Skip to main content
Events Special Issues
VentureBeat Homepage
Subscribe
  • Artificial Intelligence
    • View All
    • AI, ML and Deep Learning
    • Auto ML
    • Data Labelling
    • Synthetic Data
    • Conversational AI
    • NLP
    • Text-to-Speech
  • Security
    • View All
    • Data Security and Privacy
    • Network Security and Privacy
    • Software Security
    • Computer Hardware Security
    • Cloud and Data Storage Security
  • Data Infrastructure
    • View All
    • Data Science
    • Data Management
    • Data Storage and Cloud
    • Big Data and Analytics
    • Data Networks
  • Automation
    • View All
    • Industrial Automation
    • Business Process Automation
    • Development Automation
    • Robotic Process Automation
    • Test Automation
  • Enterprise Analytics
    • View All
    • Business Intelligence
    • Disaster Recovery Business Continuity
    • Statistical Analysis
    • Predictive Analysis
  • More
    • Data Decision Makers
    • Virtual Communication
      • Team Collaboration
      • UCaaS
      • Virtual Reality Collaboration
      • Virtual Employee Experience
    • Programming & Development
      • Product Development
      • Application Development
      • Test Management
      • Development Languages
Subscribe Events Special Issues

Search > security guidelines

Data protection regulations aren’t enough to safeguard your data
Guest

Data protection regulations aren’t enough to safeguard your data

Dan Middleton, Veeam UK & Ireland February 15, 2023 11:07 AM
Why the US government’s TikTok ban is impractical for the private sector

Why the US government’s TikTok ban is impractical for the private sector

Tim Keary January 13, 2023 7:42 AM
AWS security heads offer top cybersecurity predictions for 2023

AWS security heads offer top cybersecurity predictions for 2023

Taryn Plumb January 12, 2023 7:07 AM
Protecting edge data in the era of decentralization
Guest

Protecting edge data in the era of decentralization

Rob Emsley, Dell Technologies December 17, 2022 9:10 AM
Google releases labeling guidelines to help secure IoT devices at the network’s edge 

Google releases labeling guidelines to help secure IoT devices at the network’s edge 

Tim Keary November 2, 2022 4:00 PM
Oracle Distributed Cloud aims to help enterprises embrace cloud options (public, multicloud, hybrid and private)

Oracle Distributed Cloud aims to help enterprises embrace cloud options (public, multicloud, hybrid and private)

Taryn Plumb October 18, 2022 5:02 AM
<strong>Aqua Security and CIS release first formal guidelines for software supply chain security</strong>

Aqua Security and CIS release first formal guidelines for software supply chain security

Tim Keary June 22, 2022 3:30 PM
5 ways to build a smarter enterprise
Guest

5 ways to build a smarter enterprise

Corey Glickman, Infosys May 14, 2022 9:20 AM
Report: 74% of security leaders say that prevention-first strategies will fail

Report: 74% of security leaders say that prevention-first strategies will fail

VB Staff April 26, 2022 8:40 AM
Fortress Information Security receives $125M to find the answer to supply chain attacks

Fortress Information Security receives $125M to find the answer to supply chain attacks

Tim Keary April 19, 2022 3:00 AM
Microsoft releases patch for RCP vulnerability (why you need to act quickly)

Microsoft releases patch for RCP vulnerability (why you need to act quickly)

Tim Keary April 16, 2022 9:49 AM
Report: 681% increase in API attacks for customers in 2021

Report: 681% increase in API attacks for customers in 2021

VB Staff March 3, 2022 3:50 PM
Report: 99% of federal security pros want the government to increase data protection

Report: 99% of federal security pros want the government to increase data protection

VB Staff November 13, 2021 7:15 PM
Critical security controls for effective cyber defense strategies
Community

Critical security controls for effective cyber defense strategies

Harman Singh November 12, 2021 1:20 PM
OSS Enterprise: Open source perspectives and securing the software supply chain

OSS Enterprise: Open source perspectives and securing the software supply chain

Paul Sawers June 18, 2021 12:15 PM
SolarWinds hackers downloaded some Microsoft source code for Azure, Exchange, and Intune

SolarWinds hackers downloaded some Microsoft source code for Azure, Exchange, and Intune

Reuters February 18, 2021 10:26 PM
Nylas nabs $25 million as the API economy explodes

Nylas nabs $25 million as the API economy explodes

Paul Sawers June 23, 2020 7:00 AM
NYC passes POST Act, requiring police department to reveal surveillance technologies

