Skip to main content
  • Artificial Intelligence
    • View All
    • AI, ML and Deep Learning
    • Auto ML
    • Data Labelling
    • Synthetic Data
    • Conversational AI
    • NLP
    • Text-to-Speech
  • Security
    • View All
    • Data Security and Privacy
    • Network Security and Privacy
    • Software Security
    • Computer Hardware Security
    • Cloud and Data Storage Security
  • Data Infrastructure
    • View All
    • Data Science
    • Data Management
    • Data Storage and Cloud
    • Big Data and Analytics
    • Data Networks
  • Automation
    • View All
    • Industrial Automation
    • Business Process Automation
    • Development Automation
    • Robotic Process Automation
    • Test Automation
  • Enterprise Analytics
    • View All
    • Business Intelligence
    • Disaster Recovery Business Continuity
    • Statistical Analysis
    • Predictive Analysis
  • More
    • Data Decision Makers
    • Virtual Communication
      • Team Collaboration
      • UCaaS
      • Virtual Reality Collaboration
      • Virtual Employee Experience
    • Programming & Development
      • Product Development
      • Application Development
      • Test Management
      • Development Languages
Subscribe Events Video Special Issues Jobs

Topic > Computer Hardware Security

Cybersecurity New Year’s resolutions every enterprise leader (and user) should make

Cybersecurity New Year’s resolutions every enterprise leader (and user) should make

Taryn Plumb January 2, 2024 2:51 PM
The password identity crisis: Evolving authentication methods in 2024 and beyond

The password identity crisis: Evolving authentication methods in 2024 and beyond

Taryn Plumb December 29, 2023 4:41 PM
Five bold cybersecurity predictions for 2024
Guest

Five bold cybersecurity predictions for 2024

Steven Stone, Rubrik December 25, 2023 1:45 PM
All I really need to know about cybersecurity, I learned in kindergarten
Guest

All I really need to know about cybersecurity, I learned in kindergarten

Dan Wiley, Check Point December 24, 2023 11:15 AM
Phosphorus gets $27M to build out its xIoT security solutions

Phosphorus gets $27M to build out its xIoT security solutions

Carl Franzen December 20, 2023 8:43 AM
The CISO risk calculus: Navigating the thin line between paranoia and vigilance
Guest

The CISO risk calculus: Navigating the thin line between paranoia and vigilance

Omer Cohen, Descope December 16, 2023 11:15 AM
Fortanix launches Key Insight, a new tool for managing your enterprise’s encryption keys

Fortanix launches Key Insight, a new tool for managing your enterprise’s encryption keys

Carl Franzen November 28, 2023 5:06 PM
Forrester predicts A.I. code flaws will enable new attacks next year

Forrester predicts A.I. code flaws will enable new attacks next year

Louis Columbus November 9, 2023 2:42 PM
Cowbell gets $25M more to keep growing like gangbusters

Cowbell gets $25M more to keep growing like gangbusters

Carl Franzen November 1, 2023 9:40 AM
Surviving a ransomware attack begins by acknowledging it’s inevitable

Surviving a ransomware attack begins by acknowledging it’s inevitable

Louis Columbus October 26, 2023 2:32 PM
The top 20 admin passwords will have you facepalming hard

The top 20 admin passwords will have you facepalming hard

Taryn Plumb October 26, 2023 1:37 PM
Anonybit raises $3M to further build out biometric security platform Genie

Anonybit raises $3M to further build out biometric security platform Genie

Carl Franzen October 17, 2023 7:46 AM
SandboxAQ unveils Sandwich, an open-source meta-library of cryptographic algorithms

SandboxAQ unveils Sandwich, an open-source meta-library of cryptographic algorithms

Victor Dey August 11, 2023 2:20 PM
Endor Labs raises $70M to ease application security, streamline developer productivity

Endor Labs raises $70M to ease application security, streamline developer productivity

Victor Dey August 3, 2023 12:01 AM
Torq launches Torq Socrates, an AI agent for Tier-1 SecOps threat resolution

Torq launches Torq Socrates, an AI agent for Tier-1 SecOps threat resolution

Victor Dey August 2, 2023 11:35 AM
Itseez3D launches Avatar SDK Deep Fake Detector to bolster user identity protection

Itseez3D launches Avatar SDK Deep Fake Detector to bolster user identity protection

Victor Dey August 1, 2023 12:49 PM
MIT CSAIL unveils PhotoGuard, an AI defense against unauthorized image manipulation

MIT CSAIL unveils PhotoGuard, an AI defense against unauthorized image manipulation

Victor Dey July 31, 2023 1:46 PM
SentinelOne unveils cloud data security products for Amazon S3, NetApp

