SecurityWeek talks to Field CISOs, Fawaz Rasheed (VMware Carbon Black) and Nabil Hannan (NetSPI), about this emerging role.
Hi, what are you looking for?
SecurityWeek talks to Field CISOs, Fawaz Rasheed (VMware Carbon Black) and Nabil Hannan (NetSPI), about this emerging role.
TETRA:BURST - vulnerabilities in widely used radio standard could threaten military and law enforcement communications, as well as ICS.
100% key capture rate and successful ransomware decryption shows progress in ransomware defense capabilities.
While traditional security awareness teaches users how to recognize social engineering, new behavior changing trains the brain on the correct recognition and response to...
Security awareness training isn’t working to the level it needs to. Social engineering, however, is getting better. Why doesn’t awareness training work, and how...
Daniel Kelley was just 18 years old when he was arrested and charged on thirty counts – most infamously for the 2015 hack of...
QuickBlox SDK and API vulnerabilities impact chat and video applications used by industries including telemedicine, smart IoT, and finance.
Bugcrowd’s Inside the Mind of the Hacker report shows the speed and efficiency of hackers adopting new technologies to assist their hunting
SecurityWeek talks to Dennis Kallelis (CSO at Idemia) and Jason Kees (CISO at Ping), two of industry’s identity giants. The idea, as always, is...
Assuming NATO can play a greater part in the cybersecurity of its members, possibly through a more formal NATO Cyber Command, the question then...
SwSec 5D framework aims to provide a roadmap for secure software development, and its use would help improve security in the software supply chain.
Fears mount that UK Online Safety Bill may include a requirement for an encrypted message scanning capability.