All Articles

Ordered by Date Received : Year: "2024" Month: "02" Day: "27" Hour: "10"
Page: 1 (of 0)

Total Articles in this collection: 22

Navigation Help at the bottom of the page
Article: New Hugging Face Vulnerability Exposes AI Models to Supply Chain Attacks - published 9 months ago.
Content:
https://thehackernews.com/2024/02/new-hugging-face-vulnerability-exposes.html   
Published: 2024 02 27 10:18:00
Received: 2024 02 27 10:44:58
Feed: The Hacker News
Source: The Hacker News
Category: News
Topic: Cyber Security
Article: New Hugging Face Vulnerability Exposes AI Models to Supply Chain Attacks - published 9 months ago.
Content:
https://thehackernews.com/2024/02/new-hugging-face-vulnerability-exposes.html   
Published: 2024 02 27 10:18:00
Received: 2024 02 27 10:44:58
Feed: The Hacker News
Source: The Hacker News
Category: News
Topic: Cyber Security
Article: Five Eyes Agencies Expose APT29's Evolving Cloud Attack Tactics - published 9 months ago.
Content:
https://thehackernews.com/2024/02/five-eyes-agencies-expose-apt29s.html   
Published: 2024 02 27 10:34:00
Received: 2024 02 27 10:44:58
Feed: The Hacker News
Source: The Hacker News
Category: News
Topic: Cyber Security
Article: Five Eyes Agencies Expose APT29's Evolving Cloud Attack Tactics - published 9 months ago.
Content:
https://thehackernews.com/2024/02/five-eyes-agencies-expose-apt29s.html   
Published: 2024 02 27 10:34:00
Received: 2024 02 27 10:44:58
Feed: The Hacker News
Source: The Hacker News
Category: News
Topic: Cyber Security
Cyber Tzar Free Score Certificate
Cyber Tzar Free Score Certificate
Article: New Hugging Face Vulnerability Exposes AI Models to Supply Chain Attacks - published 9 months ago.
Content:
https://thehackernews.com/2024/02/new-hugging-face-vulnerability-exposes.html   
Published: 2024 02 27 10:18:00
Received: 2024 02 27 10:44:05
Feed: The Hacker News [ THN ] - Best Security Blog
Source: The Hacker News [ THN ] - Best Security Blog
Category: Cyber Security
Topic: Cyber Security
Article: New Hugging Face Vulnerability Exposes AI Models to Supply Chain Attacks - published 9 months ago.
Content:
https://thehackernews.com/2024/02/new-hugging-face-vulnerability-exposes.html   
Published: 2024 02 27 10:18:00
Received: 2024 02 27 10:44:05
Feed: The Hacker News [ THN ] - Best Security Blog
Source: The Hacker News [ THN ] - Best Security Blog
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Score Summary
Cyber Tzar Score Summary
Cyber Tzar Free Score Certificate
Cyber Tzar Free Score Certificate
Article: Five Eyes Agencies Expose APT29's Evolving Cloud Attack Tactics - published 9 months ago.
Content:
https://thehackernews.com/2024/02/five-eyes-agencies-expose-apt29s.html   
Published: 2024 02 27 10:34:00
Received: 2024 02 27 10:44:05
Feed: The Hacker News [ THN ] - Best Security Blog
Source: The Hacker News [ THN ] - Best Security Blog
Category: Cyber Security
Topic: Cyber Security
Article: Five Eyes Agencies Expose APT29's Evolving Cloud Attack Tactics - published 9 months ago.
Content:
https://thehackernews.com/2024/02/five-eyes-agencies-expose-apt29s.html   
Published: 2024 02 27 10:34:00
Received: 2024 02 27 10:44:05
Feed: The Hacker News [ THN ] - Best Security Blog
Source: The Hacker News [ THN ] - Best Security Blog
Category: Cyber Security
Topic: Cyber Security
Article: Bitwarden Secrets Manager integrates with Ansible Playbook - published 9 months ago.
Content:
https://www.helpnetsecurity.com/2024/02/27/bitwarden-ansible-playbook-integration/   
Published: 2024 02 27 10:00:50
Received: 2024 02 27 10:43:05
Feed: Help Net Security - News
Source: Help Net Security - News
Category: Cyber Security
Topic: Cyber Security
