Quantcast
Channel: Kevin Townsend - SecurityWeek
Browsing all 201 articles
Browse latest View live

Endor Labs and Allies Launch Opengrep, Reviving True OSS for SAST

Opengrep is a new consortium-backed fork of Semgrep, intended to be and remain a true genuine OSS SAST tool. The post Endor Labs and Allies Launch Opengrep, Reviving True OSS for SAST appeared first on...

View Article


Cyber Insights 2025: Cybersecurity Regulatory MayhemIndustry Moves for the...

Cybersecurity regulations are facing a tipping point. There are too many and they are too complex to manage – and it’s getting worse. The post Cyber Insights 2025: Cybersecurity Regulatory Mayhem...

View Article


Cyber Insights 2025: Cybersecurity Regulatory Mayhem

Cybersecurity regulations are facing a tipping point. There are too many and they are too complex to manage – and it’s getting worse. The post Cyber Insights 2025: Cybersecurity Regulatory Mayhem...

View Article

Cyber Insights 2025: Artificial IntelligenceIndustry Moves for the week of...

Artificial intelligence is upending cybersecurity. It is used by adversaries in their attacks, and by defenders in their defense. The post Cyber Insights 2025: Artificial Intelligence appeared first on...

View Article

Cyber Insights 2025: Artificial Intelligence

Artificial intelligence is upending cybersecurity. It is used by adversaries in their attacks, and by defenders in their defense. The post Cyber Insights 2025: Artificial Intelligence appeared first on...

View Article


Cyber Insights 2025: Cyberinsurance – The Debate Continues

Better risk management could lead to reduced premiums on top of value for money, making cyberinsurance a silent driver for improved cybersecurity. The post Cyber Insights 2025: Cyberinsurance – The...

View Article

Taming Shadow AI: Valence Security, Endor Labs Unveil New Protections to...

Valence Security and Endor Labs have introduced extensions to their existing platforms specifically to tackle the invisibility and wrongful use of Shadow AI. The post Taming Shadow AI: Valence...

View Article

Taming Shadow AI: Valence Security, Endor Labs Unveil New Protections to...

Valence Security and Endor Labs have introduced extensions to their existing platforms specifically to tackle the invisibility and wrongful use of Shadow AI. The post Taming Shadow AI: Valence...

View Article


Cyber Insights 2025: Quantum and the Threat to EncryptionIndustry Moves for...

2025 is an important year – it is probably our last chance to start our migration to post quantum cryptography before we are all undone by cryptographically relevant quantum computers. The post Cyber...

View Article


Cyber Insights 2025: Quantum and the Threat to Encryption

2025 is an important year – it is probably our last chance to start our migration to post quantum cryptography before we are all undone by cryptographically relevant quantum computers. The post Cyber...

View Article

Cyber Insights 2025: The CISO OutlookIndustry Moves for the week of February...

There has never been a single job description for the CISO – the role depends upon each company, its maturity, its size and resources, and the risk tolerance of boards. The post Cyber Insights 2025:...

View Article

Cyber Insights 2025: The CISO Outlook

There has never been a single job description for the CISO – the role depends upon each company, its maturity, its size and resources, and the risk tolerance of boards. The post Cyber Insights 2025:...

View Article

Cyber Insights 2025: OT Security

Just as OT technology differs from IT technology, the threats, likely adversaries, and potential harm also differ. The post Cyber Insights 2025: OT Security appeared first on SecurityWeek.

View Article


Hacker Conversations: David Kennedy – an Atypical Typical HackerIndustry...

David Kennedy is a hacker. There is no doubt about that. He has qualities common among hackers, but also many differences. The post Hacker Conversations: David Kennedy – an Atypical Typical Hacker...

View Article

Hacker Conversations: David Kennedy – an Atypical Typical Hacker

David Kennedy is a hacker. There is no doubt about that. He has qualities common among hackers, but also many differences. The post Hacker Conversations: David Kennedy – an Atypical Typical Hacker...

View Article


Cybercrime Threatens National Security, Google Threat Intel Team SaysIndustry...

On the eve of the Munich Security Conference, Google argues that the cybercriminal threat should be treated as a national security threat like state-backed hacking groups. The post Cybercrime Threatens...

View Article

Cybercrime Threatens National Security, Google Threat Intel Team Says

On the eve of the Munich Security Conference, Google argues that the cybercriminal threat should be treated as a national security threat like state-backed hacking groups. The post Cybercrime Threatens...

View Article


Pangea Launches AI Guard and Prompt Guard to Combat Gen-AI Security Risks

Guardrail specialist releases new products to aid the development and use of secure gen-AI apps. The post Pangea Launches AI Guard and Prompt Guard to Combat Gen-AI Security Risks appeared first on...

View Article

CISO Conversations: Kevin Winter at Deloitte and Richard Marcus at...

SecurityWeek speaks with Kevin Winter, Global CISO at Deloitte, and Richard Marcus, CISO at AuditBoard. The post CISO Conversations: Kevin Winter at Deloitte and Richard Marcus at AuditBoard appeared...

View Article

CISO Conversations: Kevin Winter at Deloitte and Richard Marcus at AuditBoard

SecurityWeek speaks with Kevin Winter, Global CISO at Deloitte, and Richard Marcus, CISO at AuditBoard. The post CISO Conversations: Kevin Winter at Deloitte and Richard Marcus at AuditBoard appeared...

View Article
Browsing all 201 articles
Browse latest View live