-
### General
- [X] My feature does not exist in the latest version of Nexterm.
- [X] I have checked that my feature has not been suggested by anyone else.
### Your Idea
I can imagine that SSH…
-
### User Story:
As the Passport team,
I want to ensure that the cryptographic keys used for hashing and signing are secured against exposure,
So that the integrity and security of the platform are mai…
-
Hey!
I see that the SCA is a little bit less developed than other parts of the doc, so I'd be happy to expand on this to include various techniques, technologies, tools, and workflows on how this i…
-
"Backup and Recovery: A robust key recovery system, or process, is critical to ensure users can regain access to their wallet(s)if the private keys are lost or compromised"
Can you please shed some…
-
### Context
A software vendor may deploy mechanisms to gather and analyze various signals associated with subjects such as users, devices, etc. These signals, which can originate from diverse channe…
-
### Project Name
ProactiveOS: AI-Driven Autonomous OS Management
### Description
Description:
ProactiveOS is an advanced AI-driven operating system management solution designed to enhance system s…
-
https://ozsec.sharepoint.com/:w:/s/OzSec_Conference/EWw-FdRQpeZGnTbe9qdQ6NAB7N9m8pBvKOTJqpuAoZbdww?e=xsDW5Q
Ignite Your Cyber Security Journey at the OzSec 2024 Boot Camp
Join us for an intensi…
-
## Prepare
* [ ] Check: risk assessment methodology
* [x] [5 phases of software development life cycle and risk assessment Source](https://archer-soft.com/blog/5-phases-software-development-life…
-
### Description
Currently, the list of application names used by AppGenerator are a generic list of words. We would like to update this list with a sampling of "generic, real-world" application names…
TL41 updated
6 months ago
-
# What
Release tags periodically
# Why
There is an upstream dependency in nasa/trick on nasa/koviz for trickops tests it performs in CI. See also [trickops CI definition](https://github.com/n…
cazlo updated
2 weeks ago