Thistle's technology will give device makers a way to easily integrate features for secure updates, memory management, and communications into their products, Snyder says.
Read moreSimplify to Survive: How Organizations Can Navigate Cyber-Risk
February 16 2023Simplification can result in efficiencies, reduced overhead, and the ability to respond to cyber threats more quickly.
Read moreIt's a classic attacker move: Use security protections against those who deploy them. But organizations can still defuse and prevent these encrypted attacks.
Read moreDescope Handles Authentication So Developers Don’t Have To
February 16 2023Developers don't have to build authentication and user management from scratch, and can devote their energies to the core functions of the application, instead.
Read moreOligo Security Takes Aim at Open Source Vulnerabilities
February 16 2023The startup's software helps organizations secure their containers in the cloud by teasing out which packages are running and which are vulnerable.
Read moreChatGPT Subs In as Security Analyst, Hallucinates Only Occasionally
February 16 2023Incident response triage and software vulnerability discovery are two areas where the large language model has demonstrated success, although false positives are common.
Read moreBrivo Reveals Top Security Trends for 2023: Convenience Is King in Securing the Hybrid Workplaces of the Future
February 16 2023Factoring user experience and convenience into how employees and tenants access buildings is top concern for security professionals says benchmark industry survey.
Read moreCall for Speakers Now Open for the RH-ISAC Cyber Intelligence Summit
February 16 2023Retail & Hospitality ISAC invites industry leaders, experts, and innovators to submit proposals for presentations and panel discussions.
Read moreGAO Calls for Improved Data Privacy Protections
February 16 2023US federal watchdog agency outlines key measures for better protecting sensitive data under the federal government's control.
Read more
Recent Comments