
Search > penetrate


Roundhill Investments launches first ever generative AI ETF, signaling growing prominence in enterprise software

Guest
ChatGPT is about to revolutionize cybersecurity

10 ways ChatGPT and generative AI can strengthen zero trust

Guest
How to vet your vendors: Ensuring data privacy and security compliance

Google unveils new council and legal fund to support vulnerability disclosure

Sky Mavis brings 4 new blockchain games to its Ronin network

How shift left security and DevSecOps can protect the software supply chain

How Playstudios combines Vegas casinos, games and player rewards | Mickey Sonnino

Guest
4 misconceptions about data exfiltration

Shift left critical to app security; Build38 raises €13M for trust development kit

Guest
Top 5 cyber-threats and how to prevent them

Guest
The profound danger of conversational AI

Guest
The black hat hacker trap: Why unethical hacking lures young people

Gaming and the ultimate metaverse fantasy | The DeanBeat

T-Mobile data breach shows API security can’t be ignored

Tamatem Games launches payment and distribution platform for mobile games

How upskilling and training providers help close the cybersecurity skills gap

The best products and moments of CES 2023 | The DeanBeat

Lumus readies new waveguide designs for smaller and lighter AR glasses

Report: Cloud revenue growth far outpaces on-premises

The hottest IT skills for 2023 – even in a recession

Employee offboarding: A data privacy and compliance primer for HR and IT

How RISC-V has become a viable third processor architecture | Calista Redmond

Automating governance, risk and compliance (GRC), Drata announces series C

A new year, new cyberthreats, methods, protections

How penetration testing bolsters API security

Guest
Cyberattack on L.A. schools shows bolder action needed to stop ransomware

Why API security is a fast-growing threat to data-driven enterprises

Bishop Fox turns to penetration testing to secure the attack surface

Guest
Russia’s war in Ukraine: 3 cybersecurity takeaways for enterprises

What is social engineering? Definition, types, attack techniques

Guest
How tech businesses can insulate themselves from supply chain shortages

Ransomware vulnerabilities soar as attackers look for easy targets

How external attack surface management lets you see your org through an attacker’s eyes

Vulnerability management isn’t scalable, but bug bounty programs are

Guest
Why cybersecurity starts in the C-suite

Guest
T-ray technology is moving from sci-fi to mainstream

What is medical artificial intelligence (AI)?