Article: Bitwarden Secrets Manager integrates with Ansible Playbook - published 9 months ago.
Content:
https://www.helpnetsecurity.com/2024/02/27/bitwarden-ansible-playbook-integration/   
Published: 2024 02 27 10:00:50
Received: 2024 02 27 10:43:05
Feed: Help Net Security - News
Source: Help Net Security - News
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Article: Defending software build pipelines from malicious attack - published almost 2021 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/defending-software-build-pipelines-from-malicious-attack   
Published: 0004 02 03 10:56:27
Received: 2024 02 27 10:41:47
Feed: NCSC – Blog Feed
Source: National Cyber Security Centre (NCSC)
Category: Blogs
Topic: Cyber Security
Article: Defending software build pipelines from malicious attack - published almost 2021 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/defending-software-build-pipelines-from-malicious-attack   
Published: 0004 02 03 10:56:27
Received: 2024 02 27 10:41:47
Feed: NCSC – Blog Feed
Source: National Cyber Security Centre (NCSC)
Category: Blogs
Topic: Cyber Security
Cyber Tzar Gold Score Certificate
Cyber Tzar Gold Score Certificate
Article: Connecting your smart devices with confidence - published over 2017 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/connecting-smart-devices-with-confidence   
Published: 0007 07 01 11:07:21
Received: 2024 02 27 10:41:46
Feed: NCSC – Blog Feed
Source: National Cyber Security Centre (NCSC)
Category: Blogs
Topic: Cyber Security
Article: Connecting your smart devices with confidence - published over 2017 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/connecting-smart-devices-with-confidence   
Published: 0007 07 01 11:07:21
Received: 2024 02 27 10:41:46
Feed: NCSC – Blog Feed
Source: National Cyber Security Centre (NCSC)
Category: Blogs
Topic: Cyber Security
Article: The problems with patching - published over 5 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/the-problems-with-patching   
Published: 2019 07 16 08:44:00
Received: 2024 02 27 10:41:38
Feed: NCSC – Blog Feed
Source: National Cyber Security Centre (NCSC)
Category: Blogs
Topic: Cyber Security
Article: The problems with patching - published over 5 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/the-problems-with-patching   
Published: 2019 07 16 08:44:00
Received: 2024 02 27 10:41:38
Feed: NCSC – Blog Feed
Source: National Cyber Security Centre (NCSC)
Category: Blogs
Topic: Cyber Security
Cyber Tzar Score Analysis
Cyber Tzar Score Analysis
Article: Video conferencing: new guidance for individuals and for organisations - published over 4 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/video-conferencing-new-guidance-for-individuals-and-for-organisations   
Published: 2020 05 07 13:05:07
Received: 2024 02 27 10:41:35
Feed: NCSC – Blog Feed
Source: National Cyber Security Centre (NCSC)
Category: Blogs
Topic: Cyber Security
Article: Video conferencing: new guidance for individuals and for organisations - published over 4 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/video-conferencing-new-guidance-for-individuals-and-for-organisations   
Published: 2020 05 07 13:05:07
Received: 2024 02 27 10:41:35
Feed: NCSC – Blog Feed
Source: National Cyber Security Centre (NCSC)
Category: Blogs
Topic: Cyber Security
Cyber Tzar Risk Impact Distribution
Cyber Tzar Risk Impact Distribution
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Article: Time to shed Python 2 - published over 3 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/time-to-shed-python-2   
Published: 2021 08 02 15:23:23
Received: 2024 02 27 10:41:20
Feed: NCSC – Blog Feed
