Quantcast
Channel: Kevin Townsend - SecurityWeek
Browsing all 132 articles
Browse latest View live

CISO Conversations: LinkedIn’s Geoff Belknap and Meta’s Guy Rosen

SecurityWeek interviews Geoff Belknap, CISO at LinkedIn, and Guy Rosen, CISO at Facebook parent company Meta. The post CISO Conversations: LinkedIn’s Geoff Belknap and Meta’s Guy Rosen appeared first...

View Article


Machine Identity Firm Venafi Readies for the 90-day Certificate Lifecycle

Venafi introduced a 90-Day TLS Readiness solution to help enterprises prepare for Google’s proposed 90-day limit for the lifecycle of a digital certificate. The post Machine Identity Firm Venafi...

View Article


Horizon3.ai Introduces AI-Assisted Service to Prioritize and Patch...

SaaS-based, AI-assisted penetration service allows proactive defensive action against exploitation of new vulnerabilities. The post Horizon3.ai Introduces AI-Assisted Service to Prioritize and Patch...

View Article

Token Security Raises $7 Million Seed Funding for Machine-First Identity...

Tel Aviv-based firm emerged from stealth with $7 million seed funding led by TLV Partners with participation from SNR and angel investors. The post Token Security Raises $7 Million Seed Funding for...

View Article

Criminal Use of AI Growing, But Lags Behind Defenders

When not scamming other criminals, criminals are concentrating on the use of mainstream AI products rather than developing their own AI systems. The post Criminal Use of AI Growing, But Lags Behind...

View Article


NATO Draws a Cyber Red Line in Tensions With Russia

Weakening liberal democracies and weakening the NATO alliance are conjoined in the hybrid war that Russia is conducting against Ukraine. The post NATO Draws a Cyber Red Line in Tensions With Russia...

View Article

Hacker Conversations: Ron Reiter, and the Making of a Professional Hacker

Ron Reiter was a childhood hacker in Israel. He was recruited into the IDF’s elite Unit 8200 for his military service. Now he is CTO and co-founder of cybersecurity firm Sentra. The post Hacker...

View Article

Beware – Your Customer Chatbot is Almost Certainly Insecure: Report

As chatbots become more adventurous, the dangers will increase. The post Beware – Your Customer Chatbot is Almost Certainly Insecure: Report appeared first on SecurityWeek.

View Article


Zero-Day Attacks and Supply Chain Compromises Surge, MFA Remains...

Attackers are getting more sophisticated, better armed, and faster. Nothing in Rapid7's 2024 Attack Intelligence Report suggests that this will change. The post Zero-Day Attacks and Supply Chain...

View Article


New Endpoint Protection Platform by Cigent Blocks Ransomware at the Data Level

The two primary components to the solution are to encrypt company data at all times, and to decrypt only when the file is required for use. The post New Endpoint Protection Platform by Cigent Blocks...

View Article

Resurgence of Ransomware: Mandiant Observes Sharp Rise in Criminal Extortion...

Mandiant saw an increase in ransomware activity in 2023 compared to 2022, including a 75% increase in posts on data leak sites. The post Resurgence of Ransomware: Mandiant Observes Sharp Rise in...

View Article

Why Hackers Love Logs

Log tampering is an almost inevitable part of a compromise. Why and how do cybercriminals target logs, and what can be done to protect them? The post Why Hackers Love Logs appeared first on SecurityWeek.

View Article

Dangerous Liaisons: The Interaction Between Threat Actors and High-Risk Devices

Forescout's 2024 analysis of the riskiest devices highlights vulnerabilities and threat actor interactions across IT, IoT, OT, and IoMT. The post Dangerous Liaisons: The Interaction Between Threat...

View Article


Edge Devices: The New Frontier for Mass Exploitation Attacks

The increase in mass exploitation involving edge services and devices is likely to worsen. The post Edge Devices: The New Frontier for Mass Exploitation Attacks appeared first on SecurityWeek.

View Article

Aim Security Raises $18M to Secure Customers’ Implementation of AI Apps

Aim Security has raised a total of $28 million to date and is on a mission to help companies to implement AI products with confidence. The post Aim Security Raises $18M to Secure Customers’...

View Article


Non-human Identity Lifecycle Firm Entro Security Raises $18 Million

Entro’s platform is designed to bring order to the increasingly chaotic management of non-human identities. The post Non-human Identity Lifecycle Firm Entro Security Raises $18 Million appeared first...

View Article

AI Weights: Securing the Heart and Soft Underbelly of Artificial Intelligence

AI model weights govern outputs from the system, but altered or ‘poisoned’, they can make the output erroneous and, in extremis, useless and dangerous. The post AI Weights: Securing the Heart and Soft...

View Article


Meta’s Virtual Reality Headset Vulnerable to Ransomware Attacks: Researcher

Researcher shows how hackers could use social engineering to deliver ransomware and other malware to Meta’s Quest 3 VR headset. The post Meta’s Virtual Reality Headset Vulnerable to Ransomware Attacks:...

View Article

Gaining and Retaining Security Talent: A Cheat Sheet for CISOs

Freed from the shackles of always demanding a technical background, the CISO can concentrate on building a diverse team comprising multiple skills. The post Gaining and Retaining Security Talent: A...

View Article

Inside the Mind of a CISO: Survey and Analysis

Inside the Mind of a CISO 2024 is a survey of 209 security leaders to understand the thinking and operational methods and motivations of CISOs. The post Inside the Mind of a CISO: Survey and Analysis...

View Article
Browsing all 132 articles
Browse latest View live