The real mystery behind this year's Pwn2Own isn't how many bugs hackers will find or how much money they'll earn. It's about one hacker in particular and whether the What'sApp zero-click exploit the ...
Nate Nelson is a writer based in New York City. He formerly worked as a reporter at Threatpost, and wrote "Malicious Life," an award-winning Top 20 tech podcast on Apple and Spotify. Outside of Dark ...
As Dark Reading’s managing editor for features, Fahmida Y Rashid focuses on stories that provide security professionals with the information they need to do their jobs. She has spent over a decade ...
Ameya Talwalkar is co-founder and chief product officer at Cequence Security. Over the last ten years, Ameya has built strong engineering teams specializing in enterprise and consumer security in ...
Tim Wilson is Editor in Chief and co-founder of Dark Reading.com, UBM Tech's online community for information security professionals. He is responsible for managing the site, assigning and editing ...
G. Mark Hardy is an instructor with SANS and the founder and president of National Security Corporation. He has been providing cybersecurity expertise to government, military, and commercial clients ...
Dan is Head of Security at Intruder and runs the Penetration Testing and Security Engineering teams. His background is as a .NET engineer, penetration tester and security consultant.
Tal Klein is Vice President of Strategy at Lakeside Software. Previously, he was vice president of marketing and strategy at Adallom, a leading Cloud Access Security Broker. He was also senior ...
Ehud "Udi" Shamir is Chief Security Officer for SentinelOne and leads the company's research and forensic group. Udi also oversees product innovation and development. He joined SentinelOne from Check ...
John Kindervag is considered one of the world’s foremost cybersecurity experts. With more than 25 years of experience as a practitioner and industry analyst, he is best known for creating the ...
Bryan Simon is a SANS Certified Instructor and an internationally recognized expert in cybersecurity, with a special focus on defensive and offensive capabilities. Bryan's scholastic achievements have ...
AI tools and platforms need troves of data to function. When employees share or paste sensitive information into AI platforms or chat windows, that data could be stored or even used for future ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results