Quantcast
Channel: Kevin Townsend - SecurityWeek
Browsing all 201 articles
Browse latest View live

Google’s Willow Chip Signals the Urgency of Post-Quantum Cryptography...

Google’s Willow quantum chip marks a transformative moment in quantum computing development. The post Google’s Willow Chip Signals the Urgency of Post-Quantum Cryptography Migration appeared first on...

View Article


Google’s Willow Chip Signals the Urgency of Post-Quantum Cryptography...

Google’s Willow quantum chip marks a transformative moment in quantum computing development. The post Google’s Willow Chip Signals the Urgency of Post-Quantum Cryptography Migration appeared first on...

View Article


Google’s Willow Chip Signals the Urgency of Post-Quantum Cryptography...

Google’s Willow quantum chip marks a transformative moment in quantum computing development. The post Google’s Willow Chip Signals the Urgency of Post-Quantum Cryptography Migration appeared first on...

View Article

Google’s Willow Chip Signals the Urgency of Post-Quantum Cryptography...

Google’s Willow quantum chip marks a transformative moment in quantum computing development. The post Google’s Willow Chip Signals the Urgency of Post-Quantum Cryptography Migration appeared first on...

View Article

Google’s Willow Chip Signals the Urgency of Post-Quantum Cryptography Migration

Google’s Willow quantum chip marks a transformative moment in quantum computing development. The post Google’s Willow Chip Signals the Urgency of Post-Quantum Cryptography Migration appeared first on...

View Article


Insider Threat: Tackling the Complex Challenges of the Enemy WithinIndustry...

The insider threat problem will worsen, and the solutions will widen, in the age of generative-AI. The post Insider Threat: Tackling the Complex Challenges of the Enemy Within appeared first on...

View Article

Insider Threat: Tackling the Complex Challenges of the Enemy Within

The insider threat problem will worsen, and the solutions will widen, in the age of generative-AI. The post Insider Threat: Tackling the Complex Challenges of the Enemy Within appeared first on...

View Article

Cyber Insights 2025: Cyber Threat Intelligence

Cyber threat intelligence can inform decisions but is a complex issue. Where it is complete and accurate it is a huge boon. The post Cyber Insights 2025: Cyber Threat Intelligence appeared first on...

View Article


WEF Report Reveals Growing Cyber Resilience Divide Between Public and Private...

WEF's Global Cybersecurity Outlook 2025 report highlights key challenges like the skills gap, third-party risks, and resilience disparities between businesses and private sectors. The post WEF Report...

View Article


UK Considers Banning Ransomware Payment by Public Sector and CNI

Since no technical means have been found to curtail criminal extortion through prevention or attack, the new proposal is to eliminate its profitability. The post UK Considers Banning Ransomware Payment...

View Article

Cyber Insights 2025: Open Source and Software Supply Chain Security

Open source software (OSS) is a prime target for supply chain cyberattacks and protecting it remains a major challenge. The post Cyber Insights 2025: Open Source and Software Supply Chain Security...

View Article

Cyber Insights 2025: IdentitiesIndustry Moves for the week of January 13,...

Both human and machine identities occupy a unique position: they are simultaneously the foundation of cybersecurity and its weakest link. The post Cyber Insights 2025: Identities appeared first on...

View Article

Cyber Insights 2025: Identities

Both human and machine identities occupy a unique position: they are simultaneously the foundation of cybersecurity and its weakest link. The post Cyber Insights 2025: Identities appeared first on...

View Article


Cyber Insights 2025: Attack Surface Management

SecurityWeek's Cyber Insights 2025 examines expert opinions to gain their opinions on what to expect in Attack Surface Management in 2025. The post Cyber Insights 2025: Attack Surface Management...

View Article

Cyber Insights 2025: APIs – The Threat Continues

APIs are easy to develop, simple to implement, and frequently attacked. They are  prime and lucrative targets for cybercriminals.  The post Cyber Insights 2025: APIs – The Threat Continues appeared...

View Article


Doti AI Raises $7 Million Seed Funding for Instant Access to Internal Company...

Doti's platform uses AI to improve, automate, and streamline standard office and business processes across distributed and hybrid environments.  The post Doti AI Raises $7 Million Seed Funding for...

View Article

Doti AI Raises $7 Million Seed Funding for Instant Access to Internal Company...

Doti's platform uses AI to improve, automate, and streamline standard office and business processes across distributed and hybrid environments.  The post Doti AI Raises $7 Million Seed Funding for...

View Article


Cyber Insights 2025: Malware Directions

The continuing advance of AI brings the likelihood of effective, specific vulnerability-targeted new malware automatically produced in hours rather than days or weeks ever closer. The post Cyber...

View Article

Cyber Insights 2025: Social Engineering Gets AI WingsIndustry Moves for the...

Business resilience must be the ultimate purpose of all the security controls and processes we employ, because we will never conclusively defeat or protect ourselves from social engineering. The post...

View Article

Cyber Insights 2025: Social Engineering Gets AI Wings

Business resilience must be the ultimate purpose of all the security controls and processes we employ, because we will never conclusively defeat or protect ourselves from social engineering. The post...

View Article
Browsing all 201 articles
Browse latest View live