Logo

Podcasts

Pas d'autres résultats

Épisodes

Medium bf4008e8d004895afae37c9d9fd5534a7a8d02da
...instantly. Will it help turn the course of the war? In a world of endless supply chain disruptions, how can businesses shore up against the costs (11:26)? And the appeal of two-month-old...
Medium 711affafe2ee1e69518ac3b8d195588baa55a59a

Episode 0x245 - La transparence

Hackfest Communication
...may impact 16,000 exposed VPN gateways Dangerous XZ Utils backdoor was the result of years-long supply chain compromise effort FCC to probe ‘grave’ weaknesses in phone network infrastructure Cyber review board blames...
Medium 711affafe2ee1e69518ac3b8d195588baa55a59a

Episode 0x245 - La transparence

Hackfest Communication
...may impact 16,000 exposed VPN gateways Dangerous XZ Utils backdoor was the result of years-long supply chain compromise effort FCC to probe ‘grave’ weaknesses in phone network infrastructure Cyber review board blames...
Medium 3a1d36485d8a47b668735152e3672dd8f06884b7
Medium b64acbf353a9548d5a3c801210ee6ade44133d77
Medium 450861670add4874cd3a005ca3890895f25bca56

452 - XYedBot

@bcurdy, @syde et @bfreydt
...about the xz Utils backdoor that almost infected the world | Ars Technica Wikipedia :: Supply chain attack Haidt’s new book  'The Anxious Generation' from 'Jonathan Haidt'  After Babel | Jon Haidt...
Medium 450861670add4874cd3a005ca3890895f25bca56

452 - XYedBot

@bcurdy, @syde et @bfreydt
Flux : Niptech
...about the xz Utils backdoor that almost infected the world | Ars Technica Wikipedia :: Supply chain attack Haidt’s new book  'The Anxious Generation' from 'Jonathan Haidt'  After Babel | Jon Haidt...
Medium 1e9f2c1021e1835e8e8dbe1f6f6c4d8d96738b92
Flux : NoLimitSecu
Medium 96b4b019e8e27759d21310ec95c839e5f1cc6b3f
Flux : The Briefing
Medium 3fa1ce60065ab0b71db8654f198845ab5b44836b

Claude au top ?

Guillaume Vendé
Flux : Tech Café
Medium 91e389b34b2cde1207f32539a40f1cad0a77b0b8
...were made for. Graphs work well for use cases with lots of data connections like supply chain , fraud detection, real-time analytics, and genAI. With Neo4j, you can code in your favorite...
Medium 91e389b34b2cde1207f32539a40f1cad0a77b0b8
...were made for. Graphs work well for use cases with lots of data connections like supply chain , fraud detection, real-time analytics, and genAI. With Neo4j, you can code in your favorite...
Medium 91e389b34b2cde1207f32539a40f1cad0a77b0b8
...were made for. Graphs work well for use cases with lots of data connections like supply chain , fraud detection, real-time analytics, and genAI. With Neo4j, you can code in your favorite...
Medium 181d651df6a16d9f9dc870a35824ebf8ec976c48
Flux : Green IO
...hardware. I honestly think if there are organizations that are far more transparent about the supply chain and the kind of full lifecycle analysis of their products, and they do that in...
Medium 91e389b34b2cde1207f32539a40f1cad0a77b0b8
...were made for. Graphs work well for use cases with lots of data connections like supply chain , fraud detection, real-time analytics, and genAI. With Neo4j, you can code in your favorite...