auditing   990

« earlier    

W3C is Coming to Your A11Y Tools - 24 Accessibility
“You can think of this ACT rules collection as WCAG Failure Techniques written for accessibility testers rather than for content authors.”
w3c  testing  accessibility  a11y  2019  auditing 
15 days ago by handcoding
OpenBSM auditing on Mac OS X | Der Flounder
Way back in 10.3.x, Apple submitted Mac OS X and Mac OS X Server to the National Information Assurance Partnership for Common Criteria certification. Common Criteria certification means that the the covered hardware and software has been tested and evaluated to make sure that it meets an established set of requirements for security and data…
osx  auditing  security  infosec  tools 
4 weeks ago by po
Twitter
markup = creative solutions that increase visibility in Featured Snippets…
Auditing  SERP  from twitter
4 weeks ago by jhill5
Prowler
AWS Security Best Practices Assessment, Auditing, Hardening and Forensics Readiness Tool. It follows guidelines of the CIS Amazon Web Services Foundations Benchmark and additional checks. Official CIS for AWS guide: https://d0.awsstatic.com/whitepapers/compliance/AWS_CIS_Foundations_Benchmark.pdf
aws  security  auditing  hardening  aws_security 
10 weeks ago by aiefel
Project Strobe: Protecting your data, improving our third-party APIs, and sunsetting consumer Google+
At the beginning of this year, we started an effort called Project Strobe—a root-and-branch review of third-party developer access to Google account and Android device data and of our philosophy around apps’ data access. This project looked at the operation of our privacy controls, platforms where users were not engaging with our APIs because of concerns around data privacy, areas where developers may have been granted overly broad access, and other areas in which our policies should be tightened.  

We’re announcing the first four findings and actions from this review today.
google  security  privacy  auditing  dataprotection  APIs 
october 2018 by corrickwales

« earlier    

related tags

2016  2019  2fa  a11y  abc7  accept  accessibility  activedirectory  activerecord  ai  aiux  aktivismus  algorithm  algorithmic  algorithmic_transparency  algorithms  amazon  analysis  api  apis  apt  article  artificial  assessment  audit  auditor  audits  authentication  authorization  aws  aws_security  background  banking  baseline  bash  bastille.linux  bb  benfordslaw  bestpractices  bias-correction  bias  bigdata  bits  blockchain  bsd  build  business  buy-to-let  chainofcustody  check  clean  cleanup  cli  cloud  cloudtrail  cluster  code-review  code  commandline  compliance  conference  config  configuration  conservation  container  containers  content  continuousdelivery  core  coredump  crime  crowdstrike  cryptography  culture  custom  cyber_security  cybersecurity  data  database  dataprotection  dba  dead  debian  debugging  design  dev  developer  development  devices  devops  digitalmarketing  digitaltransformation  dlt  dna  docker  documentation  dopost  download  dpkg  dumps  encryption  ethical_ai  ethics  evaluation  eventlogs  events  eventsmarketing  evidence  extension  face-recognition  facebook  factcheck  featured  fido  filehandles  files  filesystems  finance  firefox  floss  forensicaccounting  forensics  framework  fraud  frauddetection  github  golang  google  hardening  hardware  hcds  historical  history  html  human  iis  imaze  incidentresponse  index  infosec  inquisitor  intelligence  journalism  json  justice  knowledgepanel  law  legacy  linux  localbusiness  localseo  log  logging  logo  logs  machine_learning  macos  malware  management  metrics  microservices  microsoft  money  monitor  monitoring  munging  mysql  network  o365  opensource  openssh  optimise  optimization  osx  packaging  pair  passwords  pentesting  percona  performance  plugin  plugins  policy  powershell  privacy  probability  process  product  products  property  proxy  psql  qa  rails  recommendations  recording  recsys_eval  regulation  releasemanagement  remote  research  research_ethics  reviews  risk_management  rules  rust  safety  scanning  science  scom  screening  script  search  searchengine  searchengineoptimization  searchengines  security  sem  seo  serp  serps  shell  shopper  slack  socialmedia  software  speed  ssh  statistics  stats  stig  stories  sudo  sudo_pair  sysadmin  sysctl  systemtap  technology  techsupport  terminal  testing  threathunting  tip  tips  tombstone  tool  tools  top  tracking  tricks  tripwire  trueallele  turk  two  u2f  usb  utilities  vault  verification  visibility  w3c  web  webapps  webdesign  webdev  webinar  website  websites  whitepaper  windows  your 

Copy this bookmark:



description:


tags: