DarkReading

@DarkReading

News and information on IT security, helping information security pros manage the balance between data protection and user access.

Joined November 2008

Tweets

You blocked @DarkReading

Are you sure you want to view these Tweets? Viewing Tweets won't unblock @DarkReading

  1. 5 hours ago

    How to Outsource Security Without Inviting Risk and Wasting Money | At this Dark Reading webinar experts offer advice on how to effectively use/choose 3rd-party service providers & how to ensure the provider is meeting your security requirements. Join us>>

    Undo
  2. 5 hours ago

    Making Security Orchestration Automation and Response (SOAR) Work in Your Enterprise | At this webinar, learn the details of how SOAR works, how it can enhance your defenses and get staffing and skill considerations. Join us August 17>>

    Undo
  3. Aug 7

    Reduce Supply Chain Risk by External Threat Hunting | At this Dark Reading webinar learn the ROI gains from external threat hunting and what it takes to block attacks before they’re launched. Register Today>>>

    Undo
  4. Aug 7

    Two Sides of the PAM Coin | At this August 11 webinar learn why you must go beyond simply implementing a vault to further mitigate risk and align with modern best practices such as Zero Trust. Register today>>

    Undo
  5. Aug 6

    FragAttacks Foil 2 Decades of Wireless Security by

    Undo
  6. Aug 6

    How to Outsource Security Without Inviting Risk and Wasting Money | At this Dark Reading webinar experts offer advice on how to effectively use/choose 3rd-party service providers & how to ensure the provider is meeting your security requirements. Join us>>

    Undo
  7. Aug 6

    Making Security Orchestration Automation and Response (SOAR) Work in Your Enterprise | At this webinar, learn the details of how SOAR works, how it can enhance your defenses and get staffing and skill considerations. Join us August 17>>

    Undo
  8. Retweeted
    Aug 6

    So and pulled an all-nighter to build a free tool for checking if your Dynamic DNS settings are misconfigured & possibly leaking: This is in response to their DNS Name Server Hijack research shown at

    Undo
  9. Aug 6

    Researchers Find Flaw in IoT Devices' Random Number Generator

    Undo
  10. Aug 6

    FTC: Phishing Campaign Targets Unemployment Benefits & PII

    Undo
  11. Aug 6

    Researchers Call for 'CVE' Approach for Cloud Vulnerabilities by

    Undo
  12. Aug 6

    Ask the Experts: What Are Some of the Must-Have Steps in a Ransomware Response Plan? by Liam O'Murchu, Director with the Security Technology and Response group at Symantec

    Undo
  13. Aug 6

    In Attack Surface Management, It's What You Don't See That Can Sink You by Rob Gurzeev (), Co-Founder and CEO of

    Undo
  14. Aug 6

    HTTP/2 Implementation Errors Exposing Websites to Serious Risks by

    Undo
  15. Aug 6

    Incident Responders Explore Microsoft 365 Attacks in the Wild by

    Undo
  16. Aug 6

    CISA Launches JCDC, the Joint Cyber Defense Collaborative by

    Undo
  17. Aug 5

    Reduce Supply Chain Risk by External Threat Hunting | At this Dark Reading webinar learn the ROI gains from external threat hunting and what it takes to block attacks before they’re launched. Register Today>>>

    Undo
  18. Aug 5

    Two Sides of the PAM Coin | At this August 11 webinar learn why you must go beyond simply implementing a vault to further mitigate risk and align with modern best practices such as Zero Trust. Register today>>

    Undo
  19. Aug 5

    Prophet Spider Exploits WebLogic CVEs to Enable Ransomware Attacks

    Undo
  20. Aug 5

    Top 5 Techniques Attackers Use to Bypass MFA by Hitesh Sheth (), CEO at Vectra ()

    Undo

Loading seems to be taking a while.

Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.

    You may also like

    ·