-
Please up-vote if you want this feature. Do not submit a new feature request.
-
Identity hiding requires an extra assumption on the KEMs – identity hiding of kems. We need to investigate that too.
koraa updated
10 months ago
-
# 每日安全资讯(2023-06-17)
- HackerOne Hacker Activity
- [ ] [Logging in without knowing credentials after logged out action](https://hackerone.com/reports/1971610)
- [ ] [CSRF with logout action](http…
-
**Is your feature request related to a problem? Please describe.**
I need a way to track HIPAA compliance as it relates to NIST through the OpenRMF tool.
**Describe the solution you'd like**
Have…
-
### SUMMARY
The Cybersecurity and Infrastructure Security Agency (CISA) and the Norwegian National Cyber Security Centre (NCSC-NO) are releasing this joint Cybersecurity Advisory (CSA) in response …
-
### SUMMARY
The Cybersecurity and Infrastructure Security Agency (CISA) and the Norwegian National Cyber Security Centre (NCSC-NO) are releasing this joint Cybersecurity Advisory (CSA) in response …
-
Micaela McMurrough, Ashden Fein, Caleb Skeath, and Matthew Harden of Covington and Burling write: On January 19, 2023, the National Institute of Standards and Technology (“NIST”) published a Concept…
-
Hi all,
I am proposing my company to use [draw.io](http://draw.io/) desktop app and these are the questionnaires from management and IT department, will be good if I have an expert here to help me …
-
**What happened?**
prowler aws --list-compliance-requirements results in error/ no requirements the frameworks listed below
**How to reproduce it**
Steps to reproduce the behavior:
1. run `…
-
Ransomware attacks keep increasing in volume and impact largely due to organizations' weak security controls. Mid-market companies are targeted as they possess a significant amount of valuable data …