|
Open Peer Review
|
0
|
4 hours ago
by
Olivia Rempe
|
The Inner Circle
|
|
|
National Security Commission on Artificial Intelligence
|
0
|
6 hours ago
by
Olivia Rempe
|
The Inner Circle
|
|
|
CSA Global AI Symposium
|
0
|
9 hours ago
by
Olivia Rempe
|
The Inner Circle
|
|
|
What is the Shared Responsibility Model in the Cloud?
|
0
|
11 hours ago
by
Olivia Rempe
|
The Inner Circle
|
|
|
Cyber Skills Gap
|
0
|
3 days ago
by
Olivia Rempe
|
The Inner Circle
|
|
|
The Implications of AI in Cybersecurity
|
0
|
3 days ago
by
Olivia Rempe
|
The Inner Circle
|
|
|
CS4CA Europe
|
0
|
4 days ago
by
Olivia Rempe
|
The Inner Circle
|
|
|
Recap: Workstream 9 - working session recap, August 21
|
0
|
4 days ago
by
Jason Garbis
|
Zero Trust architecture, Implementation & Maturity Model
|
|
|
NIST FIPS 203, 204, and 205 Finalized: An Important Step Towards a Quantum-Safe Future
|
0
|
4 days ago
by
Olivia Rempe
|
The Inner Circle
|
|
|
ASD ACSC Joint Publication Best practices for event logging and threat detection
|
0
|
4 days ago
by
Michael Roza
|
Top Threats
|
|
|
ASD ACSC Joint Publication Best practices for event logging and threat detection
|
0
|
4 days ago
by
Michael Roza
|
The Inner Circle
|
|
|
NIST Special Publication [SP] 800-63 Revision 4 Digital Identity Guidelines Open For Comment
|
0
|
4 days ago
by
Michael Roza
|
Hybrid Cloud Security
|
|
|
NIST Special Publication [SP] 800-63 Revision 4 Digital Identity Guidelines Open For Comment
|
0
|
4 days ago
by
Michael Roza
|
The Inner Circle
|
|
|
Cyber Range
|
2
|
4 days ago
by
William Ho
Original post by
William Ho, 何添福 (CISSP, CCSP, CISA, CISM, CRISC, CDPSE, CCSK)
|
Industrial Control Systems
|
|
|
SECtember.ai going virtual
|
1
|
5 days ago
by
Courtney Stiven
Original post by
Christopher Byrd
|
SECtember
|
|
|
Meeting Minutes - 21 Aug 2024
|
0
|
5 days ago
by
Hillary Baron
|
Blockchain/ Distributed Ledger
|
|
|
Mitigating Security Risks in RAG LLM Applications
|
0
|
5 days ago
by
Olivia Rempe
|
The Inner Circle
|
|
|
🚨Top Threats to Cloud Computing 2024: Threat #8 - System Vulnerabilities 🚨
|
0
|
5 days ago
by
Olivia Rempe
|
The Inner Circle
|
|
|
Open Peer Reviews
|
1
|
5 days ago
by
Ramakrishna Manchana
Original post by
Olivia Rempe
|
The Inner Circle
|
|
|
SECtember.ai Global
|
0
|
6 days ago
by
Olivia Rempe
|
The Inner Circle
|
|
|
newbie questions
|
3
|
9 days ago
by
Josh Buker
Original post by
Prachi Jain
|
DevSecOps
|
|
|
Open for Public Comment: NCCoE Applying 5G Cybersecurity and Privacy Capabilities Cybersecurity White Paper Series
|
0
|
9 days ago
by
Michael Roza
|
5G Security
|
|
|
Open for Public Comment: NCCoE Applying 5G Cybersecurity and Privacy Capabilities Cybersecurity White Paper Series
|
0
|
9 days ago
by
Michael Roza
|
The Inner Circle
|
|
|
IEEE World Technology Summit on AI Infrastructure
|
0
|
10 days ago
by
David Snyder
|
Silicon Valley Chapter
|
|
|
MITRE seeks contributions for ICS ATT&CK evaluations to enhance emulation
|
1
|
11 days ago
by
neeraj nagpal
Original post by
Erik Johnson
|
Zero Trust
|
