Skip to main content
Events Special Issues
VentureBeat Homepage
Subscribe
  • Artificial Intelligence
    • View All
    • AI, ML and Deep Learning
    • Auto ML
    • Data Labelling
    • Synthetic Data
    • Conversational AI
    • NLP
    • Text-to-Speech
  • Security
    • View All
    • Data Security and Privacy
    • Network Security and Privacy
    • Software Security
    • Computer Hardware Security
    • Cloud and Data Storage Security
  • Data Infrastructure
    • View All
    • Data Science
    • Data Management
    • Data Storage and Cloud
    • Big Data and Analytics
    • Data Networks
  • Automation
    • View All
    • Industrial Automation
    • Business Process Automation
    • Development Automation
    • Robotic Process Automation
    • Test Automation
  • Enterprise Analytics
    • View All
    • Business Intelligence
    • Disaster Recovery Business Continuity
    • Statistical Analysis
    • Predictive Analysis
  • More
    • Data Decision Makers
    • Virtual Communication
      • Team Collaboration
      • UCaaS
      • Virtual Reality Collaboration
      • Virtual Employee Experience
    • Programming & Development
      • Product Development
      • Application Development
      • Test Management
      • Development Languages
Subscribe Events Special Issues

Topic > Software Security

Making security invisible with adaptive access management

Making security invisible with adaptive access management

Louis Columbus January 26, 2023 9:00 AM
How password management tools are helping enterprises prevent intrusions

How password management tools are helping enterprises prevent intrusions

Louis Columbus January 24, 2023 11:07 AM
Why the US government’s TikTok ban is impractical for the private sector

Why the US government’s TikTok ban is impractical for the private sector

Tim Keary January 13, 2023 7:42 AM
Intel launches confidential computing solution for virtual machines

Intel launches confidential computing solution for virtual machines

Tim Keary January 10, 2023 10:00 AM
Why enterprises can’t afford to overlook API security in 2023 

Why enterprises can’t afford to overlook API security in 2023 

Tim Keary January 5, 2023 8:07 AM
Defensive vs. offensive AI: Why security teams are losing the AI war

Defensive vs. offensive AI: Why security teams are losing the AI war

Louis Columbus January 3, 2023 10:07 AM
Father and son help cryptocurrency owners recover their lost assets

Father and son help cryptocurrency owners recover their lost assets

Dean Takahashi January 2, 2023 8:00 AM
Top 5 stories of the week: ChatGPT and cybersecurity predictions

Top 5 stories of the week: ChatGPT and cybersecurity predictions

Dan Muse December 24, 2022 10:58 AM
Protecting your organization from rising software supply chain attacks

Protecting your organization from rising software supply chain attacks

Taryn Plumb December 23, 2022 5:12 AM
2023 cybersecurity forecasts: Zero trust, cloud security will top spending

2023 cybersecurity forecasts: Zero trust, cloud security will top spending

Louis Columbus December 20, 2022 8:07 AM
Open-source code is everywhere; GitHub expands security tools to help secure it

Open-source code is everywhere; GitHub expands security tools to help secure it

Taryn Plumb December 16, 2022 5:10 AM
Open-source security successes, learnings and new money reported by OpenSSF’s Alpha-Omega

Open-source security successes, learnings and new money reported by OpenSSF’s Alpha-Omega

Sean Michael Kerner December 14, 2022 6:00 AM
Why developer-first security is needed from the start, from DevSecOps pioneer Snyk

Why developer-first security is needed from the start, from DevSecOps pioneer Snyk

Taryn Plumb December 13, 2022 4:31 PM
Google releases vulnerability scanner for open-source software, backed by community-editable database

Google releases vulnerability scanner for open-source software, backed by community-editable database

Tim Keary December 13, 2022 10:00 AM
Ethical hackers discovered 65,000 software vulnerabilities this year

Ethical hackers discovered 65,000 software vulnerabilities this year

Tim Keary December 12, 2022 7:29 AM
Remote browser isolation could be your secret superpower against phishing
Guest

Remote browser isolation could be your secret superpower against phishing

Rodman Ramezanian, Skyhigh Security December 11, 2022 11:07 AM
How companies without CISOs can build their defenses
Guest

How companies without CISOs can build their defenses

David Primor, Cynomi December 11, 2022 10:10 AM
Forrester analysts share 5 shocking cybersecurity predictions for 2023 

Forrester analysts share 5 shocking cybersecurity predictions for 2023 

Tim Keary December 8, 2022 1:50 PM
Automation and IAM help enterprises address identity sprawl, Rezonate raises $8.7 million

