The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches
Cloud
IoT
Physical Security
Perimeter
Analytics
Security Monitoring
Security Monitoring
App Sec
Database Security
Database Security
Risk
Compliance
Compliance
Threat Intelligence
Endpoint
Authentication
Mobile Security
Privacy
Authentication
Mobile Security
Privacy
Vulnerabilities / Threats
Advanced Threats
Insider Threats
Vulnerability Management
Advanced Threats
Insider Threats
Vulnerability Management
Operations
Identity & Access Management
Careers & People
Identity & Access Management
Careers & People
Remote Workforce
Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
Dark Reading Virtual Event - June 23 - Learn More
Black Hat USA - August 6-11 - Learn More
Webinars
Outsourcing Cybersecurity: A Decision Maker's Guide
Jun 29, 2022
Using Threat Modeling to Improve Enterprise Cyber Defenses
Jun 28, 2022
Resources
Close
Back
Resources
Reports >
Slideshows >
Tech Library >
Webinars >
White Papers >
Subscribe
Login
/
Register
The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches
Cloud
IoT
Physical Security
Perimeter
Analytics
Security Monitoring
Security Monitoring
App Sec
Database Security
Database Security
Risk
Compliance
Compliance
Threat Intelligence
Endpoint
Authentication
Mobile Security
Privacy
Authentication
Mobile Security
Privacy
Vulnerabilities / Threats
Advanced Threats
Insider Threats
Vulnerability Management
Advanced Threats
Insider Threats
Vulnerability Management
Operations
Identity & Access Management
Careers & People
Identity & Access Management
Careers & People
Remote Workforce
Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
Dark Reading Virtual Event - June 23 - Learn More
Black Hat USA - August 6-11 - Learn More
Webinars
Outsourcing Cybersecurity: A Decision Maker's Guide
Jun 29, 2022
Using Threat Modeling to Improve Enterprise Cyber Defenses
Jun 28, 2022
Resources
Close
Back
Resources
Reports >
Slideshows >
Tech Library >
Webinars >
White Papers >
The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches
Cloud
IoT
Physical Security
Perimeter
Analytics
Security Monitoring
Security Monitoring
App Sec
Database Security
Database Security
Risk
Compliance
Compliance
Threat Intelligence
Endpoint
Authentication
Mobile Security
Privacy
Authentication
Mobile Security
Privacy
Vulnerabilities / Threats
Advanced Threats
Insider Threats
Vulnerability Management
Advanced Threats
Insider Threats
Vulnerability Management
Operations
Identity & Access Management
Careers & People
Identity & Access Management
Careers & People
Remote Workforce
Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
Dark Reading Virtual Event - June 23 - Learn More
Black Hat USA - August 6-11 - Learn More
Webinars
Outsourcing Cybersecurity: A Decision Maker's Guide
Jun 29, 2022
Using Threat Modeling to Improve Enterprise Cyber Defenses
Jun 28, 2022
Resources
Close
Back
Resources
Reports >
Slideshows >
Tech Library >
Webinars >
White Papers >
Subscribe
Login
/
Register
SEARCH
A minimum of 3 characters are required to be typed in the search bar in order to perform a search.
Announcements
Event
HOW DATA BREACHES HAPPEN & WHAT TO DO WHEN THEY HAPPEN TO YOU | June 23 Virtual Event | <Get Your Pass>
Previous
Next
Operations
Breaking news, news analysis, and expert commentary on cybersecurity operations, and the tools & technologies for security teams.
An Emerging Threat: Attacking 5G Via Network Slices
A successful attack against 5G networks could disrupt critical infrastructure, manipulate sensor data, or even cause physical harm to humans.
June 07, 2022
A successful attack against 5G networks could disrupt critical infrastructure, manipulate sensor data, or even cause physical harm to humans.
by Tara Seals, Managing Editor, News, Dark Reading
June 07, 2022
8 min read
Article
Mandia: Keep 'Shields Up' to Survive the Current Escalation of Cyberattacks
As Mandiant CEO Kevin Mandia's company prepares to become part of Google, the incident response company continues to investigate many of the most critical cyber incidents.
June 07, 2022
As Mandiant CEO Kevin Mandia's company prepares to become part of Google, the incident response company continues to investigate many of the most critical cyber incidents.
by Kelly Jackson Higgins, Editor-in-Chief, Dark Reading
June 07, 2022
5 min read
Article
How the C-Suite Puts Shoulders Into Zero Trust in 2022
A full 77% of tech executives say they'll increase spending in zero-trust architecture in the coming year.
