
Topic > Computer Hardware Security


The password identity crisis: Evolving authentication methods in 2024 and beyond

Guest
Five bold cybersecurity predictions for 2024

Guest
All I really need to know about cybersecurity, I learned in kindergarten

Phosphorus gets $27M to build out its xIoT security solutions

Guest
The CISO risk calculus: Navigating the thin line between paranoia and vigilance

Fortanix launches Key Insight, a new tool for managing your enterprise’s encryption keys

Forrester predicts A.I. code flaws will enable new attacks next year

Cowbell gets $25M more to keep growing like gangbusters

Surviving a ransomware attack begins by acknowledging it’s inevitable

The top 20 admin passwords will have you facepalming hard

Anonybit raises $3M to further build out biometric security platform Genie

SandboxAQ unveils Sandwich, an open-source meta-library of cryptographic algorithms

Endor Labs raises $70M to ease application security, streamline developer productivity

Torq launches Torq Socrates, an AI agent for Tier-1 SecOps threat resolution

Itseez3D launches Avatar SDK Deep Fake Detector to bolster user identity protection

MIT CSAIL unveils PhotoGuard, an AI defense against unauthorized image manipulation

SentinelOne unveils cloud data security products for Amazon S3, NetApp

Protect AI raises $35M to expand its AI and machine learning security platform

Cosmic Wire raises $30M to expand cross-chain Web3 platform

Perception Point launches AI model to combat generative AI-based BEC attacks

Cyera raises $100M to expand data security platform for AI-driven enterprises

10 things every CISO needs to know about identity and access management (IAM)

Harness unveils AIDA, a generative AI assistant for software development lifecycle

Orca Security expands partnership with Google Cloud to secure enterprise cloud estates

MIT-based AI apps startup aims to block supply chain attacks with advanced cybersecurity

New study: Threat actors harness generative AI to amplify and refine email attacks

Top 10 cybersecurity findings from Verizon’s 2023 data breach report

Just 14% of CISOs possess desired traits for cybersecurity-expert board positions: Report

Why attackers love to target IoT devices

The Top 10 endpoint security challenges and how to overcome them

Cohesity partners with Google Cloud to empower organizations with generative AI and data capabilities

CISA pressures tech vendors to ship secure software ‘out of the box’

A zero-trust roadmap for cybersecurity in manufacturing — from a 98-year-old company

Report: Hackers leaked over 721 million passwords in 2022

Guest
The challenges of attracting cybersecurity talent and how to address them

Guest
5 steps to gain control of vulnerability management for your enterprise

Guest
Why machine identity management should be your focus in 2023

Sponsored
Top cloud security threats in 2023 and how to tackle them
