• Search
  • Topics
  • Nodes
< back

#0ciso2ciso

15 27 Toot LinkedIn
A chart of hourly posts over the last week (for big screens). A chart of hourly posts over the last week (for small screens).

1

From ciso2ciso.com

What You Need to Know for WE24

1 1

Learn more about how to prepare for WE24, SWE's annual conference.

#0ciso2ciso

11h ago


1

From ciso2ciso.com

Lockheed Martin: A Supportive Workplace for Women

1 1

Discover the stories of three women who re-entered the workforce after a career break through Lockheed Martin’s returnship program, Chapter Next.

#0ciso2ciso

11h ago


1

From ciso2ciso.com

DORA: What You Need to Know – Source:www.hackerone.com

1 1

Source: www.hackerone.com - Author: Kayla Underkoffler. The Digital Operational Resilience Act (DORA) is a European Union (EU) regulation that was enacted i

#hackerone #0ciso2ciso

11h ago


1

From ciso2ciso.com

Pentesting for Web Applications – Source:www.hackerone.com

1 1

Source: www.hackerone.com - Author: HackerOne Pentest Delivery Team. Web applications are prime targets for cybercriminals across industries, from e-commerce

#hackerone #0ciso2ciso

11h ago


1

From ciso2ciso.com

How to Protect Yourself from Bank Fraud – Source:www.mcafee.com

1 1

Source: www.mcafee.com - Author: Amy Bunn. Whether or not you’re much into online banking, protecting yourself f

#0ciso2ciso #mcafeesecurity

3h ago


1

From ciso2ciso.com

10 Years of the GitHub Security Bug Bounty Program – Source:www.hackerone.com

1 1

Source: www.hackerone.com - Author: HackerOne. GitHub Security recently celebrated the 10th anniversary of its bug bounty program. We’ve been honored to be

#hackerone #0ciso2ciso

11h ago


1

From ciso2ciso.com

Internet Archive Slowly Revives After DDoS Barrage – Source: www.darkreading.com

1 1

Source: www.darkreading.com - Author: Kristina Beek, Associate Editor, Dark Reading Source: Postmodern Studio via Alamy Stock PhotoThe Internet Archive, a no

#0ciso2ciso #darkreadingsecurity

10h ago


1

From ciso2ciso.com

Embracing Resilience: HackerOne’s Approach to Disaster Recovery – Source:www.hackerone.com

1 1

Source: www.hackerone.com - Author: Martzen Haagsma. Let's explore an essential yet often overlooked aspect: Disaster Recovery, or DR for short. It serves as

#hackerone #0ciso2ciso

5h ago


1

From ciso2ciso.com

SAS CTF and the many ways to persist a kernel shellcode on Windows 7 – Source: securelist.com

1 1

Source: securelist.com - Author: Igor Kuznetsov, Boris Larin SAS

#0ciso2ciso #securelist

14h ago


1

From ciso2ciso.com

Mastering Product-led Onboarding in B2B SaaS: A Comprehensive Guide – Source: securityboulevard.com

1 1

Source: securityboulevard.com - Author: Deepak Gupta - Tech Entrepreneur, Cybersecurity Author In the high-stakes world of B2B SaaS, where traditional grow

#0ciso2ciso #securityboulevard

7h ago


1

From ciso2ciso.com

Smashing Security podcast #389: WordPress vs WP Engine, and the Internet Archive is down – Source: grahamcluley.com

1 1

Source: grahamcluley.com - Author: Graham Cluley Skip to content WordPress’s emperor, Matt Mullenweg, demands a hefty tribute from WP Engine, and

#0ciso2ciso #GrahamCluley

11h ago


1

From ciso2ciso.com

A critical flaw in Kubernetes Image Builder could allow attackers to gain root access – Source: securityaffairs.com

1 1

Source: securityaffairs.com - Author: Pierluigi Paganini A critical flaw in Kubernetes Image Builder could allow attackers to gain root access if exploit

#hacking #malware #security #0ciso2ciso #hackingnews #breakingnews #securitynews #securityaffairs #pierluigipaganini #securityaffairscom

19h ago


1

From ciso2ciso.com

Ex-Oracle, Google Engineers Raise $7m From Accel for Public Launch of Simplismart to Empower AI Adoption – Source: www.darkreading.com

1 1

Source: www.darkreading.com - Author: PRESS RELEASEOctober 17, 2024: OpenAI is projected to generate over $10 billion in revenue next year, a clear sign th

#0ciso2ciso #darkreadingsecurity

10h ago

Showing first 15 out of 15