Source: National Cyber Security Centre (NCSC)
Category: Blogs
Topic: Cyber Security
Article: Time to shed Python 2 - published over 3 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/time-to-shed-python-2   
Published: 2021 08 02 15:23:23
Received: 2024 02 27 10:41:20
Feed: NCSC – Blog Feed
Source: National Cyber Security Centre (NCSC)
Category: Blogs
Topic: Cyber Security
Article: Which smartphone is the most secure? - published over 2 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/which-smartphone-most-secure   
Published: 2022 07 26 07:57:26
Received: 2024 02 27 10:40:54
Feed: NCSC – Blog Feed
Source: National Cyber Security Centre (NCSC)
Category: Blogs
Topic: Cyber Security
Article: Which smartphone is the most secure? - published over 2 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/which-smartphone-most-secure   
Published: 2022 07 26 07:57:26
Received: 2024 02 27 10:40:54
Feed: NCSC – Blog Feed
Source: National Cyber Security Centre (NCSC)
Category: Blogs
Topic: Cyber Security
Cyber Tzar Risk Impact Assesment
Cyber Tzar Risk Impact Assesment
Article: What's new with Windows 10? - published over 2 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/whats-new-windows-10   
Published: 2022 07 26 09:01:02
Received: 2024 02 27 10:40:52
Feed: NCSC – Blog Feed
Source: National Cyber Security Centre (NCSC)
Category: Blogs
Topic: Cyber Security
Article: What's new with Windows 10? - published over 2 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/whats-new-windows-10   
Published: 2022 07 26 09:01:02
Received: 2024 02 27 10:40:52
Feed: NCSC – Blog Feed
Source: National Cyber Security Centre (NCSC)
Category: Blogs
Topic: Cyber Security
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Cyber Tzar Gold Score Certificate
Cyber Tzar Gold Score Certificate
Article: Introducing Host Based Capability (HBC) - published over 2 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/introducing-host-based-capability-hbc   
Published: 2022 07 28 07:36:46
Received: 2024 02 27 10:40:46
Feed: NCSC – Blog Feed
Source: National Cyber Security Centre (NCSC)
Category: Blogs
Topic: Cyber Security
Article: Introducing Host Based Capability (HBC) - published over 2 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/introducing-host-based-capability-hbc   
Published: 2022 07 28 07:36:46
Received: 2024 02 27 10:40:46
Feed: NCSC – Blog Feed
Source: National Cyber Security Centre (NCSC)
Category: Blogs
Topic: Cyber Security
Article: We're trying to cure cancer, why would anyone attack us? - published over 2 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/were-trying-cure-cancer-why-would-anyone-attack-us   
Published: 2022 07 28 10:39:42
Received: 2024 02 27 10:40:44
Feed: NCSC – Blog Feed
Source: National Cyber Security Centre (NCSC)
Category: Blogs
Topic: Cyber Security
Article: We're trying to cure cancer, why would anyone attack us? - published over 2 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/were-trying-cure-cancer-why-would-anyone-attack-us   
Published: 2022 07 28 10:39:42
Received: 2024 02 27 10:40:44
Feed: NCSC – Blog Feed
Source: National Cyber Security Centre (NCSC)
Category: Blogs
Topic: Cyber Security
Cyber Tzar Risk Groups Explained
Cyber Tzar Risk Groups Explained
Article: Let them paste passwords - published over 2 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/let-them-paste-passwords   
Published: 2022 07 28 13:22:39
Received: 2024 02 27 10:40:43
Feed: NCSC – Blog Feed
Source: National Cyber Security Centre (NCSC)
Category: Blogs
Topic: Cyber Security
Article: Let them paste passwords - published over 2 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/let-them-paste-passwords   
