Security Experts:

Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Data Protection

The cryptopocalypse is the point at which quantum computing becomes powerful enough to use Shor’s algorithm to crack PKI encryption.

Compliance

The three primary drivers for cyber regulations are voter privacy, the economy, and national security – with the complication that the first is often...

Application Security

Many developers and security people admit to having experienced a breach effected through compromised API credentials.

Tesla Returns as Pwn2Own Hacker Takeover Target

Application Security

Electric car maker Tesla is using the annual Pwn2Own hacker contest to incentivize security researchers to showcase complex exploit chains that can lead to...

Threema Under Fire After Downplaying Security Research

Data Protection

The developers of the open source secure messaging app Threema have come under fire over their public response to a security analysis conducted by...

Investors Bet Big on Subscription-Based Security Skills Training

Application Security

Hack The Box Raises $55 Million in Funding Round Led by Carlyle