informa

DR Technology

50% of Orgs Rely on Email to Manage Security
Even with dedicated identity management tools at their disposal, many companies — smaller ones especially — are sticking with email and spreadsheets for handling permissions.
May 16, 2022
Even with dedicated identity management tools at their disposal, many companies — smaller ones especially — are sticking with email and spreadsheets for handling permissions.
by Dark Reading Staff, Dark Reading
May 16, 2022
2 min read
Article
How to Avoid Falling Victim to PayOrGrief's Next Rebrand
The group that shut down the second largest city in Greece was not new but a relaunch of DoppelPaymer.
May 13, 2022
The group that shut down the second largest city in Greece was not new but a relaunch of DoppelPaymer.
by Oakley Cox, Director of Analysis, Darktrace
May 13, 2022
5 min read
Article
How to Check If Your F5 BIG-IP Device Is Vulnerable
This Tech Tip walks network administrators through the steps to address the latest critical remote code execution vulnerability (CVE-2022-1388) in F5's BIG-IP management interface.
May 09, 2022
This Tech Tip walks network administrators through the steps to address the latest critical remote code execution vulnerability (CVE-2022-1388) in F5's BIG-IP management interface.
by Dark Reading Staff, Dark Reading
May 09, 2022
3 min read
Article
Post-Quantum Cryptography Set to Replace RSA, ECC
In the next 10 years, public-key encryption needs to be replaced by post-quantum techniques that can stand up to the new challenges.
May 06, 2022
In the next 10 years, public-key encryption needs to be replaced by post-quantum techniques that can stand up to the new challenges.
by Dark Reading Staff, Dark Reading
May 06, 2022
2 min read
Article
Microsoft, Apple, and Google Promise to Expand Passwordless Features
The passwordless future just became closer to reality, as Microsoft, Apple, and Google pledge to make the standard possible across operating systems and browsers.
May 05, 2022
The passwordless future just became closer to reality, as Microsoft, Apple, and Google pledge to make the standard possible across operating systems and browsers.
by Fahmida Y. Rashid, Managing Editor, Features, Dark Reading
May 05, 2022
5 min read
Article
GitHub to Developers: Turn on 2FA or Lose Access
All active GitHub users who contribute code will be required to enable at least one form of two-factor authentication by the end of 2023.
May 04, 2022
All active GitHub users who contribute code will be required to enable at least one form of two-factor authentication by the end of 2023.
by Fahmida Y. Rashid, Managing Editor, Features, Dark Reading
May 04, 2022
5 min read
Article
6 Best Practices to Ensure Kubernetes Security Meets Compliance Regulations
Security must be precise enough to meet compliance requirements without impeding DevOps and developer productivity. Here's how to strike that balance.
May 02, 2022
Security must be precise enough to meet compliance requirements without impeding DevOps and developer productivity. Here's how to strike that balance.
by Glen Kosaka, Head of Product Security, SUSE
May 02, 2022
5 min read
Article
Ambient.ai Expands Computer Vision Capabilities for Better Building Security
The AI startup releases new threat signatures to expand the computer vision platform’s ability to identify potential physical security incidents from camera feeds.
April 29, 2022
The AI startup releases new threat signatures to expand the computer vision platform’s ability to identify potential physical security incidents from camera feeds.
by Fahmida Y. Rashid, Managing Editor, Features, Dark Reading
April 29, 2022
6 min read
Article
Doppler Takes on Secrets Management
The startup is the latest company to try to solve the problem of organizing and sharing secrets.
April 27, 2022
The startup is the latest company to try to solve the problem of organizing and sharing secrets.
by Fahmida Y. Rashid, Managing Editor, Features, Dark Reading
April 27, 2022
3 min read
Article
The Ins and Outs of Secure Infrastructure as Code
The move to IaC has its challenges but done right can fundamentally improve an organization's overall security posture.
April 26, 2022
The move to IaC has its challenges but done right can fundamentally improve an organization's overall security posture.
by Rory McCune, Cloud Native Security Advocate, Aqua Security
April 26, 2022
5 min read
Article
What the ECDSA Flaw in Java Means for Enterprises
This Tech Tip reminds developers and security teams to check what version of Java they are running. Whether they are vulnerable to the ECDSA flaw boils down to the version number.
April 25, 2022
This Tech Tip reminds developers and security teams to check what version of Java they are running. Whether they are vulnerable to the ECDSA flaw boils down to the version number.
by Dark Reading Staff, Dark Reading
April 25, 2022
4 min read
Article
Many Medical Device Makers Skimp on Security Practices
Barely over a quarter of medical device companies surveyed maintain a software bill-of-materials, and less than half set security requirements at the design stage.
April 22, 2022
Barely over a quarter of medical device companies surveyed maintain a software bill-of-materials, and less than half set security requirements at the design stage.
by Dark Reading Staff, Dark Reading
April 22, 2022
3 min read
Article
Exploring Biometrics and Trust at the Corporate Level
Biometric measurements should be part of any multifactor authentication (MFA) strategy, but choose your methods carefully: Some only establish trust at the device level.
April 21, 2022
Biometric measurements should be part of any multifactor authentication (MFA) strategy, but choose your methods carefully: Some only establish trust at the device level.
by Kimberly Biddings, VP of Product, BIO-key International, Inc.
April 21, 2022
6 min read
Article
Fortress Tackles Supply Chain Security, One Asset at a Time
Fortress Information Security will expand its Asset to Vendor Library to include hardware bill of materials and software bill of materials information.
April 20, 2022
Fortress Information Security will expand its Asset to Vendor Library to include hardware bill of materials and software bill of materials information.
by Fahmida Y. Rashid, Managing Editor, Features, Dark Reading
April 20, 2022
6 min read
Article
Microsoft Launches Purview Platform to Govern, Protect, and Manage Sensitive Data
The rebranded Microsoft Purview platform integrates Microsoft 365 Compliance and Azure Purview, and adds new capabilities and products to help manage data no matter where it resides.
April 19, 2022
The rebranded Microsoft Purview platform integrates Microsoft 365 Compliance and Azure Purview, and adds new capabilities and products to help manage data no matter where it resides.
by Fahmida Y. Rashid, Managing Editor, Features, Dark Reading
April 19, 2022
5 min read
Article