Published: 2022 07 28 13:22:39
Received: 2024 02 27 10:40:43
Feed: NCSC – Blog Feed
Source: National Cyber Security Centre (NCSC)
Category: Blogs
Topic: Cyber Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Score Analysis
Cyber Tzar Score Analysis
Article: "Do what I mean!" - time to focus on developer intent - published over 1 year ago.
Content:
https://www.ncsc.gov.uk/blog-post/-do-what-i-mean-----time-to-focus-on-developer-intent   
Published: 2023 05 25 14:09:00
Received: 2024 02 27 10:40:35
Feed: NCSC – Blog Feed
Source: National Cyber Security Centre (NCSC)
Category: Blogs
Topic: Cyber Security
Article: "Do what I mean!" - time to focus on developer intent - published over 1 year ago.
Content:
https://www.ncsc.gov.uk/blog-post/-do-what-i-mean-----time-to-focus-on-developer-intent   
Published: 2023 05 25 14:09:00
Received: 2024 02 27 10:40:35
Feed: NCSC – Blog Feed
Source: National Cyber Security Centre (NCSC)
Category: Blogs
Topic: Cyber Security
Article: A problem shared is . . . in the research problem book - published over 1 year ago.
Content:
https://www.ncsc.gov.uk/blog-post/problem-shared-problem-research-book   
Published: 2023 08 01 12:09:35
Received: 2024 02 27 10:40:33
Feed: NCSC – Blog Feed
Source: National Cyber Security Centre (NCSC)
Category: Blogs
Topic: Cyber Security
Article: A problem shared is . . . in the research problem book - published over 1 year ago.
Content:
https://www.ncsc.gov.uk/blog-post/problem-shared-problem-research-book   
Published: 2023 08 01 12:09:35
Received: 2024 02 27 10:40:33
Feed: NCSC – Blog Feed
Source: National Cyber Security Centre (NCSC)
Category: Blogs
Topic: Cyber Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Unleashing the power of cloud with containerisation - published 9 months ago.
Content:
https://www.ncsc.gov.uk/blog-post/unleashing-the-power-of-cloud-with-containerisation   
Published: 2024 02 13 10:01:24
Received: 2024 02 27 10:40:27
Feed: NCSC – Blog Feed
Source: National Cyber Security Centre (NCSC)
Category: Blogs
Topic: Cyber Security
Article: Unleashing the power of cloud with containerisation - published 9 months ago.
Content:
https://www.ncsc.gov.uk/blog-post/unleashing-the-power-of-cloud-with-containerisation   
Published: 2024 02 13 10:01:24
Received: 2024 02 27 10:40:27
Feed: NCSC – Blog Feed
Source: National Cyber Security Centre (NCSC)
Category: Blogs
Topic: Cyber Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Security and usability: you CAN have it all! - published about 3144 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/security-and-usability--you-can-have-it-all-   
Published: 5169 02 14 09:34:00
Received: 2024 02 27 10:40:26
Feed: NCSC – Blog Feed
Source: National Cyber Security Centre (NCSC)
Category: Blogs
Topic: Cyber Security
Article: Security and usability: you CAN have it all! - published about 3144 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/security-and-usability--you-can-have-it-all-   
Published: 5169 02 14 09:34:00
Received: 2024 02 27 10:40:26
Feed: NCSC – Blog Feed
Source: National Cyber Security Centre (NCSC)
Category: Blogs
Topic: Cyber Security
Article: DevSecOps: Integrating Security Into Your CI/CD Pipeline | by Jayaprakash - Medium - published 9 months ago.
Content: DevSecOps as illustrated below, provides the layer across all the stages of the DevOps cycle. Lets look at what devsecops addresses in each one of the ...
https://medium.com/@jayaprakashjas/devsecops-integrating-security-into-your-ci-cd-pipeline-f055b4913ebf   
Published: 2024 02 26 19:08:35
Received: 2024 02 27 10:28:14
Feed: Google Alert - devsecops
Source: Google Alert
