In the realm of cybersecurity start-ups, there is a widely held belief that the key to success lies in obtaining investor capital. However, recent data from Crunchbase shows a significant 35% decline in funding, raising the question of whether this belief still holds true.
Read MoreMazin Ahmed (Founder and CTO at Fullhunt.io) explains how he built a successful cybersecurity startup during the COVID-19 pandemic.
Read MoreThreat actors deploying Atomic Stealer (AMOS) are launching malicious ad campaigns to target Mac users.
Read MoreNeil J. Walsh will discuss various interpretations of cybercrime, divergent regulatory frameworks, and discrepancies in digital forensic capabilities. Ensuring the accuracy of cybercrime reports worldwide poses a significant challenge
Read MoreData alone is not intelligence – but unified security systems can build an understanding of context around a piece of data, enabling better threat identification and decision-making.
Read MoreThere’s no globally accepted definition of cyber diplomacy or cyber crime. Developing those cross-border agreements is an important step to enable cooperation and resilience.
Read MoreIt can't obtain large data files, but an easier and more cost-effective remote attack is no joke. Let's discuss Hertzbleed, a recently discovered computer chip vulnerability.
Read MoreHow can you secure a network when users with privileged access are increasing the threat vector?
Read MoreWhat are microarchitectural attacks – and is it possible to detect them through automated processes?
Read MoreBlack Hat Middle East & Africa (MEA), the cyber industry’s fastest-growing event, is on the move. This November’s second edition is relocating to the Riyadh Exhibition & Convention Centre, as it looks to record huge growth in floor space, exhibitors, national and industry pavilions, and speakers.
Read MoreWith over 25 years in the industry, Founder and CEO of Unit221b, Lance James shares his Zen-rooted approach to leadership.
Read MoreMulti-factor authentication (MFA) is widely promoted as an effective security method, but it does have vulnerabilities – as proven by the 0ktapus MFA attacks in 2022 and 2023.
Read More