Robuta

https://www.mail-archive.com/issues@solr.apache.org/msg49493.html
add securityprcontextconfigsolr
https://unhabitat.org/beirut-a-safe-refuge-urban-refugees-accessing-security-in-a-context-of-plural-provision-0
This paper explores on how one of the most vulnerable populations in Beirut, Syrian refugees,1 realizetheir security interests in the face of both the threat...
urban refugeesbeirutsafeaccessingsecurity
https://www.w3.org/2006/WSC/track/actions/550
web securityworking groupactioncontexttracker
https://www.helpnetsecurity.com/tag/new-context/
help net securitynewcontextarchives
https://www.w3.org/2006/WSC/track/actions/416?changelog
web securityworking groupactioncontexttracker
https://www.w3.org/2006/WSC/track/issues/186?changelog
web securityworking groupissuecontexttracker
https://www.w3.org/2006/WSC/track/actions/541
web securityworking groupactioncontexttracker
https://www.apono.io/blog/identity-is-not-the-new-perimeter-context-is-just-ask-security-vendors/
Aug 28, 2025 - Discover why identity alone isn’t enough in cloud-native, remote-first environments. Learn how leading security vendors use context-aware...
identitynewperimetercontextask
https://www.notion.so/massabet/LiDAR-Intelligence-Personalized-Portals-and-Zero-Trust-Security-The-Context-Aware-Casino-Floor-2c98d396ee8480349364cbe8cc6fa751?showMoveTo=true&saveParent=true
The future casino environment is not static; it is a hyper-aware, intelligent space where every device, including the slot machine, operates as a sophisticated...
zero trust securitylidarintelligencepersonalizedportals
https://reliefweb.int/report/world/health-worker-safety-and-security-context-covid-19-pandemic-update-november-2020
Analysis in English on World about Health, Protection and Human Rights, Epidemic and more; published on 20 Nov 2020 by Insecurity Insight
health workersafetysecuritycontext
https://www.w3.org/standards/history/wsc-ui/
The World Wide Web Consortium (W3C) is an international community where Member organizations, a full-time staff, and the public work together to develop Web...
user interface guidelinesweb securitypublication historycontextstandards
https://www.w3.org/2006/WSC/track/actions/493
web securityworking groupactioncontexttracker
https://docs.akto.io/components/context-analyzer
api security platformcontextanalyzerakto
https://www.legitsecurity.com/press-releases/legit-brings-business-context-to-appsec-prioritization-and-remediation
Legit is the first ASPM platform to bolster AppSec program maturity by connecting previously disparate data points, enabling organizations to understand and...
legitsecuritybringsbusinesscontext
https://lirantal.com/blog/the-uprising-of-model-context-protocol-mcp-security-research
The Model Context Protocol (MCP) is gaining traction in the AI community, and with its rise comes a wave of security research. This article explores the...
model context protocolmcp securityuprisingresearch
https://deepai.org/publication/machine-learning-on-knowledge-graphs-for-context-aware-security-monitoring
05/18/21 - Machine learning techniques are gaining attention in the context of intrusion detection due to the increasing amounts of data gene...
machine learningknowledge graphssecurity monitoringcontextaware
https://www.splunk.com/en_us/blog/security/guiding-llms-with-security-context.html
Enhance LLM performance for cybersecurity tasks with few-shot learning, RAG, & fine-tuning guide models for accurate PowerShell classification.
security contextdefendingmachinespeedguiding
https://www.mail-archive.com/notifications@ignite.apache.org/msg73406.html
security contextevtnodejoinedwrong
https://www.w3.org/2006/WSC/track/actions/444
web securityworking groupactioncontexttracker
https://www.w3.org/2006/WSC/track/actions/467
web securityworking groupactioncontexttracker
https://www.w3.org/2006/WSC/track/actions/8
web securityworking groupactioncontexttracker
https://portswigger.net/web-security/cross-site-scripting/reflected/lab-html-context-nothing-encoded
This lab contains a simple reflected cross-site scripting vulnerability in the search functionality. To solve the lab, perform a cross-site scripting attack ...
reflected xsslabhtmlcontextnothing
https://www.marktechpost.com/2025/11/16/ai-interview-series-2-explain-some-of-the-common-model-context-protocol-mcp-security-vulnerabilities/
Nov 16, 2025 - AI Interview Series #2: Explain Some of the Common Model Context Protocol (MCP) Security Vulnerabilities. Preparation
ai interviewseriesexplaincommonmodel
https://www.sysdig.com/fr/blog/next-gen-container-security-why-cloud-context-matters
Attacks targeting containers can happen in less than 10 minutes. This has created a need for better cloud container security.
next gencontainer securitycontext matterscloudsysdig
https://www.helpnetsecurity.com/2024/08/06/resecurity-context-ai-generative-ai-framework/
Resecurity Context AI helps organizations prepare and implement preemptive measures to thwart new attacks and predict security challenges.
resecurityintroducecontextaispecialized
https://phoenix.security/
Phoenix Security Cloud Platform (former Phoenix Security) removes the friction between executives, security and developers using SMART Risk-Based exposure and...
security fixphoenixvulnerabilitycontextappsec
https://www.w3.org/2006/WSC/track/actions/53
web securityworking groupactioncontexttracker
https://www.protecto.ai/
Mar 6, 2026 - Context Security for Agentic AI with real-time RBAC. Prevent PII/PHI leaks in AI agents without breaking accuracy. HIPAA, GDPR, PDPL compliant. Trusted by...
agentic aicontextsecurityrbacagents
https://www.w3.org/2006/WSC/track/actions/576?changelog
web securityworking groupactioncontexttracker
https://www.springerprofessional.de/food-security-sustainability-in-southern-africa-in-the-context-o/51694138
This chapter explores the effects of the African Continental Free Trade Agreement (AfCFTA) by focusing on food security sustainability. In line with
food securitysouthern africasustainabilitycontext
https://www.w3.org/2006/WSC/track/issues/181
web securityworking groupissuecontexttracker
https://www.w3.org/2006/WSC/track/actions/483
web securityworking groupactioncontexttracker
https://www.okta.com/en-nl/identity-101/context-based-authentication/
next leveltakesecuritycontextbased
https://cymulate.com/solutions/exposure-prioritization/
Nov 16, 2025 - Prioritize exposures with security control effectiveness, threat intel, and business impact. Validate risks with Cymulate’s breach and attack simulation
exposure prioritizationfull securitycontext