Skip to main content
Events Video Special Issues Jobs
VentureBeat Homepage
Subscribe
  • Artificial Intelligence
    • View All
    • AI, ML and Deep Learning
    • Auto ML
    • Data Labelling
    • Synthetic Data
    • Conversational AI
    • NLP
    • Text-to-Speech
  • Security
    • View All
    • Data Security and Privacy
    • Network Security and Privacy
    • Software Security
    • Computer Hardware Security
    • Cloud and Data Storage Security
  • Data Infrastructure
    • View All
    • Data Science
    • Data Management
    • Data Storage and Cloud
    • Big Data and Analytics
    • Data Networks
  • Automation
    • View All
    • Industrial Automation
    • Business Process Automation
    • Development Automation
    • Robotic Process Automation
    • Test Automation
  • Enterprise Analytics
    • View All
    • Business Intelligence
    • Disaster Recovery Business Continuity
    • Statistical Analysis
    • Predictive Analysis
  • More
    • Data Decision Makers
    • Virtual Communication
      • Team Collaboration
      • UCaaS
      • Virtual Reality Collaboration
      • Virtual Employee Experience
    • Programming & Development
      • Product Development
      • Application Development
      • Test Management
      • Development Languages
Subscribe Events Video Special Issues Jobs

Topic > Software Security

Cohesity partners with Google Cloud to empower organizations with generative AI and data capabilities

Cohesity partners with Google Cloud to empower organizations with generative AI and data capabilities

Victor Dey May 23, 2023 10:37 AM
It’s generative AI models vs. hackers at DEF CON’s AI Village

It’s generative AI models vs. hackers at DEF CON’s AI Village

Sean Michael Kerner May 5, 2023 1:35 PM
Getting cyber-resilience right in a zero-trust world starts at the endpoint

Getting cyber-resilience right in a zero-trust world starts at the endpoint

Louis Columbus May 2, 2023 7:10 AM
How deepfakes ‘hack the humans’ (and corporate networks)
Guest

How deepfakes ‘hack the humans’ (and corporate networks)

Thomas Willkan, Accenture April 28, 2023 11:07 PM
Why security and resilience are essential for enterprise risk management
Guest

Why security and resilience are essential for enterprise risk management

Howard Boville, IBM Cloud Platform April 27, 2023 11:07 AM
Biden’s cybersecurity strategy is bold, but it may get held up in Congress
Guest

Biden’s cybersecurity strategy is bold, but it may get held up in Congress

Bob Kolasky, Exiger April 23, 2023 11:10 AM
EU Cyber Solidarity Act aims to establish a ‘European cybersecurity shield’ 

EU Cyber Solidarity Act aims to establish a ‘European cybersecurity shield’ 

Tim Keary April 18, 2023 12:21 PM
Report finds 82% of open-source software components ‘inherently risky’ 

Report finds 82% of open-source software components ‘inherently risky’ 

Tim Keary April 17, 2023 8:59 AM
How mass layoffs can create new risks for corporate security

How mass layoffs can create new risks for corporate security

Tim Keary April 14, 2023 2:14 PM
CISA pressures tech vendors to ship secure software ‘out of the box’

CISA pressures tech vendors to ship secure software ‘out of the box’

Tim Keary April 13, 2023 1:22 PM
A third of organizations admit to covering up data breaches

A third of organizations admit to covering up data breaches

Tim Keary April 5, 2023 11:59 PM
Zero trust for web and application access: Developing a cybersecurity playbook for BYOD and beyond

Zero trust for web and application access: Developing a cybersecurity playbook for BYOD and beyond

Louis Columbus April 3, 2023 1:37 PM
Working in cybersecurity and zero trust with Ericom Software’s David Canellos

Working in cybersecurity and zero trust with Ericom Software’s David Canellos

Louis Columbus March 31, 2023 9:50 AM
Defining endpoint security in a zero-trust world

Defining endpoint security in a zero-trust world

Louis Columbus March 20, 2023 3:34 PM
A zero-trust roadmap for cybersecurity in manufacturing — from a 98-year-old company

A zero-trust roadmap for cybersecurity in manufacturing — from a 98-year-old company

Louis Columbus March 16, 2023 11:37 AM
Report: Hackers leaked over 721 million passwords in 2022 

Report: Hackers leaked over 721 million passwords in 2022 

Tim Keary March 14, 2023 3:00 AM
The challenges of attracting cybersecurity talent and how to address them
Guest

The challenges of attracting cybersecurity talent and how to address them

Caroline Vignollet, OneSpan March 11, 2023 10:10 AM
5 steps to gain control of vulnerability management for your enterprise
Guest

5 steps to gain control of vulnerability management for your enterprise

David Farquhar, Nucleus Security March 10, 2023 11:07 AM
Modernizing identity access management with zero trust

Modernizing identity access management with zero trust

Louis Columbus March 6, 2023 12:07 PM
How to avoid billion-dollar fines due to unsecured messaging apps
Guest

How to avoid billion-dollar fines due to unsecured messaging apps

Anurag Lal, NetSfere March 5, 2023 9:10 AM
Should organizations swear off open-source software altogether?

