-
Notifications
You must be signed in to change notification settings - Fork 7.7k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
feat(cybersec-automation): 新增 CyberSec Automation 路由和命名空间 #18000
Closed
Conversation
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Successfully generated as following: http://localhost:1200/cybersec-automation/archive - Failed ❌
|
github-actions
bot
added
the
Auto: Route Test Complete
Auto route test has finished on given PR
label
Dec 28, 2024
Successfully generated as following: http://localhost:1200/cybersec-automation - Success ✔️<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" version="2.0">
<channel>
<title>CyberSec Automation</title>
<link>https://www.cybersec-automation.com/</link>
<atom:link href="http://localhost:1200/cybersec-automation" rel="self" type="application/rss+xml"></atom:link>
<description>CyberSec Automation - Powered by RSSHub</description>
<generator>RSSHub</generator>
<webMaster>[email protected] (RSSHub)</webMaster>
<language>en</language>
<image>
<url>https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/publication/logo/5579bc25-809d-4fd6-aa79-33da3fd125c3/thumb_CyberSec_Logo.png</url>
<title>CyberSec Automation</title>
<link>https://www.cybersec-automation.com/</link>
</image>
<lastBuildDate>Sat, 28 Dec 2024 09:52:23 GMT</lastBuildDate>
<ttl>5</ttl>
<item>
<title>Beyond the Tiered SOC</title>
<description>Rethinking the SOC with Autonomous SecOps Orchestration</description>
<link>https://www.cybersec-automation.com/p/beyond-the-tiered-soc</link>
<guid isPermaLink="false">https://www.cybersec-automation.com/p/beyond-the-tiered-soc</guid>
<pubDate>Thu, 12 Dec 2024 18:01:00 GMT</pubDate>
<author>Automation FrameworkAutomation FrameworkAutomation FrameworkAutomation FrameworkDec 12, 2024Filip Stojkovski</author>
<enclosure url="https://media.beehiiv.com/cdn-cgi/image/format=auto,width=800,height=421,fit=scale-down,onerror=redirect/uploads/asset/file/86a5cc0a-5213-4620-9e7f-f77ac7ff92a4/Copy_of_SecOps_Agent_Blueprint__YouTube_Horizontal_Ad_-2.gif" type="image/jpeg"></enclosure>
</item>
<item>
<title>Blueprint for AI Agents in Cybersecurity</title>
<description>Leveraging AI Agents to Evolve Cybersecurity Practices</description>
<link>https://www.cybersec-automation.com/p/blueprint-for-ai-agents-in-cybersecurity</link>
<guid isPermaLink="false">https://www.cybersec-automation.com/p/blueprint-for-ai-agents-in-cybersecurity</guid>
<pubDate>Mon, 25 Nov 2024 22:07:59 GMT</pubDate>
<author>Nov 25, 2024Filip Stojkovski, +1</author>
<enclosure url="https://media.beehiiv.com/cdn-cgi/image/format=auto,width=800,height=421,fit=scale-down,onerror=redirect/uploads/asset/file/3eb23d52-3c89-4699-9ec9-eed70ccfcced/SecOps_AI_Agent_Blueprint.gif" type="image/jpeg"></enclosure>
</item>
<item>
<title>Security Automation Shopping?</title>
<description>Here’s Your Unbiased Buyer’s Guide</description>
<link>https://www.cybersec-automation.com/p/security-automation-shopping</link>
<guid isPermaLink="false">https://www.cybersec-automation.com/p/security-automation-shopping</guid>
<pubDate>Mon, 21 Oct 2024 09:22:41 GMT</pubDate>
<author>Automation FrameworkAutomation FrameworkAutomation FrameworkAutomation Framework+1+1+1+1Oct 21, 2024Filip Stojkovski</author>
<enclosure url="https://media.beehiiv.com/cdn-cgi/image/format=auto,width=800,height=421,fit=scale-down,onerror=redirect/uploads/asset/file/d582a4fa-5fde-4772-93a8-a6729ae3f1b5/Untitled_design.png" type="image/jpeg"></enclosure>
