The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches
Cloud
IoT
Physical Security
Perimeter
Analytics
Security Monitoring
Security Monitoring
App Sec
Database Security
Database Security
Risk
Compliance
Compliance
Threat Intelligence
Endpoint
Authentication
Mobile Security
Privacy
Authentication
Mobile Security
Privacy
Vulnerabilities / Threats
Advanced Threats
Insider Threats
Vulnerability Management
Advanced Threats
Insider Threats
Vulnerability Management
Operations
Identity & Access Management
Careers & People
Identity & Access Management
Careers & People
Remote Workforce
Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
Dark Reading Virtual Event - June 23 - Learn More
Black Hat USA - August 6-11 - Learn More
Webinars
The Value Drivers of Attack Surface Management, Revealed
May 26, 2022
Implementing and Using XDR to Improve Enterprise Cybersecurity
May 25, 2022
Resources
Close
Back
Resources
Reports >
Slideshows >
Tech Library >
Webinars >
White Papers >
Subscribe
Login
/
Register
The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches
Cloud
IoT
Physical Security
Perimeter
Analytics
Security Monitoring
Security Monitoring
App Sec
Database Security
Database Security
Risk
Compliance
Compliance
Threat Intelligence
Endpoint
Authentication
Mobile Security
Privacy
Authentication
Mobile Security
Privacy
Vulnerabilities / Threats
Advanced Threats
Insider Threats
Vulnerability Management
Advanced Threats
Insider Threats
Vulnerability Management
Operations
Identity & Access Management
Careers & People
Identity & Access Management
Careers & People
Remote Workforce
Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
Dark Reading Virtual Event - June 23 - Learn More
Black Hat USA - August 6-11 - Learn More
Webinars
The Value Drivers of Attack Surface Management, Revealed
May 26, 2022
Implementing and Using XDR to Improve Enterprise Cybersecurity
May 25, 2022
Resources
Close
Back
Resources
Reports >
Slideshows >
Tech Library >
Webinars >
White Papers >
The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches
Cloud
IoT
Physical Security
Perimeter
Analytics
Security Monitoring
Security Monitoring
App Sec
Database Security
Database Security
Risk
Compliance
Compliance
Threat Intelligence
Endpoint
Authentication
Mobile Security
Privacy
Authentication
Mobile Security
Privacy
Vulnerabilities / Threats
Advanced Threats
Insider Threats
Vulnerability Management
Advanced Threats
Insider Threats
Vulnerability Management
Operations
Identity & Access Management
Careers & People
Identity & Access Management
Careers & People
Remote Workforce
Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
Dark Reading Virtual Event - June 23 - Learn More
Black Hat USA - August 6-11 - Learn More
Webinars
The Value Drivers of Attack Surface Management, Revealed
May 26, 2022
Implementing and Using XDR to Improve Enterprise Cybersecurity
May 25, 2022
Resources
Close
Back
Resources
Reports >
Slideshows >
Tech Library >
Webinars >
White Papers >
Subscribe
Login
/
Register
SEARCH
A minimum of 3 characters are required to be typed in the search bar in order to perform a search.
Announcements
Event
Implementing and Using XDR to Improve Enterprise Cybersecurity | May 25 Webinar | <REGISTER NOW>
Event
Building and Maintaining an Effective IoT Cybersecurity Strategy | May 17 Webinar | <REGISTER NOW>
Event
HOW DATA BREACHES HAPPEN & WHAT TO DO WHEN THEY HAPPEN TO YOU | June 23 Virtual Event | <Get Your Pass>
Previous
Next
Remote Workforce
Breaking news, news analysis, and expert commentary on cybersecurity threats that target remote users and their devices and the tools & technologies to protect them.
A Third of Americans Use Easy-to-Guess Pet Passwords
Far too many turn to Jingles, Mittens, or Bella for password inspiration, given that these are some of the easiest passwords to crack.
May 05, 2022
Far too many turn to Jingles, Mittens, or Bella for password inspiration, given that these are some of the easiest passwords to crack.
by Dark Reading Staff, Dark Reading
May 05, 2022
1 min read
Article
FBI: Bank Losses From BEC Attacks Top $43B
Law enforcement attributes a recent 65% spike in BEC attack losses to COVID-19 restrictions and the ongoing reality of a remote workforce.
May 05, 2022
Law enforcement attributes a recent 65% spike in BEC attack losses to COVID-19 restrictions and the ongoing reality of a remote workforce.
by Dark Reading Staff, Dark Reading
May 05, 2022
1 min read
Article
Syxsense Launches Unified Endpoint Security and Management Platform
Syxsense Enterprise delivers real-time vulnerability monitoring and remediation for all endpoints across an organization’s entire network.
