The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches
Cloud
IoT
Physical Security
Perimeter
Analytics
Security Monitoring
Security Monitoring
App Sec
Database Security
Database Security
Risk
Compliance
Compliance
Threat Intelligence
Endpoint
Authentication
Mobile Security
Privacy
Authentication
Mobile Security
Privacy
Vulnerabilities / Threats
Advanced Threats
Insider Threats
Vulnerability Management
Advanced Threats
Insider Threats
Vulnerability Management
Operations
Identity & Access Management
Careers & People
Identity & Access Management
Careers & People
Remote Workforce
Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
Dark Reading Virtual Event - June 23 - Learn More
Black Hat USA - August 6-11 - Learn More
Webinars
Harnessing the Power of Security Automation
Jun 09, 2022
The Value Drivers of Attack Surface Management, Revealed
May 26, 2022
Resources
Close
Back
Resources
Reports >
Slideshows >
Tech Library >
Webinars >
White Papers >
Subscribe
Login
/
Register
The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches
Cloud
IoT
Physical Security
Perimeter
Analytics
Security Monitoring
Security Monitoring
App Sec
Database Security
Database Security
Risk
Compliance
Compliance
Threat Intelligence
Endpoint
Authentication
Mobile Security
Privacy
Authentication
Mobile Security
Privacy
Vulnerabilities / Threats
Advanced Threats
Insider Threats
Vulnerability Management
Advanced Threats
Insider Threats
Vulnerability Management
Operations
Identity & Access Management
Careers & People
Identity & Access Management
Careers & People
Remote Workforce
Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
Dark Reading Virtual Event - June 23 - Learn More
Black Hat USA - August 6-11 - Learn More
Webinars
Harnessing the Power of Security Automation
Jun 09, 2022
The Value Drivers of Attack Surface Management, Revealed
May 26, 2022
Resources
Close
Back
Resources
Reports >
Slideshows >
Tech Library >
Webinars >
White Papers >
The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches
Cloud
IoT
Physical Security
Perimeter
Analytics
Security Monitoring
Security Monitoring
App Sec
Database Security
Database Security
Risk
Compliance
Compliance
Threat Intelligence
Endpoint
Authentication
Mobile Security
Privacy
Authentication
Mobile Security
Privacy
Vulnerabilities / Threats
Advanced Threats
Insider Threats
Vulnerability Management
Advanced Threats
Insider Threats
Vulnerability Management
Operations
Identity & Access Management
Careers & People
Identity & Access Management
Careers & People
Remote Workforce
Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
Dark Reading Virtual Event - June 23 - Learn More
Black Hat USA - August 6-11 - Learn More
Webinars
Harnessing the Power of Security Automation
Jun 09, 2022
The Value Drivers of Attack Surface Management, Revealed
May 26, 2022
Resources
Close
Back
Resources
Reports >
Slideshows >
Tech Library >
Webinars >
White Papers >
Subscribe
Login
/
Register
SEARCH
A minimum of 3 characters are required to be typed in the search bar in order to perform a search.
Announcements
Event
Implementing and Using XDR to Improve Enterprise Cybersecurity | May 25 Webinar | <REGISTER NOW>
Event
Building and Maintaining an Effective IoT Cybersecurity Strategy | May 17 Webinar | <REGISTER NOW>
Event
HOW DATA BREACHES HAPPEN & WHAT TO DO WHEN THEY HAPPEN TO YOU | June 23 Virtual Event | <Get Your Pass>
Previous
Next
Analytics
Breaking news, news analysis, and expert commentary about cybersecurity data analytics, including tools & technologies.
Microsoft Releases Defender for SMBs
Microsoft's stand-alone version of Defender for SMBs promises to help SecOps teams automate detection, response, and recovery.
May 04, 2022
Microsoft's stand-alone version of Defender for SMBs promises to help SecOps teams automate detection, response, and recovery.
by Dark Reading Staff, Dark Reading
May 04, 2022
1 min read
Article
AI for Cybersecurity Shimmers With Promise, but Challenges Abound
Companies see AI-powered cybersecurity tools and systems as the future, but at present nearly 90% of them say they face significant hurdles in making use of them.
May 04, 2022
Companies see AI-powered cybersecurity tools and systems as the future, but at present nearly 90% of them say they face significant hurdles in making use of them.
by Robert Lemos, Contributing Writer
May 04, 2022
5 min read
Article
Cloudflare Flags Largest HTTPS DDoS Attack It's Ever Recorded
This scale of this month's encrypted DDoS attack over HTTPS suggests a well-resourced operation, analysts say.
