The war with Hamas will inevitably absorb manpower and focus from the cybersecurity sector.
Hi, what are you looking for?
The war with Hamas will inevitably absorb manpower and focus from the cybersecurity sector.
SecurityWeek continues its Hacker Conversations series in a discussion with Natalie Silvanovich, a member of of Google's Project Zero.
The Zero Day Initiative (ZDI) will host a new Automotive Pwn2Own at the Automotive World Conference in Tokyo, January 24 to 26, 2024.
Sysdig enhanced its existing CNAPP offering with a cloud attack graph, risk prioritization, attack path analysis, a searchable inventory, and complete agentless scanning.
CISO churn is a hidden cybersecurity threat. Major security initiatives or implementations can take longer than the residency of a single CISO, and constant...
Venafi launched a proprietary generative AI model to help with the mammoth, complex, and expanding problem of managing machine identities.
SecurityWeek interviews Casey Ellis, founder, chairman and CTO at Bugcrowd, best known for operating bug bounty programs for organizations.
A silicon root of trust (S-RoT) is designed to provide security to those parts of a device that can be attacked by a third...
Boards often complain they receive overly-technical reports from management teams that fail to put governance in business and financial terms.
Vector embeddings – data stored in a vector database – can be used to minimize hallucinations from a GPT-style large language model AI system...
Team8, a VC organization with added sauce, queried more than 130 CISOs from its own ‘CISO Village’ to discover the concerns of existing cybersecurity...
SecurityWeek talks to Alex Ionescu, a world-renowned cybersecurity expert who has combined a career as a business executive with that of a security researcher.