Should organizations swear off open-source software altogether?

Tim Keary February 27, 2023 6:12 AM
How monitoring libraries rather than containers is key to open-source security

How monitoring libraries rather than containers is key to open-source security

Tim Keary February 15, 2023 4:00 AM
Top 5 cyber-threats and how to prevent them
Guest

Top 5 cyber-threats and how to prevent them

Jay Paz, Cobalt February 5, 2023 9:10 AM
Top cloud security threats in 2023 and how to tackle them
Sponsored

Top cloud security threats in 2023 and how to tackle them

Aaron Cockerill, Lookout February 2, 2023 4:20 AM
Black swans events are shaping the cybersecurity present and future
Guest

Black swans events are shaping the cybersecurity present and future

Moshe Lipsker, Imperva January 29, 2023 9:10 AM
Why we should care about the theft of $1
Guest

Why we should care about the theft of $1

Doron Hendler, RevealSecurity January 28, 2023 9:10 AM
10 steps every business can take to avoid a cybersecurity breach

10 steps every business can take to avoid a cybersecurity breach

Louis Columbus January 27, 2023 9:07 AM
Making security invisible with adaptive access management

Making security invisible with adaptive access management

Louis Columbus January 26, 2023 9:00 AM
How password management tools are helping enterprises prevent intrusions

How password management tools are helping enterprises prevent intrusions

Louis Columbus January 24, 2023 11:07 AM
Why the US government’s TikTok ban is impractical for the private sector

Why the US government’s TikTok ban is impractical for the private sector

Tim Keary January 13, 2023 7:42 AM
Intel launches confidential computing solution for virtual machines

Intel launches confidential computing solution for virtual machines

Tim Keary January 10, 2023 10:00 AM
Why enterprises can’t afford to overlook API security in 2023 

Why enterprises can’t afford to overlook API security in 2023 

Tim Keary January 5, 2023 8:07 AM
Defensive vs. offensive AI: Why security teams are losing the AI war

Defensive vs. offensive AI: Why security teams are losing the AI war

Louis Columbus January 3, 2023 10:07 AM
Father and son help cryptocurrency owners recover their lost assets

Father and son help cryptocurrency owners recover their lost assets

Dean Takahashi January 2, 2023 8:00 AM
Top 5 stories of the week: ChatGPT and cybersecurity predictions

Top 5 stories of the week: ChatGPT and cybersecurity predictions

Dan Muse December 24, 2022 10:58 AM
Protecting your organization from rising software supply chain attacks

Protecting your organization from rising software supply chain attacks

Taryn Plumb December 23, 2022 5:12 AM
2023 cybersecurity forecasts: Zero trust, cloud security will top spending

2023 cybersecurity forecasts: Zero trust, cloud security will top spending

Louis Columbus December 20, 2022 8:07 AM
Open-source code is everywhere; GitHub expands security tools to help secure it

Open-source code is everywhere; GitHub expands security tools to help secure it

Taryn Plumb December 16, 2022 5:10 AM
Open-source security successes, learnings and new money reported by OpenSSF’s Alpha-Omega

Open-source security successes, learnings and new money reported by OpenSSF’s Alpha-Omega

Sean Michael Kerner December 14, 2022 6:00 AM
Why developer-first security is needed from the start, from DevSecOps pioneer Snyk

Why developer-first security is needed from the start, from DevSecOps pioneer Snyk

Taryn Plumb December 13, 2022 4:31 PM
  • VentureBeat Homepage
  • Follow us on Facebook
  • Follow us on Twitter
  • Follow us on LinkedIn
  • Follow us on RSS
  • Press Releases
  • Contact Us
  • Advertise
  • Share a News Tip
  • Contribute to DataDecisionMakers
  • Careers
  • Privacy Policy
  • Terms of Service

© 2023 VentureBeat. All rights reserved.

Want must-read news straight to your inbox?
Sign up for Security Weekly
View Briefings