April 29, 2022
This scale of this month's encrypted DDoS attack over HTTPS suggests a well-resourced operation, analysts say.
by Dark Reading Staff, Dark Reading
April 29, 2022
1 min read
Article
Explainable AI for Fraud Prevention
As the use of AI- and ML-driven decision-making draws transparency concerns, the need increases for explainability, especially when machine learning models appear in high-risk environments.
April 28, 2022
As the use of AI- and ML-driven decision-making draws transparency concerns, the need increases for explainability, especially when machine learning models appear in high-risk environments.
by David Utassy, Data Scientist, SEON
April 28, 2022
4 min read
Article
Tenable's Bit Discovery Buy Underscores Demand for Deeper Visibility of IT Assets
The four-year-old firm, started by two industry veterans, focuses on gaining visibility into Internet-facing services as more companies seek insight into what attackers see.
April 27, 2022
The four-year-old firm, started by two industry veterans, focuses on gaining visibility into Internet-facing services as more companies seek insight into what attackers see.
by Robert Lemos, Contributing Writer
April 27, 2022
5 min read
Article
Tenable Acquires External Attack Surface Management Vendor for $44.5M
Acquisition will add Internet-facing attack surface mapping and monitoring to Tenable's internal asset management products.
April 26, 2022
Acquisition will add Internet-facing attack surface mapping and monitoring to Tenable's internal asset management products.
by Dark Reading Staff, Dark Reading
April 26, 2022
1 min read
Article
API Attacks Soar Amid the Growing Application Surface Area
With Web application programming interface (API) traffic growing quickly, the average cloud-focused company sees three times more attacks.
April 26, 2022
With Web application programming interface (API) traffic growing quickly, the average cloud-focused company sees three times more attacks.
by Robert Lemos, Contributing Writer
April 26, 2022
5 min read
Article
Ukraine Invasion Driving DDoS Attacks to All-Time Highs
Unprecedented numbers of DDoS attacks since February are the result of hacktivists' cyberwar against Russian state interests, researchers say.
April 25, 2022
Unprecedented numbers of DDoS attacks since February are the result of hacktivists' cyberwar against Russian state interests, researchers say.
by Dark Reading Staff, Dark Reading
April 25, 2022
2 min read
Article
Sophos Buys Alert-Monitoring Automation Vendor
Acquisition of cloud-based alert security company will help Sophos automate tasks bogging down security teams, the company says.
April 22, 2022
Acquisition of cloud-based alert security company will help Sophos automate tasks bogging down security teams, the company says.
by Dark Reading Staff, Dark Reading
April 22, 2022
1 min read
Article
Devo Acquires Threat Hunting Company Kognos
Acquisition will blend autonomous threat hunting with cloud-native security analytics for automating security tasks.
April 21, 2022
Acquisition will blend autonomous threat hunting with cloud-native security analytics for automating security tasks.
by Dark Reading Staff, Dark Reading
April 21, 2022
1 min read
Article
Okta Wraps Up Lapsus$ Investigation, Pledges More Third-Party Controls
Companies must enforce more security on their own third-party providers and retain the ability to conduct independent investigations, experts say.
April 20, 2022
Companies must enforce more security on their own third-party providers and retain the ability to conduct independent investigations, experts say.
by Robert Lemos, Contributing Writer
April 20, 2022
5 min read
Article
Security-as-Code Gains More Support, but Still Nascent
Google and other firms are adding security configuration to software so cloud applications and services have well-defined security settings — a key component of DevSecOps.
April 18, 2022
Google and other firms are adding security configuration to software so cloud applications and services have well-defined security settings — a key component of DevSecOps.
by Robert Lemos, Contributing Writer
April 18, 2022
5 min read
Article
Name That Toon: Helping Hands
Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card.
April 18, 2022
Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card.
by John Klossner, Cartoonist
April 18, 2022
1 min read
Article
CISA Alert on ICS, SCADA Devices Highlights Growing Enterprise IoT Security Risks
Omdia Senior Analyst Hollie Hennessy says the new threat to multiple ICS and SCADA devices underscores the importance of a rapid response to IoT and OT security risks.
April 15, 2022
Omdia Senior Analyst Hollie Hennessy says the new threat to multiple ICS and SCADA devices underscores the importance of a rapid response to IoT and OT security risks.
by Hollie Hennessy, Senior Analyst, IoT Cybersecurity, Omdia
April 15, 2022
3 min read
Article
Data Scientists, Watch Out: Attackers Have Your Number
Researchers should take extra care in deploying data-science applications to the cloud, as cybercriminals are already targeting popular data-science tools such as Jupyter Notebook.
April 14, 2022
Researchers should take extra care in deploying data-science applications to the cloud, as cybercriminals are already targeting popular data-science tools such as Jupyter Notebook.
by Robert Lemos, Contributing Writer
April 14, 2022
4 min read
Article