as code in Kubernetes: security with seccomp and network policies
The dynamic world of Kubernetes and cloud security is constantly evolving. As we explore this compl...
2024-10-21 12:21:6 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
kubernetes
security
network
seccomp
gitops
BSides Exeter – Ross Bevington’s Turning The Tables: Using Cyber Deception To Hunt Phishers At Scale
Community Chats Webinars LibraryHomeCybersecurity NewsFeaturesIndustry SpotlightNews R...
2024-10-21 03:0:0 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
security
network
webinars
bloggers
Ransomware Rising – Understanding, Preventing and Surviving Cyber Extortion
Over the past 6 months I have been researching ransomware, and not even from the technical angle (w...
2024-10-21 02:51:18 | 阅读: 5 |
收藏
|
Security Boulevard - securityboulevard.com
ransomware
security
attackers
cloud
downtime
DEF CON 32 – AppSec Considerations From The Casino Industry
Authors/Presenters:Aleise McGowan, Tennisha MartinOur sincere appreciation to DEF CON...
2024-10-20 23:0:0 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
youtube
presenters
aleise
publishing
USENIX NSDI ’24 – Reasoning About Network Traffic Load Property at Production Scale
Authors/Presenters:Ruihan Li, Fangdan Ye, Yifei Yuan, Ruizhen Yang, Bingchuan Tian, Tia...
2024-10-20 23:0:0 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
youtube
usenix
presenters
yifei
marc
USENIX NSDI ’24 – Crescent: Emulating Heterogeneous Production Network at Scale
Authors/Presenters:Zhaoyu Gao, Anubhavnidhi Abhashkumar, Zhen Sun, Weirong Jiang, Yi Wa...
2024-10-20 03:0:0 | 阅读: 4 |
收藏
|
Security Boulevard - securityboulevard.com
usenix
presenters
youtube
abhashkumar
regency
USENIX NSDI ’24 – A High-Performance Design, Implementation, Deployment, and Evaluation of The Slim Fly Network
Authors/Presenters:Nils Blach, Maciej Besta, Daniele De Sensi, Jens Domke, Hussein Hara...
2024-10-19 23:0:0 | 阅读: 3 |
收藏
|
Security Boulevard - securityboulevard.com
youtube
presenters
usenix
regency
security
Managing Foreign Government Information (FGI) on a Network
If you’re a firm that works with foreign governments, in addition to certifications like ISO 27001...
2024-10-19 07:12:7 | 阅读: 1 |
收藏
|
Security Boulevard - securityboulevard.com
fgi
marking
security
classified
Pentesting Authentication
Why Pentest Authentication?Authentication controls are the first line of defense to protect applic...
2024-10-19 05:46:6 | 阅读: 2 |
收藏
|
Security Boulevard - securityboulevard.com
security
bypass
pentesters
Previous
31
32
33
34
35
36
37
38
Next