Prateek TemkarSenior Director of Product Management, SymantecPosted: 6 Jun, 20255 Min ReadRead This Before Adopting AIHow to keep your data safe before activating tools like CopilotRead This Before Adopting AI
Enterprise Security Groupby BroadcomPosted: 5 Jun, 20255 Min ReadMeet the Threat Hunters Who Alert Security Teams To What’s ComingExtensive intel and expert analysis make our Threat Hunters a key component in protecting organizations from today’s critical threatsMeet the Threat Hunters Who Alert Security Teams To What’s Coming
Yuanjing GuoSoftware EngineerPosted: 5 Jun, 20254 Min ReadUnmasking Insecure HTTP Data Leaks in Popular Chrome ExtensionsExtensions analyzed expose information such as browsing domains, machine IDs, OS details, usage analytics, and more.Unmasking Insecure HTTP Data Leaks in Popular Chrome Extensions
Yuanjing GuoSoftware EngineerPosted: 5 Jun, 20254 Min ReadSecurity Flaws in Chrome Extensions: The Hidden Dangers of Hardcoded CredentialsAPI keys, secrets, and tokens commonly left exposed in browser extensions’ code.Security Flaws in Chrome Extensions: The Hidden Dangers of Hardcoded Credentials
Nate FitzgeraldHead of Product Management, Enterprise Security Group, BroadcomPosted: 3 Jun, 20255 Min ReadWhy Real-World Testing MattersOur perfect scores on the latest SE LABS® tests reveal something even more important than perfect scoresWhy Real-World Testing Matters