May 03, 2022
Syxsense Enterprise delivers real-time vulnerability monitoring and remediation for all endpoints across an organization’s entire network.
May 03, 2022
4 min read
Article
Teleport Raises $110 Million Series C at $1.1 Billion Valuation Led by Bessemer Venture Partners
Funding follows dramatic revenue growth as identity-based access requirements skyrocket.
May 03, 2022
Funding follows dramatic revenue growth as identity-based access requirements skyrocket.
May 03, 2022
5 min read
Article
LinkedIn Brand Now the Most Abused in Phishing Attempts
New research shows threat actors increasingly leveraging social networks for attacks, with LinkedIn being used in 52% of global phishing attacks.
April 20, 2022
New research shows threat actors increasingly leveraging social networks for attacks, with LinkedIn being used in 52% of global phishing attacks.
by Dark Reading Staff, Dark Reading
April 20, 2022
2 min read
Article
Microsoft Launches Purview Platform to Govern, Protect, and Manage Sensitive Data
The rebranded Microsoft Purview platform integrates Microsoft 365 Compliance and Azure Purview, and adds new capabilities and products to help manage data no matter where it resides.
April 19, 2022
The rebranded Microsoft Purview platform integrates Microsoft 365 Compliance and Azure Purview, and adds new capabilities and products to help manage data no matter where it resides.
by Fahmida Y. Rashid, Features Editor, Dark Reading
April 19, 2022
5 min read
Article
Why So Many Security Experts Are Concerned About Low-Code/No-Code Apps
IT departments must account for the business impact and security risks such applications introduce.
April 18, 2022
IT departments must account for the business impact and security risks such applications introduce.
by Michael Bargury, CTO & Co-Founder, Zenity
April 18, 2022
7 min read
Article
Name That Toon: Helping Hands
Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card.
April 18, 2022
Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card.
by John Klossner, Cartoonist
April 18, 2022
1 min read
Article
Cloud Cost, Reliability Raise IT Concerns
IT professionals worry most about cloud security, but other questions arise about training, functionality, and performance.
April 15, 2022
IT professionals worry most about cloud security, but other questions arise about training, functionality, and performance.
by Dark Reading Staff, Dark Reading
April 15, 2022
2 min read
Article
Palo Alto Networks Extends SASE to Protect Home Networks With Okyo Garde Enterprise Edition
Okyo Garde Enterprise Edition includes an option for at-home employees to create separate private and personal networks.
April 13, 2022
Okyo Garde Enterprise Edition includes an option for at-home employees to create separate private and personal networks.
April 13, 2022
4 min read
Article
Securing the Stopgap: Controlling Access to SaaS Applications
If enterprises continue to use emergency measures as long-term solutions, they must protect their IT estate.
April 13, 2022
If enterprises continue to use emergency measures as long-term solutions, they must protect their IT estate.
by Corey O'Connor, Director of Product Marketing, DoControl
April 13, 2022
5 min read
Article
Microsoft Patches Windows Flaw Under Attack and Reported by NSA
"Go patch your systems before" the exploit spreads more widely, ZDI warns.
April 12, 2022
"Go patch your systems before" the exploit spreads more widely, ZDI warns.
by Dark Reading Staff, Dark Reading
April 12, 2022
1 min read
Article
How Do I Conduct a Resilience Review?
As the first step, make sure that all business-critical data across your organization is protected.
April 12, 2022
As the first step, make sure that all business-critical data across your organization is protected.
by Yogesh Badwe, Chief Security Officer, Druva
April 12, 2022
3 min read
Article
Creating a Security Culture Where People Can Admit Mistakes
In cybersecurity, user error is the symptom, not the disease. A healthy culture acknowledges and addresses the underlying causes of lapses.
April 11, 2022
In cybersecurity, user error is the symptom, not the disease. A healthy culture acknowledges and addresses the underlying causes of lapses.
by Karen Spiegelman, Features Editor, Dark Reading
April 11, 2022
1 min read
Article
Software-as-a-Service Rules the Cloud
Half of the IT professionals surveyed who use cloud services also employ infrastructure-as-a-service and platform-as-a-service.
April 08, 2022
Half of the IT professionals surveyed who use cloud services also employ infrastructure-as-a-service and platform-as-a-service.
by Dark Reading Staff, Dark Reading
April 08, 2022
2 min read
Article