The real mystery behind this year's Pwn2Own isn't how many bugs hackers will find or how much money they'll earn. It's about one hacker in particular and whether the What'sApp zero-click exploit the ...
Nate Nelson is a writer based in New York City. He formerly worked as a reporter at Threatpost, and wrote "Malicious Life," an award-winning Top 20 tech podcast on Apple and Spotify. Outside of Dark ...
As Dark Reading’s managing editor for features, Fahmida Y Rashid focuses on stories that provide security professionals with the information they need to do their jobs. She has spent over a decade ...
Dan is Head of Security at Intruder and runs the Penetration Testing and Security Engineering teams. His background is as a .NET engineer, penetration tester and security consultant.
Tim Wilson is Editor in Chief and co-founder of Dark Reading.com, UBM Tech's online community for information security professionals. He is responsible for managing the site, assigning and editing ...
Ameya Talwalkar is co-founder and chief product officer at Cequence Security. Over the last ten years, Ameya has built strong engineering teams specializing in enterprise and consumer security in ...
Ehud "Udi" Shamir is Chief Security Officer for SentinelOne and leads the company's research and forensic group. Udi also oversees product innovation and development. He joined SentinelOne from Check ...
G. Mark Hardy is an instructor with SANS and the founder and president of National Security Corporation. He has been providing cybersecurity expertise to government, military, and commercial clients ...
Tal Klein is Vice President of Strategy at Lakeside Software. Previously, he was vice president of marketing and strategy at Adallom, a leading Cloud Access Security Broker. He was also senior ...
John Kindervag is considered one of the world’s foremost cybersecurity experts. With more than 25 years of experience as a practitioner and industry analyst, he is best known for creating the ...
Bryan Simon is a SANS Certified Instructor and an internationally recognized expert in cybersecurity, with a special focus on defensive and offensive capabilities. Bryan's scholastic achievements have ...
Conclusion As organizations continue to onboard new vendors, supply chain and other third-party risks will continue to climb. By continuously evaluating and updating your organization's third-party ...
Results that may be inaccessible to you are currently showing.
Hide inaccessible results