NYC passes POST Act, requiring police department to reveal surveillance technologies

Kyle Wiggers June 18, 2020 1:05 PM
The coronavirus crisis could push the U.S. to adopt online voting by 2024
Guest

The coronavirus crisis could push the U.S. to adopt online voting by 2024

Kunal Anand May 30, 2020 8:45 AM
Stanford researchers propose AI in-home system that can monitor for coronavirus symptoms

Stanford researchers propose AI in-home system that can monitor for coronavirus symptoms

Seth Colaner April 6, 2020 8:25 AM
NowSecure raises $15 million to automate mobile app security and privacy testing

NowSecure raises $15 million to automate mobile app security and privacy testing

Kyle Wiggers June 28, 2019 4:30 AM
5 ways the government shutdown is impacting U.S. cybersecurity
Guest

5 ways the government shutdown is impacting U.S. cybersecurity

John Callahan January 21, 2019 2:10 PM
How NASDAQ makes strategic infrastructure decisions (VB Live)
VB Live

How NASDAQ makes strategic infrastructure decisions (VB Live)

VB Staff December 12, 2018 2:27 PM
What happens when hackers attack chatbots
Guest

What happens when hackers attack chatbots

Kriti Sharma, Sage GroupRobin Fewster, Sage Group May 29, 2017 2:33 PM
Federal Reserve Bank was hacked more than 50 times between 2011 and 2015

Federal Reserve Bank was hacked more than 50 times between 2011 and 2015

Reuters June 4, 2016 12:43 AM
Now young kids are starting to get hacked
Guest

Now young kids are starting to get hacked

Vivek Wadhwa December 11, 2015 9:11 AM
Blackphone will pay you cash to hack it — but only if you follow the rules

Blackphone will pay you cash to hack it — but only if you follow the rules

Richard Byrne Reilly September 23, 2014 3:45 PM
Vital Connect gets green light from FDA for biosensor patch

Vital Connect gets green light from FDA for biosensor patch

Mark Sullivan August 28, 2014 8:00 PM
4 ‘cyberhealth’ strategies for boards
Guest

4 ‘cyberhealth’ strategies for boards

Bob Ackerman, Allegis Capital August 21, 2014 5:10 PM
A security expert examines if the hackers of Ubisoft’s Watch Dogs could actually take over a real smart city (interview)

A security expert examines if the hackers of Ubisoft’s Watch Dogs could actually take over a real smart city (interview)

Dean Takahashi April 25, 2014 9:00 AM
Google Wallet launches on iPhone … before Apple’s digital wallet

Google Wallet launches on iPhone … before Apple’s digital wallet

John Koetsier September 19, 2013 9:28 AM
Get ready for more media hacks, Twitter warns

Get ready for more media hacks, Twitter warns

Meghan Kelly April 30, 2013 4:18 PM
Navy SEALs face disciplinary action for consulting on Medal of Honor: Warfighter

Navy SEALs face disciplinary action for consulting on Medal of Honor: Warfighter

jsnlomberg November 9, 2012 7:14 AM
Facebook said to be filing $5B IPO, Morgan Stanley selected to take lead

Facebook said to be filing $5B IPO, Morgan Stanley selected to take lead

Sean Ludwig January 31, 2012 2:59 PM
Facebook to file papers for IPO as soon as Wednesday

Facebook to file papers for IPO as soon as Wednesday

JVG January 27, 2012 10:56 AM
5 cloud trends you won’t want to miss in 2012

5 cloud trends you won’t want to miss in 2012

Matthew Weinberger January 25, 2012 8:50 AM
The Xbox Live security crisis

The Xbox Live security crisis

Brad Grenz January 23, 2012 3:05 PM
Facebook headed for its monster IPO in May, says report

Facebook headed for its monster IPO in May, says report

Sean Ludwig January 16, 2012 7:32 AM
Twittergate: “Most difficult part of Web 2.0 security is the human”

Twittergate: “Most difficult part of Web 2.0 security is the human”

Kim-Mai Cutler July 15, 2009 1:11 PM
  • VentureBeat Homepage
  • Follow us on Facebook
  • Follow us on Twitter
  • Follow us on LinkedIn
  • Follow us on RSS
  • Press Releases
  • Contact Us
  • Advertise
  • Share a News Tip
  • Contribute to DataDecisionMakers
  • Careers
  • Privacy Policy
  • Terms of Service

© 2023 VentureBeat. All rights reserved.

Want must-read news straight to your inbox?
Sign up for VB Daily
View Briefings