</item>
<item>
<title>From Low-Code Automation to Detection as Code</title>
<description>Understanding the Diverging Trends</description>
<link>https://www.cybersec-automation.com/p/lowcode-automation-detection-code</link>
<guid isPermaLink="false">https://www.cybersec-automation.com/p/lowcode-automation-detection-code</guid>
<pubDate>Wed, 11 Sep 2024 12:29:16 GMT</pubDate>
<author>Automation FrameworkAutomation FrameworkAutomation FrameworkAutomation FrameworkSep 11, 2024Filip Stojkovski</author>
<enclosure url="https://media.beehiiv.com/cdn-cgi/image/format=auto,width=800,height=421,fit=scale-down,onerror=redirect/uploads/asset/file/b6975c69-f051-4da9-91c8-8c0368b66e4b/image_no_code.jpeg" type="image/jpeg"></enclosure>
</item>
<item>
<title>Navigating GRC Automation</title>
<description>How to Balance SOAR, Hyperautomation, and Dedicated Tools</description>
<link>https://www.cybersec-automation.com/p/navigating-grc-automation</link>
<guid isPermaLink="false">https://www.cybersec-automation.com/p/navigating-grc-automation</guid>
<pubDate>Thu, 29 Aug 2024 18:30:00 GMT</pubDate>
<author>Automation FrameworkAutomation FrameworkAutomation FrameworkAutomation FrameworkAug 29, 2024Filip Stojkovski</author>
<enclosure url="https://media.beehiiv.com/cdn-cgi/image/format=auto,width=800,height=421,fit=scale-down,onerror=redirect/uploads/asset/file/f9524e25-81bb-4609-ad67-7a9463863359/GRC.jpeg" type="image/jpeg"></enclosure>
</item>
<item>
<title>The Rise of Agentic Process Automation in Cybersecurity</title>
<description>ASAP - Why not another buzz word</description>
<link>https://www.cybersec-automation.com/p/rise-agentic-process-automation-cybersecurity</link>
<guid isPermaLink="false">https://www.cybersec-automation.com/p/rise-agentic-process-automation-cybersecurity</guid>
<pubDate>Tue, 06 Aug 2024 17:00:00 GMT</pubDate>
<author>Automation FrameworkAutomation FrameworkAutomation FrameworkAutomation FrameworkAug 06, 2024Filip Stojkovski</author>
<enclosure url="https://media.beehiiv.com/cdn-cgi/image/format=auto,width=800,height=421,fit=scale-down,onerror=redirect/uploads/asset/file/671be6f7-b773-471a-bdfd-0d9eb5b7c21c/SOAR__1920_x_500_px___900_x_300_px_-3.gif" type="image/jpeg"></enclosure>
</item>
<item>
<title>Mastering Security Automations</title>
<description>Enhance, Support, and Orchestrate Your Defenses</description>
<link>https://www.cybersec-automation.com/p/security-automation-types</link>
<guid isPermaLink="false">https://www.cybersec-automation.com/p/security-automation-types</guid>
<pubDate>Thu, 18 Jul 2024 16:30:00 GMT</pubDate>
<author>Automation PlaybooksAutomation PlaybooksAutomation PlaybooksAutomation PlaybooksJul 18, 2024Filip Stojkovski, +1</author>
<enclosure url="https://media.beehiiv.com/cdn-cgi/image/format=auto,width=800,height=421,fit=scale-down,onerror=redirect/uploads/asset/file/86e35086-2ce5-4e86-936f-ada8f1d33746/Context_Enrichment-2.gif" type="image/jpeg"></enclosure>
</item>
<item>
<title>Who Should Build Your Security Automations</title>
<description>SOC vs SecEng</description>
<link>https://www.cybersec-automation.com/p/build-security-automations</link>
<guid isPermaLink="false">https://www.cybersec-automation.com/p/build-security-automations</guid>
<pubDate>Thu, 11 Jul 2024 16:32:34 GMT</pubDate>
<author>Automation FrameworkAutomation FrameworkAutomation FrameworkAutomation FrameworkJul 11, 2024Filip Stojkovski</author>