Automation and IAM help enterprises address identity sprawl, Rezonate raises $8.7 million

Tim Keary December 6, 2022 4:00 AM
Top 10 risk-based vulnerability management (VM) tools for 2022

Top 10 risk-based vulnerability management (VM) tools for 2022

Drew Robb December 5, 2022 12:04 PM
Better together: Offsetting cybersecurity’s labor challenges with API integrations
Guest

Better together: Offsetting cybersecurity’s labor challenges with API integrations

Joseph Tibbetts, Mimecast December 3, 2022 10:10 AM
Gartner analysts reveal 8 cybersecurity predictions for 2023 

Gartner analysts reveal 8 cybersecurity predictions for 2023 

Tim Keary December 2, 2022 2:10 PM
What is risk-based vulnerability management?

What is risk-based vulnerability management?

Drew Robb December 2, 2022 9:07 AM
A new year, new cyberthreats, methods, protections

A new year, new cyberthreats, methods, protections

Taryn Plumb December 2, 2022 7:20 AM
Why CISOs need to make software bills of materials (SBOMs) a top priority in 2023

Why CISOs need to make software bills of materials (SBOMs) a top priority in 2023

Louis Columbus December 1, 2022 2:40 PM
31 CISOs share their security priorities and predictions for 2023

31 CISOs share their security priorities and predictions for 2023

Tim Keary November 30, 2022 10:14 AM
Twitter API security breach exposes 5.4 million users’ data

Twitter API security breach exposes 5.4 million users’ data

Tim Keary November 28, 2022 12:15 PM
Report: Account takeover attacks spike – fraudsters take aim at fintech and crypto

Report: Account takeover attacks spike – fraudsters take aim at fintech and crypto

VB Staff November 28, 2022 6:05 AM
Report: 96% of vulnerable open-source downloads are avoidable

Report: 96% of vulnerable open-source downloads are avoidable

VB Staff November 25, 2022 12:16 PM
Why API security is a fast-growing threat to data-driven enterprises

Why API security is a fast-growing threat to data-driven enterprises

Victor Dey November 23, 2022 7:45 AM
Deloitte reveals 10 strategic cybersecurity predictions for 2023 

Deloitte reveals 10 strategic cybersecurity predictions for 2023 

Tim Keary November 21, 2022 2:07 PM
How CISOs can drive revenue gains and advance their careers

How CISOs can drive revenue gains and advance their careers

Louis Columbus November 21, 2022 12:37 PM
Forrester offers guidance on getting zero trust right and achieving security goals

Forrester offers guidance on getting zero trust right and achieving security goals

Louis Columbus November 21, 2022 12:07 PM
Palo Alto Networks acquires supply chain security provider, aims to harden application security

Palo Alto Networks acquires supply chain security provider, aims to harden application security

Esther Shein November 18, 2022 12:50 PM
Report: Intel 471 reports decrease in ransomware attacks in 3Q 2022

Report: Intel 471 reports decrease in ransomware attacks in 3Q 2022

VB Staff November 17, 2022 2:40 PM
Elastic report: Nearly 33% of cyberattacks in the cloud leverage credential access

Elastic report: Nearly 33% of cyberattacks in the cloud leverage credential access

VB Staff November 16, 2022 3:10 PM
Hardening the software supply chain, BoostSecurity raises $8.5M 

Hardening the software supply chain, BoostSecurity raises $8.5M 

Tim Keary November 16, 2022 5:00 AM
What is social engineering? Definition, types, attack techniques

What is social engineering? Definition, types, attack techniques

Drew Robb November 7, 2022 3:21 PM
KnowBe4 offers real-time coaching to stop phishing with new HDR tool

KnowBe4 offers real-time coaching to stop phishing with new HDR tool

Tim Keary November 7, 2022 9:51 AM
Is 1Password going passwordless?  

Is 1Password going passwordless?  

Tim Keary November 4, 2022 2:08 PM
  • VentureBeat Homepage
  • Follow us on Facebook
  • Follow us on Twitter
  • Follow us on LinkedIn
  • Follow us on RSS
  • Press Releases
  • Contact Us
  • Advertise
  • Share a News Tip
  • Contribute to DataDecisionMakers
  • Careers
  • Privacy Policy
  • Terms of Service

© 2023 VentureBeat. All rights reserved.

Want must-read news straight to your inbox?
Sign up for VentureBeat Briefings
View Briefings