June 07, 2022
A full 77% of tech executives say they'll increase spending in zero-trust architecture in the coming year.
by Ericka Chickowski, Contributing Writer, Dark Reading
June 07, 2022
4 min read
Article
RSAC Opens With Message of Transformation
Cybersecurity needs to shift its thinking ahead of the next disruption, RSA's CEO said during the opening 2022 conference keynote.
June 07, 2022
Cybersecurity needs to shift its thinking ahead of the next disruption, RSA's CEO said during the opening 2022 conference keynote.
by Becky Bracken, Editor, Dark Reading
June 07, 2022
2 min read
Article
Gathering Momentum: 3 Steps Forward to Expand SBoM Use
New studies show less than a third of organizations use software bills of materials (SBoMs), but momentum is building to boost that number.
June 06, 2022
New studies show less than a third of organizations use software bills of materials (SBoMs), but momentum is building to boost that number.
by Ericka Chickowski, Contributing Writer, Dark Reading
June 06, 2022
4 min read
Article
Netenrich Debuts Resolution Intelligence Secure Digital Operations Platform at RSA 2022
New operational analytics and AI/ML platform drives contextual intelligence and prioritized actions to anticipate risky behaviors, disrupt threats and insure business resilience.
June 01, 2022
New operational analytics and AI/ML platform drives contextual intelligence and prioritized actions to anticipate risky behaviors, disrupt threats and insure business resilience.
June 01, 2022
2 min read
Article
12K Misconfigured Elasticsearch Buckets Ravaged by Extortionists
The cloud instances were left open to the public Internet with no authentication, allowing attackers to wipe the data.
June 01, 2022
The cloud instances were left open to the public Internet with no authentication, allowing attackers to wipe the data.
by Tara Seals, Managing Editor, News, Dark Reading
June 01, 2022
2 min read
Article
StorCentric Launches Nexsan EZ-NAS -Network-Attached Storage for SMBs and Enterprise Edge Deployments
EZ-NAS also provides add-on data backup, cloud connector and ransomware anomaly detection.
June 01, 2022
EZ-NAS also provides add-on data backup, cloud connector and ransomware anomaly detection.
June 01, 2022
3 min read
Article
Distinguishing AI Hype From Reality in SecOps
AI and ML are important SecOps tools, but human involvement is still required.
June 01, 2022
AI and ML are important SecOps tools, but human involvement is still required.
by Nash Borges, VP of Engineering and Data Science, Secureworks
June 01, 2022
5 min read
Article
Scammer Behind $568M International Cybercrime Syndicate Gets 4 Years
The 14th defendant behind The Infraud Organization contraband marketplace has been sentenced, this time for one count of racketeering.
May 27, 2022
The 14th defendant behind The Infraud Organization contraband marketplace has been sentenced, this time for one count of racketeering.
by Dark Reading Staff, Dark Reading
May 27, 2022
1 min read
Article
Lacework Announces Layoffs, Restructuring
The cloud-security company blames "seismic" market shifts for shakeup.
May 26, 2022
The cloud-security company blames "seismic" market shifts for shakeup.
by Dark Reading Staff, Dark Reading
May 26, 2022
1 min read
Article
Twitter Fined $150M for Security Data Misuse
Twitter is charged with using emails and phone numbers ostensibly collected for account security to sell targeted ads.
May 26, 2022
Twitter is charged with using emails and phone numbers ostensibly collected for account security to sell targeted ads.
by Dark Reading Staff, Dark Reading
May 26, 2022
2 min read
Article
VMware, Airline Targeted as Ransomware Chaos Reigns
Global ransomware incidents target everything from enterprise servers to grounding an airline, with one India-based group even taking a Robin Hood approach to extortion with the "GoodWill" strain.
May 26, 2022
Global ransomware incidents target everything from enterprise servers to grounding an airline, with one India-based group even taking a Robin Hood approach to extortion with the "GoodWill" strain.
by Nathan Eddy, Contributing Writer, Dark Reading
May 26, 2022
5 min read
Article
Cybersecurity-Focused SYN Ventures Closes $300 Million Fund II
Cylance co-founder Ryan Permeh has joined full time as an operating partner.
May 25, 2022
Cylance co-founder Ryan Permeh has joined full time as an operating partner.
May 25, 2022
3 min read
Article
Strong Password Policy Isn't Enough, Study Shows
New analysis reveals basic regulatory password requirements fall far short of providing protection from compromise.
May 24, 2022
New analysis reveals basic regulatory password requirements fall far short of providing protection from compromise.
by Dark Reading Staff, Dark Reading
May 24, 2022
1 min read
Article