The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches
Cloud
IoT
Physical Security
Perimeter
Analytics
Security Monitoring
Security Monitoring
App Sec
Database Security
Database Security
Risk
Compliance
Compliance
Threat Intelligence
Endpoint
Authentication
Mobile Security
Privacy
Authentication
Mobile Security
Privacy
Vulnerabilities / Threats
Advanced Threats
Insider Threats
Vulnerability Management
Advanced Threats
Insider Threats
Vulnerability Management
Operations
Identity & Access Management
Careers & People
Identity & Access Management
Careers & People
Remote Workforce
Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
Dark Reading Virtual Event - June 23 - Learn More
Black Hat USA - August 6-11 - Learn More
Webinars
Harnessing the Power of Security Automation
Jun 09, 2022
The Value Drivers of Attack Surface Management, Revealed
May 26, 2022
Resources
Close
Back
Resources
Reports >
Slideshows >
Tech Library >
Webinars >
White Papers >
Subscribe
Login
/
Register
The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches
Cloud
IoT
Physical Security
Perimeter
Analytics
Security Monitoring
Security Monitoring
App Sec
Database Security
Database Security
Risk
Compliance
Compliance
Threat Intelligence
Endpoint
Authentication
Mobile Security
Privacy
Authentication
Mobile Security
Privacy
Vulnerabilities / Threats
Advanced Threats
Insider Threats
Vulnerability Management
Advanced Threats
Insider Threats
Vulnerability Management
Operations
Identity & Access Management
Careers & People
Identity & Access Management
Careers & People
Remote Workforce
Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
Dark Reading Virtual Event - June 23 - Learn More
Black Hat USA - August 6-11 - Learn More
Webinars
Harnessing the Power of Security Automation
Jun 09, 2022
The Value Drivers of Attack Surface Management, Revealed
May 26, 2022
Resources
Close
Back
Resources
Reports >
Slideshows >
Tech Library >
Webinars >
White Papers >
The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches
Cloud
IoT
Physical Security
Perimeter
Analytics
Security Monitoring
Security Monitoring
App Sec
Database Security
Database Security
Risk
Compliance
Compliance
Threat Intelligence
Endpoint
Authentication
Mobile Security
Privacy
Authentication
Mobile Security
Privacy
Vulnerabilities / Threats
Advanced Threats
Insider Threats
Vulnerability Management
Advanced Threats
Insider Threats
Vulnerability Management
Operations
Identity & Access Management
Careers & People
Identity & Access Management
Careers & People
Remote Workforce
Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
Dark Reading Virtual Event - June 23 - Learn More
Black Hat USA - August 6-11 - Learn More
Webinars
Harnessing the Power of Security Automation
Jun 09, 2022
The Value Drivers of Attack Surface Management, Revealed
May 26, 2022
Resources
Close
Back
Resources
Reports >
Slideshows >
Tech Library >
Webinars >
White Papers >
Subscribe
Login
/
Register
SEARCH
A minimum of 3 characters are required to be typed in the search bar in order to perform a search.
Announcements
Event
The Value Drivers of Attack Surface Management, Revealed | May 26 Webinar | <REGISTER NOW>
Event
Implementing and Using XDR to Improve Enterprise Cybersecurity | May 25 Webinar | <REGISTER NOW>
Event
HOW DATA BREACHES HAPPEN & WHAT TO DO WHEN THEY HAPPEN TO YOU | June 23 Virtual Event | <Get Your Pass>
Previous
Next
Authentication
Breaking news, news analysis, and expert commentary on endpoint security, including tools & technologies.
Me, My Digital Self, and I: Why Identity Is the Foundation of a Decentralized Future
A decentralized future is a grand ideal, but secure management of private keys is the prerequisite to ensure the integrity of decentralized applications and services.
May 16, 2022
A decentralized future is a grand ideal, but secure management of private keys is the prerequisite to ensure the integrity of decentralized applications and services.
by Richard Searle, Vice President of Confidential Computing, Fortanix
May 16, 2022
5 min read
Article
Heroku: Cyberattacker Used Stolen OAuth Tokens to Steal Customer Account Credentials
The same attack that allowed a threat actor to steal data from private Heroku GitHub repositories also resulted in the compromise of customer credentials, the company now says.
May 05, 2022
The same attack that allowed a threat actor to steal data from private Heroku GitHub repositories also resulted in the compromise of customer credentials, the company now says.
by Jai Vijayan, Contributing Writer
May 05, 2022
4 min read
Article
DoD Scammed Out of $23M in Phishing Attack on Jet-Fuel Vendors
A California man faces prison time and steep fines stemming from cybertheft of US military funds intended to pay jet-fuel suppliers.
