Secure-by-design is clearly important to the federal government, and there is a strong possibility that it will become a regulatory requirement for the critical...
Hi, what are you looking for?
Secure-by-design is clearly important to the federal government, and there is a strong possibility that it will become a regulatory requirement for the critical...
Are whistleblowers traitors to the company, a danger to corporate brand image, and a form of insider threat? Or are they an early warning...
The Rise of AI in Phishing: Will future phishing attacks that leverage artificial intelligence be more dangerous?
The feared ‘cryptopocalypse’ (the death of current encryption) might be sooner than expected – caused by in-memory computing ASICs rather than quantum computers.
How much do CISOs make? Survey provides compensation trends for Chief Information Security Officers, but don't take surveys at full face value.
The war with Hamas will inevitably absorb manpower and focus from the cybersecurity sector.
SecurityWeek continues its Hacker Conversations series in a discussion with Natalie Silvanovich, a member of of Google's Project Zero.
The Zero Day Initiative (ZDI) will host a new Automotive Pwn2Own at the Automotive World Conference in Tokyo, January 24 to 26, 2024.
Sysdig enhanced its existing CNAPP offering with a cloud attack graph, risk prioritization, attack path analysis, a searchable inventory, and complete agentless scanning.
CISO churn is a hidden cybersecurity threat. Major security initiatives or implementations can take longer than the residency of a single CISO, and constant...
Venafi launched a proprietary generative AI model to help with the mammoth, complex, and expanding problem of managing machine identities.
SecurityWeek interviews Casey Ellis, founder, chairman and CTO at Bugcrowd, best known for operating bug bounty programs for organizations.