Category: News
Topic: DevSecOps
Article: DevSecOps: Integrating Security Into Your CI/CD Pipeline | by Jayaprakash - Medium - published 9 months ago.
Content: DevSecOps as illustrated below, provides the layer across all the stages of the DevOps cycle. Lets look at what devsecops addresses in each one of the ...
https://medium.com/@jayaprakashjas/devsecops-integrating-security-into-your-ci-cd-pipeline-f055b4913ebf   
Published: 2024 02 26 19:08:35
Received: 2024 02 27 10:28:14
Feed: Google Alert - devsecops
Source: Google Alert
Category: News
Topic: DevSecOps
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Cyber Security Analytics DevSecOps Engineer in Newbury - Reed.co.uk - published 9 months ago.
Content: Apply for this Contract full-time, Cyber Security Analytics DevSecOps Engineer job in Newbury on Reed.co.uk, the UK's #1 job site.
https://www.reed.co.uk/jobs/cyber-security-analytics-devsecops-engineer/52201749?source=searchResults&filter=%2Fjobs   
Published: 2024 02 27 08:20:28
Received: 2024 02 27 10:28:11
Feed: Google Alert - devsecops
Source: Google Alert
Category: News
Topic: DevSecOps
Article: Cyber Security Analytics DevSecOps Engineer in Newbury - Reed.co.uk - published 9 months ago.
Content: Apply for this Contract full-time, Cyber Security Analytics DevSecOps Engineer job in Newbury on Reed.co.uk, the UK's #1 job site.
https://www.reed.co.uk/jobs/cyber-security-analytics-devsecops-engineer/52201749?source=searchResults&filter=%2Fjobs   
Published: 2024 02 27 08:20:28
Received: 2024 02 27 10:28:11
Feed: Google Alert - devsecops
Source: Google Alert
Category: News
Topic: DevSecOps
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Risk Impact Assesment
Cyber Tzar Risk Impact Assesment
Article: DevSecOps Engineer II at Keyword Studios - GameJobs.co - published 9 months ago.
Content: DevSecOps Engineer II at Keyword Studios - Helpshift is looking for a DevSecOps Specialist within the DevOps team.
https://gamejobs.co/DevSecOps-Engineer-II-at-Keyword-Studios   
Published: 2024 02 27 08:44:12
Received: 2024 02 27 10:28:11
Feed: Google Alert - devsecops
Source: Google Alert
Category: News
Topic: DevSecOps
Article: DevSecOps Engineer II at Keyword Studios - GameJobs.co - published 9 months ago.
Content: DevSecOps Engineer II at Keyword Studios - Helpshift is looking for a DevSecOps Specialist within the DevOps team.
https://gamejobs.co/DevSecOps-Engineer-II-at-Keyword-Studios   
Published: 2024 02 27 08:44:12
Received: 2024 02 27 10:28:11
Feed: Google Alert - devsecops
Source: Google Alert
Category: News
Topic: DevSecOps

All Articles

Ordered by Date Received : Year: "2024" Month: "02" Day: "27" Hour: "10"
Page: 1 (of 0)

Total Articles in this collection: 22


  • "All Articles" links back to the front page, effectivly the Planet "Home Page"; shows all articles, with no selections, or groupings.
  • Default date ordering is by "Received Date" (due to not all RSS feeds having a "Published Date").
  • Only Published Date selections use the articles Published Date.
  • The first page always shows fifty items plus from zero to up to a remaining forty-nine items, before they are commited permently to the next page.
  • All subsequent pages show fifty items.
  • Pagination is in reverse ordering (so that pages are permamenent links, aka "permalinks", to their content).
  • "<<" moves you to the first page (aka newest articles)
  • ">>" moves you to the last page (aka oldest articles)
  • "<" moves you to the previous page (aka newer articles)
  • ">" moves you to the next page (aka older articles)
  • Return to the top of this page Go Now

Custom HTML Block

Click to Open Code Editor