Skip to main content
Events Special Issues
VentureBeat Homepage
Subscribe
  • Artificial Intelligence
    • View All
    • AI, ML and Deep Learning
    • Auto ML
    • Data Labelling
    • Synthetic Data
    • Conversational AI
    • NLP
    • Text-to-Speech
  • Security
    • View All
    • Data Security and Privacy
    • Network Security and Privacy
    • Software Security
    • Computer Hardware Security
    • Cloud and Data Storage Security
  • Data Infrastructure
    • View All
    • Data Science
    • Data Management
    • Data Storage and Cloud
    • Big Data and Analytics
    • Data Networks
  • Automation
    • View All
    • Industrial Automation
    • Business Process Automation
    • Development Automation
    • Robotic Process Automation
    • Test Automation
  • Enterprise Analytics
    • View All
    • Business Intelligence
    • Disaster Recovery Business Continuity
    • Statistical Analysis
    • Predictive Analysis
  • More
    • Data Decision Makers
    • Virtual Communication
      • Team Collaboration
      • UCaaS
      • Virtual Reality Collaboration
      • Virtual Employee Experience
    • Programming & Development
      • Product Development
      • Application Development
      • Test Management
      • Development Languages
Subscribe Events Special Issues

Topic > Software Security

Working in cybersecurity and zero trust with Ericom Software’s David Canellos

Working in cybersecurity and zero trust with Ericom Software’s David Canellos

Louis Columbus March 31, 2023 9:50 AM
Defining endpoint security in a zero-trust world

Defining endpoint security in a zero-trust world

Louis Columbus March 20, 2023 3:34 PM
A zero-trust roadmap for cybersecurity in manufacturing — from a 98-year-old company

A zero-trust roadmap for cybersecurity in manufacturing — from a 98-year-old company

Louis Columbus March 16, 2023 11:37 AM
Report: Hackers leaked over 721 million passwords in 2022 

Report: Hackers leaked over 721 million passwords in 2022 

Tim Keary March 14, 2023 3:00 AM
The challenges of attracting cybersecurity talent and how to address them
Guest

The challenges of attracting cybersecurity talent and how to address them

Caroline Vignollet, OneSpan March 11, 2023 10:10 AM
5 steps to gain control of vulnerability management for your enterprise
Guest

5 steps to gain control of vulnerability management for your enterprise

David Farquhar, Nucleus Security March 10, 2023 11:07 AM
Modernizing identity access management with zero trust

Modernizing identity access management with zero trust

Louis Columbus March 6, 2023 12:07 PM
How to avoid billion-dollar fines due to unsecured messaging apps
Guest

How to avoid billion-dollar fines due to unsecured messaging apps

Anurag Lal, NetSfere March 5, 2023 9:10 AM
Should organizations swear off open-source software altogether?

Should organizations swear off open-source software altogether?

Tim Keary February 27, 2023 6:12 AM
How monitoring libraries rather than containers is key to open-source security

How monitoring libraries rather than containers is key to open-source security

Tim Keary February 15, 2023 4:00 AM
Top 5 cyber-threats and how to prevent them
Guest

Top 5 cyber-threats and how to prevent them

Jay Paz, Cobalt February 5, 2023 9:10 AM
Top cloud security threats in 2023 and how to tackle them
Sponsored

Top cloud security threats in 2023 and how to tackle them

Aaron Cockerill, Lookout February 2, 2023 4:20 AM
Black swans events are shaping the cybersecurity present and future
Guest

Black swans events are shaping the cybersecurity present and future

Moshe Lipsker, Imperva January 29, 2023 9:10 AM
Why we should care about the theft of $1
Guest

Why we should care about the theft of $1

Doron Hendler, RevealSecurity January 28, 2023 9:10 AM
10 steps every business can take to avoid a cybersecurity breach

10 steps every business can take to avoid a cybersecurity breach

Louis Columbus January 27, 2023 9:07 AM
Making security invisible with adaptive access management

Making security invisible with adaptive access management

Louis Columbus January 26, 2023 9:00 AM
How password management tools are helping enterprises prevent intrusions

How password management tools are helping enterprises prevent intrusions

Louis Columbus January 24, 2023 11:07 AM
Why the US government’s TikTok ban is impractical for the private sector

Why the US government’s TikTok ban is impractical for the private sector

Tim Keary January 13, 2023 7:42 AM
Intel launches confidential computing solution for virtual machines

