Topic > Computer Hardware Security
The password identity crisis: Evolving authentication methods in 2024 and beyond
Guest
Five bold cybersecurity predictions for 2024
Guest
All I really need to know about cybersecurity, I learned in kindergarten
Phosphorus gets $27M to build out its xIoT security solutions
Guest
The CISO risk calculus: Navigating the thin line between paranoia and vigilance
Fortanix launches Key Insight, a new tool for managing your enterprise’s encryption keys
Forrester predicts A.I. code flaws will enable new attacks next year
Cowbell gets $25M more to keep growing like gangbusters
Surviving a ransomware attack begins by acknowledging it’s inevitable
The top 20 admin passwords will have you facepalming hard
Anonybit raises $3M to further build out biometric security platform Genie
SandboxAQ unveils Sandwich, an open-source meta-library of cryptographic algorithms
Endor Labs raises $70M to ease application security, streamline developer productivity
Torq launches Torq Socrates, an AI agent for Tier-1 SecOps threat resolution
Itseez3D launches Avatar SDK Deep Fake Detector to bolster user identity protection
MIT CSAIL unveils PhotoGuard, an AI defense against unauthorized image manipulation
SentinelOne unveils cloud data security products for Amazon S3, NetApp
Protect AI raises $35M to expand its AI and machine learning security platform
Cosmic Wire raises $30M to expand cross-chain Web3 platform
Perception Point launches AI model to combat generative AI-based BEC attacks
Cyera raises $100M to expand data security platform for AI-driven enterprises
10 things every CISO needs to know about identity and access management (IAM)
Harness unveils AIDA, a generative AI assistant for software development lifecycle
Orca Security expands partnership with Google Cloud to secure enterprise cloud estates
MIT-based AI apps startup aims to block supply chain attacks with advanced cybersecurity
New study: Threat actors harness generative AI to amplify and refine email attacks
Top 10 cybersecurity findings from Verizon’s 2023 data breach report
Just 14% of CISOs possess desired traits for cybersecurity-expert board positions: Report
Why attackers love to target IoT devices
The Top 10 endpoint security challenges and how to overcome them
Cohesity partners with Google Cloud to empower organizations with generative AI and data capabilities
CISA pressures tech vendors to ship secure software ‘out of the box’
A zero-trust roadmap for cybersecurity in manufacturing — from a 98-year-old company
Report: Hackers leaked over 721 million passwords in 2022
Guest
The challenges of attracting cybersecurity talent and how to address them
Guest
5 steps to gain control of vulnerability management for your enterprise
Guest
Why machine identity management should be your focus in 2023
Sponsored