|
|
🚨Top Threats to Cloud Computing 2024: Threat #9 - Limited Cloud Visibility/Observability🚨
|
0
|
11 days ago
by
Olivia Rempe
|
The Inner Circle
|
|
|
Justin Greis at SECtember.ai
|
0
|
11 days ago
by
Olivia Rempe
|
The Inner Circle
|
|
|
WhatsApp group for chapter - to grow and arrange events
|
0
|
11 days ago
by
Ankit Uniyal
|
Oman Chapter
|
|
|
Data Security Working Group Meeting - 6/6/24
|
1
|
11 days ago
by
V. Horvát
Original post by
Alex Kaluza
|
Data Security
|
|
|
Request for Information - Generative AI
|
0
|
11 days ago
by
Olivia Rempe
|
The Inner Circle
|
|
|
Top Threats Meeting Minutes 2024-08-15
|
0
|
11 days ago
by
Vic Hargrave
|
Top Threats
|
|
|
Webinar Alert: Cyber Risk Management in the Age of AI
|
0
|
11 days ago
by
Shalonda Willis
|
The Inner Circle
|
|
|
MLSecOps at SECtember.ai
|
0
|
12 days ago
by
Olivia Rempe
|
The Inner Circle
|
|
|
NIST IR 8532 Workshop on Enhancing Security of Devices and Components Across the Supply Chain Draft
|
0
|
12 days ago
by
Michael Roza
|
Top Threats
|
|
|
NIST IR 8532 Workshop on Enhancing Security of Devices and Components Across the Supply Chain Draft
|
0
|
12 days ago
by
Michael Roza
|
The Inner Circle
|
|
|
Caleb Sima at SECtember.ai
|
0
|
12 days ago
by
Olivia Rempe
|
The Inner Circle
|
|
|
NIST Releases First 3 Finalized Post-Quantum Encryption Standards
|
0
|
12 days ago
by
Michael Roza
|
Cloud Key Management
|
|
|
NIST Releases First 3 Finalized Post-Quantum Encryption Standards
|
0
|
12 days ago
by
Michael Roza
|
The Inner Circle
|
|
|
Diana Kelley at SECtember AI: Building AI Security In: MLSecOps in Practice
|
0
|
13 days ago
by
Olivia Rempe
|
The Inner Circle
|
|
|
NIST SP 1800-35 Implementing a Zero Trust Architecture: High-level Overview 4th Preliminary Draft for comment
|
3
|
13 days ago
by
Erik Johnson
Original post by
Michael Roza
|
Zero Trust
|
|
|
MITRE seeks contributions for ICS ATT&CK evaluations to enhance emulation
|
0
|
13 days ago
by
Erik Johnson
|
Pillar: Device
|
|
|
🚨Top Threats to Cloud Computing 2024: Threat #10 - Unauthenticated Resource Sharing 🚨
|
0
|
14 days ago
by
Olivia Rempe
|
The Inner Circle
|
|
|
Nicolas M. Chaillan at SECtember.ai - How Generative AI Created my Company
|
0
|
14 days ago
by
Olivia Rempe
|
The Inner Circle
|
|
|
Seeking rewarding career opportunities in Cybersecurity Solutions Design
|
1
|
14 days ago
by
Kathie Miley
Original post by
Simou Bouhiyate
|
Job Postings
|
|
|
Open Peer Reviews
|
0
|
14 days ago
by
Olivia Rempe
|
The Inner Circle
|
|
|
Maintenance of CCSK certification?
|
0
|
14 days ago
by
Anonymous Member
|
The Inner Circle
|
|
|
Learn about AI Organizational Responsibilities & AI Governance
|
0
|
17 days ago
by
Olivia Rempe
|
The Inner Circle
|
|
|
Every Small and Medium Size Organization Is Protected
|
0
|
17 days ago
by
Mark Fishburn
|
Zero Trust
|
|
|
Top Threats - Security Issue #11
|
0
|
17 days ago
by
Olivia Rempe
|
The Inner Circle
|
|
|
Key Mgmt WG Meeting Minutes, 7th August 2024
|
0
|
17 days ago
by
Marina Bregkou
|
Cloud Key Management
|
|