Inside the Mind of a CISO 2024 is a survey of 209 security leaders to understand the thinking and operational methods and motivations of...
Hi, what are you looking for?
Inside the Mind of a CISO 2024 is a survey of 209 security leaders to understand the thinking and operational methods and motivations of...
Freed from the shackles of always demanding a technical background, the CISO can concentrate on building a diverse team comprising multiple skills.
Researcher shows how hackers could use social engineering to deliver ransomware and other malware to Meta’s Quest 3 VR headset.
AI model weights govern outputs from the system, but altered or ‘poisoned’, they can make the output erroneous and, in extremis, useless and dangerous.
Entro’s platform is designed to bring order to the increasingly chaotic management of non-human identities.
Aim Security has raised a total of $28 million to date and is on a mission to help companies to implement AI products with...
The increase in mass exploitation involving edge services and devices is likely to worsen.
Forescout's 2024 analysis of the riskiest devices highlights vulnerabilities and threat actor interactions across IT, IoT, OT, and IoMT.
Log tampering is an almost inevitable part of a compromise. Why and how do cybercriminals target logs, and what can be done to protect...
Mandiant saw an increase in ransomware activity in 2023 compared to 2022, including a 75% increase in posts on data leak sites.
The two primary components to the solution are to encrypt company data at all times, and to decrypt only when the file is required...
Attackers are getting more sophisticated, better armed, and faster. Nothing in Rapid7's 2024 Attack Intelligence Report suggests that this will change.
As chatbots become more adventurous, the dangers will increase.
Ron Reiter was a childhood hacker in Israel. He was recruited into the IDF’s elite Unit 8200 for his military service. Now he is...
Weakening liberal democracies and weakening the NATO alliance are conjoined in the hybrid war that Russia is conducting against Ukraine.
When not scamming other criminals, criminals are concentrating on the use of mainstream AI products rather than developing their own AI systems.
Tel Aviv-based firm emerged from stealth with $7 million seed funding led by TLV Partners with participation from SNR and angel investors.
SaaS-based, AI-assisted penetration service allows proactive defensive action against exploitation of new vulnerabilities.
Venafi introduced a 90-Day TLS Readiness solution to help enterprises prepare for Google’s proposed 90-day limit for the lifecycle of a digital certificate.
SecurityWeek interviews Geoff Belknap, CISO at LinkedIn, and Guy Rosen, CISO at Facebook parent company Meta.