Virtual Event Now Live: Zero Trust Strategies Summit! - Login for Access
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Security Architecture

Google’s adoption of memory safe programming languages now includes the deployment of Rust in legacy low-level firmware codebases.

Security Architecture

Microsoft is experimenting with a major new security mitigation to block attacks targeting flaws in the Windows Common Log File System (CLFS).

Security Architecture

An inside look at how LinkedIn developed an internal AI-assisted vulnerability management system to protect its massive infrastructure and user base.

Artificial Intelligence

As adversaries increasingly exploit AI, security practitioners must not fall behind. What does it take to unlock the full potential of AI in cybersecurity?

Management & Strategy

Security leaders are facing big decisions about how they use their monetary and people resources to better secure their environments.

Cybersecurity Mesh: Overcoming Data Security Overload

Data Protection

A significant cybersecurity challenge arises from managing the immense volume of data generated by numerous IT security tools, leading organizations into a reactive rather...

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.