Security Experts:

Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

CISO Strategy

Varied viewpoints as related security concepts take on similar traits create substantial confusion among security teams trying to evaluate and purchase security technologies.

Application Security

Electric car maker Tesla is using the annual Pwn2Own hacker contest to incentivize security researchers to showcase complex exploit chains that can lead to...

Red Hat Announces General Availability of Malware Detection Service

Endpoint Security

Red Hat announced on Tuesday the general availability of a malware detection service for Red Hat Enterprise Linux (RHEL) systems.

Investors Bet Big on Subscription-Based Security Skills Training

Application Security

Hack The Box Raises $55 Million in Funding Round Led by Carlyle

Microsoft Patch Tuesday: 97 Windows Vulns, 1 Exploited Zero-Day

Application Security

Microsoft’s security patching machine hummed into overdrive Tuesday with the release of fixes for at least 97 documented software vulnerabilities, including a zero-day that’s...

Intel Adds TDX to Confidential Computing Portfolio With Launch of 4th Gen Xeon Processors

Cloud Security

Intel announced on Tuesday that it has added Intel Trust Domain Extensions (TDX) to its confidential computing portfolio with the launch of its new...