May 02, 2022
A California man faces prison time and steep fines stemming from cybertheft of US military funds intended to pay jet-fuel suppliers.
by Dark Reading Staff, Dark Reading
May 02, 2022
1 min read
Article
Going Passwordless? Here Are 6 Steps to Get Started
High costs and user reluctance have stood in the way of passwordless adoption, but conversion can be simplified if you take it in more gradual steps.
April 11, 2022
High costs and user reluctance have stood in the way of passwordless adoption, but conversion can be simplified if you take it in more gradual steps.
by Amit Bareket, CEO and Co-Founder, Perimeter 81
April 11, 2022
4 min read
Article
Smart Cities: Secure by Design? It Takes a Village
Smart-city security breaches have potentially very serious consequences — they can be economically devastating and even life-threatening, if handled wrong.
March 30, 2022
Smart-city security breaches have potentially very serious consequences — they can be economically devastating and even life-threatening, if handled wrong.
by Karen Worstell, Senior Cybersecurity Strategist, VMware
March 30, 2022
5 min read
Article
The Secret to Zero Trust You Need to Know
If every application, device, and bot need access and authentication at some point, the need for managing and controlling the confidential data that allows those functions gets staggeringly large.
March 22, 2022
If every application, device, and bot need access and authentication at some point, the need for managing and controlling the confidential data that allows those functions gets staggeringly large.
by Art Poghosyan, CEO, Britive
March 22, 2022
4 min read
Article
Russia State-Sponsored Hackers Used Misconfigured MFA to Breach NGO
FBI and CISA warn of attack on multifactor authentication account to exploit "PrintNightmare" exploit.
March 16, 2022
FBI and CISA warn of attack on multifactor authentication account to exploit "PrintNightmare" exploit.
by Dark Reading Staff, Dark Reading
March 16, 2022
2 min read
Article
NSA Issues Guidance for Selecting Strong Cisco Password Types
Poorly protected passwords in device configuration files present a risk of compromise, agency says.
February 17, 2022
Poorly protected passwords in device configuration files present a risk of compromise, agency says.
by Jai Vijayan, Contributing Writer
February 17, 2022
4 min read
Article
8 of the Biggest Cybersecurity M&As; & Investment Deals in 2021
There were more financial deals in cybersecurity last year than in any previous year.
February 14, 2022
There were more financial deals in cybersecurity last year than in any previous year.
by Jai Vijayan, Contributing Writer
February 14, 2022
1 min read
Article
The Zero-Trust Timer Is on for Federal Agencies — How Ready Are They?
A new study coincides with OMB’s finalization of its zero-trust strategy through 2024.
January 31, 2022
A new study coincides with OMB’s finalization of its zero-trust strategy through 2024.
by Ericka Chickowski, Contributing Writer
January 31, 2022
4 min read
Article
Biden Broadens NSA Oversight of National Security Systems
New Cybersecurity National Security Memorandum will let the spy agency "identify vulnerabilities, detect malicious threat activity and drive mitigations," agency cybersecurity director says.
January 20, 2022
New Cybersecurity National Security Memorandum will let the spy agency "identify vulnerabilities, detect malicious threat activity and drive mitigations," agency cybersecurity director says.
by Dark Reading Staff, Dark Reading
January 20, 2022
2 min read
Article
Nigerian Police Arrest 11 Individuals in BEC Crackdown
More than 50,000 targets around the world have been affected by the business email compromise scams, Interpol reports.
January 19, 2022
More than 50,000 targets around the world have been affected by the business email compromise scams, Interpol reports.
by Jai Vijayan, Contributing Writer
January 19, 2022
5 min read
Article
1Password Raises $620M Series C, Now Valued at $6.8B
The massive funding round comes as the rise of cloud and remote work led to new threats and growing security and privacy concerns.
January 19, 2022
The massive funding round comes as the rise of cloud and remote work led to new threats and growing security and privacy concerns.
by Dark Reading Staff, Dark Reading
January 19, 2022
2 min read
Article
Future of Identity-Based Security: All-in-One Platforms or Do-It-Yourself Solutions?
The functionality of all-in-one platforms is being deconstructed into a smorgasbord of services that can be used to develop bespoke end-user security procedures for specific work groups, lines of businesses, or customer communities.
December 22, 2021
The functionality of all-in-one platforms is being deconstructed into a smorgasbord of services that can be used to develop bespoke end-user security procedures for specific work groups, lines of businesses, or customer communities.
by Mark Settle, Seven-Time CIO
December 22, 2021
5 min read
Article
Identity Authentication Access Market Set to Hit $28.9B in 2021
With more staff working remotely, identity, authentication, and access (IAA) has never been more important. Market forecasts, drivers, and trends are explored.
December 10, 2021
With more staff working remotely, identity, authentication, and access (IAA) has never been more important. Market forecasts, drivers, and trends are explored.
by Don Tait, Senior Analyst, Omdia
December 10, 2021
3 min read
Article