<enclosure url="https://media.beehiiv.com/cdn-cgi/image/format=auto,width=800,height=421,fit=scale-down,onerror=redirect/uploads/asset/file/214a7664-76f7-4f72-aac7-c3e5b428510c/file-btILY8djUl6mNuAJEe4VHL0T.jpg" type="image/jpeg"></enclosure>
</item>
<item>
<title>DORA compliance and Security Automation</title>
<description>How RPA and Hyperautomation Can Supercharge Your DORA Compliance</description>
<link>https://www.cybersec-automation.com/p/dora-rpa-security-automation</link>
<guid isPermaLink="false">https://www.cybersec-automation.com/p/dora-rpa-security-automation</guid>
<pubDate>Mon, 24 Jun 2024 15:42:21 GMT</pubDate>
<author>Automation FrameworkAutomation FrameworkAutomation FrameworkAutomation FrameworkJun 24, 2024Filip Stojkovski, +1</author>
<enclosure url="https://media.beehiiv.com/cdn-cgi/image/format=auto,width=800,height=421,fit=scale-down,onerror=redirect/uploads/asset/file/5fee0d2e-2120-4d69-9d5c-902b43820b48/DALL_E_2024-06-24_16.46.37_-_A_digital_illustration_of_a_compliance_officer_reviewing_cybersecurity_protocols__multiple_monitors_displaying_security_metrics_and_compliance_checkli.jpeg" type="image/jpeg"></enclosure>
</item>
<item>
<title>Biannual Roundup</title>
<description>New Developments in SOAR, Hyperautomation, and Autonomous SOC</description>
<link>https://www.cybersec-automation.com/p/soar-hyperautomation-news</link>
<guid isPermaLink="false">https://www.cybersec-automation.com/p/soar-hyperautomation-news</guid>
<pubDate>Thu, 06 Jun 2024 15:46:36 GMT</pubDate>
<author>Jun 06, 2024Filip Stojkovski</author>
<enclosure url="https://media.beehiiv.com/cdn-cgi/image/format=auto,width=800,height=421,fit=scale-down,onerror=redirect/uploads/asset/file/676972b8-61d9-4f3f-a0e8-1dc252d07945/A_cartoon-style_illustration_of_a_high-tech_news_s.jpeg" type="image/jpeg"></enclosure>
</item>
<item>
<title>Integrating Detection Engineering with Automation</title>
<description></description>
<link>https://www.cybersec-automation.com/p/detection-engineering-automation-incident-response</link>
<guid isPermaLink="false">https://www.cybersec-automation.com/p/detection-engineering-automation-incident-response</guid>
<pubDate>Wed, 29 May 2024 17:40:45 GMT</pubDate>
<author>Automation FrameworkAutomation FrameworkAutomation FrameworkAutomation FrameworkMay 29, 2024Filip Stojkovski</author>
<enclosure url="https://media.beehiiv.com/cdn-cgi/image/format=auto,width=800,height=421,fit=scale-down,onerror=redirect/uploads/asset/file/0b9431da-b3ec-4209-82ca-a40771bb50ed/Process_-_IR__Detection__Automation.gif" type="image/jpeg"></enclosure>
</item>
<item>
<title>Chasing the News or Chasing the Hunts</title>
<description>Responding to Cyber Threats with Flexible Roadmaps</description>
<link>https://www.cybersec-automation.com/p/responding-to-cyber-threats-with-flexible-roadmaps</link>
<guid isPermaLink="false">https://www.cybersec-automation.com/p/responding-to-cyber-threats-with-flexible-roadmaps</guid>
<pubDate>Wed, 15 May 2024 06:11:08 GMT</pubDate>
<author>Automation FrameworkAutomation FrameworkAutomation FrameworkAutomation FrameworkMay 15, 2024Andrei Cotaie, +2</author>
<enclosure url="https://media.beehiiv.com/cdn-cgi/image/format=auto,width=800,height=421,fit=scale-down,onerror=redirect/uploads/asset/file/63e29125-c15d-41bb-8425-67ccac389979/IR_detect.jpeg" type="image/jpeg"></enclosure>
</item>
</channel>
</rss> |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Involved Issue / 该 PR 相关 Issue
Close #
Example for the Proposed Route(s) / 路由地址示例
New RSS Route Checklist / 新 RSS 路由检查表
Puppeteer
Note / 说明