https://unhabitat.org/beirut-a-safe-refuge-urban-refugees-accessing-security-in-a-context-of-plural-provision-0
This paper explores on how one of the most vulnerable populations in Beirut, Syrian refugees,1 realizetheir security interests in the face of both the threat...
urban refugeesbeirutsafeaccessingsecurity
https://www.apono.io/blog/identity-is-not-the-new-perimeter-context-is-just-ask-security-vendors/
Aug 28, 2025 - Discover why identity alone isn’t enough in cloud-native, remote-first environments. Learn how leading security vendors use context-aware...
identitynewperimetercontextask
https://www.notion.so/massabet/LiDAR-Intelligence-Personalized-Portals-and-Zero-Trust-Security-The-Context-Aware-Casino-Floor-2c98d396ee8480349364cbe8cc6fa751?showMoveTo=true&saveParent=true
The future casino environment is not static; it is a hyper-aware, intelligent space where every device, including the slot machine, operates as a sophisticated...
zero trust securitylidarintelligencepersonalizedportals
https://reliefweb.int/report/world/health-worker-safety-and-security-context-covid-19-pandemic-update-november-2020
Analysis in English on World about Health, Protection and Human Rights, Epidemic and more; published on 20 Nov 2020 by Insecurity Insight
health workersafetysecuritycontext
https://www.legitsecurity.com/press-releases/legit-brings-business-context-to-appsec-prioritization-and-remediation
Legit is the first ASPM platform to bolster AppSec program maturity by connecting previously disparate data points, enabling organizations to understand and...
legitsecuritybringsbusinesscontext
https://lirantal.com/blog/the-uprising-of-model-context-protocol-mcp-security-research
The Model Context Protocol (MCP) is gaining traction in the AI community, and with its rise comes a wave of security research. This article explores the...
model context protocolmcp securityuprisingresearch
https://www.splunk.com/en_us/blog/security/guiding-llms-with-security-context.html
Enhance LLM performance for cybersecurity tasks with few-shot learning, RAG, & fine-tuning guide models for accurate PowerShell classification.
security contextdefendingmachinespeedguiding
https://portswigger.net/web-security/cross-site-scripting/reflected/lab-html-context-nothing-encoded
This lab contains a simple reflected cross-site scripting vulnerability in the search functionality. To solve the lab, perform a cross-site scripting attack ...
reflected xsslabhtmlcontextnothing
https://www.marktechpost.com/2025/11/16/ai-interview-series-2-explain-some-of-the-common-model-context-protocol-mcp-security-vulnerabilities/
Nov 16, 2025 - AI Interview Series #2: Explain Some of the Common Model Context Protocol (MCP) Security Vulnerabilities. Preparation
ai interviewseriesexplaincommonmodel
https://www.sysdig.com/fr/blog/next-gen-container-security-why-cloud-context-matters
Attacks targeting containers can happen in less than 10 minutes. This has created a need for better cloud container security.
next gencontainer securitycontext matterscloudsysdig
https://www.helpnetsecurity.com/2024/08/06/resecurity-context-ai-generative-ai-framework/
Resecurity Context AI helps organizations prepare and implement preemptive measures to thwart new attacks and predict security challenges.
resecurityintroducecontextaispecialized
https://phoenix.security/
Phoenix Security Cloud Platform (former Phoenix Security) removes the friction between executives, security and developers using SMART Risk-Based exposure and...
security fixphoenixvulnerabilitycontextappsec
https://www.protecto.ai/
Mar 6, 2026 - Context Security for Agentic AI with real-time RBAC. Prevent PII/PHI leaks in AI agents without breaking accuracy. HIPAA, GDPR, PDPL compliant. Trusted by...
agentic aicontextsecurityrbacagents
https://www.springerprofessional.de/food-security-sustainability-in-southern-africa-in-the-context-o/51694138
This chapter explores the effects of the African Continental Free Trade Agreement (AfCFTA) by focusing on food security sustainability. In line with
food securitysouthern africasustainabilitycontext
https://cymulate.com/solutions/exposure-prioritization/
Nov 16, 2025 - Prioritize exposures with security control effectiveness, threat intel, and business impact. Validate risks with Cymulate’s breach and attack simulation
exposure prioritizationfull securitycontext