Intel launches confidential computing solution for virtual machines

Tim Keary January 10, 2023 10:00 AM
Why enterprises can’t afford to overlook API security in 2023 

Why enterprises can’t afford to overlook API security in 2023 

Tim Keary January 5, 2023 8:07 AM
Defensive vs. offensive AI: Why security teams are losing the AI war

Defensive vs. offensive AI: Why security teams are losing the AI war

Louis Columbus January 3, 2023 10:07 AM
Father and son help cryptocurrency owners recover their lost assets

Father and son help cryptocurrency owners recover their lost assets

Dean Takahashi January 2, 2023 8:00 AM
Top 5 stories of the week: ChatGPT and cybersecurity predictions

Top 5 stories of the week: ChatGPT and cybersecurity predictions

Dan Muse December 24, 2022 10:58 AM
Protecting your organization from rising software supply chain attacks

Protecting your organization from rising software supply chain attacks

Taryn Plumb December 23, 2022 5:12 AM
2023 cybersecurity forecasts: Zero trust, cloud security will top spending

2023 cybersecurity forecasts: Zero trust, cloud security will top spending

Louis Columbus December 20, 2022 8:07 AM
Open-source code is everywhere; GitHub expands security tools to help secure it

Open-source code is everywhere; GitHub expands security tools to help secure it

Taryn Plumb December 16, 2022 5:10 AM
Open-source security successes, learnings and new money reported by OpenSSF’s Alpha-Omega

Open-source security successes, learnings and new money reported by OpenSSF’s Alpha-Omega

Sean Michael Kerner December 14, 2022 6:00 AM
Why developer-first security is needed from the start, from DevSecOps pioneer Snyk

Why developer-first security is needed from the start, from DevSecOps pioneer Snyk

Taryn Plumb December 13, 2022 4:31 PM
Google releases vulnerability scanner for open-source software, backed by community-editable database

Google releases vulnerability scanner for open-source software, backed by community-editable database

Tim Keary December 13, 2022 10:00 AM
Ethical hackers discovered 65,000 software vulnerabilities this year

Ethical hackers discovered 65,000 software vulnerabilities this year

Tim Keary December 12, 2022 7:29 AM
Remote browser isolation could be your secret superpower against phishing
Guest

Remote browser isolation could be your secret superpower against phishing

Rodman Ramezanian, Skyhigh Security December 11, 2022 11:07 AM
How companies without CISOs can build their defenses
Guest

How companies without CISOs can build their defenses

David Primor, Cynomi December 11, 2022 10:10 AM
Forrester analysts share 5 shocking cybersecurity predictions for 2023 

Forrester analysts share 5 shocking cybersecurity predictions for 2023 

Tim Keary December 8, 2022 1:50 PM
Automation and IAM help enterprises address identity sprawl, Rezonate raises $8.7 million

Automation and IAM help enterprises address identity sprawl, Rezonate raises $8.7 million

Tim Keary December 6, 2022 4:00 AM
Top 10 risk-based vulnerability management (VM) tools for 2022

Top 10 risk-based vulnerability management (VM) tools for 2022

Drew Robb December 5, 2022 12:04 PM
Better together: Offsetting cybersecurity’s labor challenges with API integrations
Guest

Better together: Offsetting cybersecurity’s labor challenges with API integrations

Joseph Tibbetts, Mimecast December 3, 2022 10:10 AM
Gartner analysts reveal 8 cybersecurity predictions for 2023 

Gartner analysts reveal 8 cybersecurity predictions for 2023 

Tim Keary December 2, 2022 2:10 PM
What is risk-based vulnerability management?

What is risk-based vulnerability management?

Drew Robb December 2, 2022 9:07 AM
A new year, new cyberthreats, methods, protections

A new year, new cyberthreats, methods, protections

Taryn Plumb December 2, 2022 7:20 AM
Why CISOs need to make software bills of materials (SBOMs) a top priority in 2023

Why CISOs need to make software bills of materials (SBOMs) a top priority in 2023

Louis Columbus December 1, 2022 2:40 PM
  • VentureBeat Homepage
  • Follow us on Facebook
  • Follow us on Twitter
  • Follow us on LinkedIn
  • Follow us on RSS
  • Press Releases
  • Contact Us
  • Advertise
  • Share a News Tip
  • Contribute to DataDecisionMakers
  • Careers
  • Privacy Policy
  • Terms of Service

© 2023 VentureBeat. All rights reserved.

Want must-read news straight to your inbox?
Sign up for Security Weekly
View Briefings