SentinelOne unveils cloud data security products for Amazon S3, NetApp

Victor Dey July 28, 2023 7:52 AM
Protect AI raises $35M to expand its AI and machine learning security platform

Protect AI raises $35M to expand its AI and machine learning security platform

Victor Dey July 26, 2023 6:00 AM
Cosmic Wire raises $30M to expand cross-chain Web3 platform

Cosmic Wire raises $30M to expand cross-chain Web3 platform

Victor Dey July 21, 2023 10:08 AM
Perception Point launches AI model to combat generative AI-based BEC attacks

Perception Point launches AI model to combat generative AI-based BEC attacks

Victor Dey June 30, 2023 10:07 AM
Cyera raises $100M to expand data security platform for AI-driven enterprises

Cyera raises $100M to expand data security platform for AI-driven enterprises

Victor Dey June 28, 2023 9:51 AM
10 things every CISO needs to know about identity and access management (IAM)

10 things every CISO needs to know about identity and access management (IAM)

Louis Columbus June 26, 2023 9:57 AM
Harness unveils AIDA, a generative AI assistant for software development lifecycle

Harness unveils AIDA, a generative AI assistant for software development lifecycle

Victor Dey June 23, 2023 10:07 AM
Orca Security expands partnership with Google Cloud to secure enterprise cloud estates

Orca Security expands partnership with Google Cloud to secure enterprise cloud estates

Victor Dey June 21, 2023 6:00 AM
MIT-based AI apps startup aims to block supply chain attacks with advanced cybersecurity

MIT-based AI apps startup aims to block supply chain attacks with advanced cybersecurity

Louis Columbus June 15, 2023 10:07 AM
New study: Threat actors harness generative AI to amplify and refine email attacks

New study: Threat actors harness generative AI to amplify and refine email attacks

Victor Dey June 14, 2023 3:00 AM
Top 10 cybersecurity findings from Verizon’s 2023 data breach report

Top 10 cybersecurity findings from Verizon’s 2023 data breach report

Louis Columbus June 13, 2023 10:25 AM
Just 14% of CISOs possess desired traits for cybersecurity-expert board positions: Report 

Just 14% of CISOs possess desired traits for cybersecurity-expert board positions: Report 

Victor Dey June 9, 2023 10:37 AM
Why attackers love to target IoT devices

Why attackers love to target IoT devices

Louis Columbus June 9, 2023 9:32 AM
The Top 10 endpoint security challenges and how to overcome them

The Top 10 endpoint security challenges and how to overcome them

Louis Columbus May 29, 2023 9:16 AM
Cohesity partners with Google Cloud to empower organizations with generative AI and data capabilities

Cohesity partners with Google Cloud to empower organizations with generative AI and data capabilities

Victor Dey May 23, 2023 10:37 AM
CISA pressures tech vendors to ship secure software ‘out of the box’

CISA pressures tech vendors to ship secure software ‘out of the box’

Tim Keary April 13, 2023 1:22 PM
A zero-trust roadmap for cybersecurity in manufacturing — from a 98-year-old company

A zero-trust roadmap for cybersecurity in manufacturing — from a 98-year-old company

Louis Columbus March 16, 2023 11:37 AM
Report: Hackers leaked over 721 million passwords in 2022 

Report: Hackers leaked over 721 million passwords in 2022 

Tim Keary March 14, 2023 3:00 AM
The challenges of attracting cybersecurity talent and how to address them
Guest

The challenges of attracting cybersecurity talent and how to address them

Caroline Vignollet, OneSpan March 11, 2023 10:10 AM
5 steps to gain control of vulnerability management for your enterprise
Guest

5 steps to gain control of vulnerability management for your enterprise

David Farquhar, Nucleus Security March 10, 2023 11:07 AM
Why machine identity management should be your focus in 2023
Guest

Why machine identity management should be your focus in 2023

Kevin Bocek, Venafi March 6, 2023 1:07 PM
Top cloud security threats in 2023 and how to tackle them
Sponsored

Top cloud security threats in 2023 and how to tackle them

Aaron Cockerill, Lookout February 2, 2023 4:20 AM
10 steps every business can take to avoid a cybersecurity breach

10 steps every business can take to avoid a cybersecurity breach

Louis Columbus January 27, 2023 9:07 AM
  • Press Releases
  • Contact Us
  • Advertise
  • Share a News Tip
  • Contribute to DataDecisionMakers
  • Privacy Policy
  • Terms of Service

© 2024 TechForgePulse. All rights reserved.

Want must-read news straight to your inbox?
Sign up for Security Weekly
View Newsletters