The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches
Cloud
IoT
Physical Security
Perimeter
Analytics
Security Monitoring
Security Monitoring
App Sec
Database Security
Database Security
Risk
Compliance
Compliance
Threat Intelligence
Endpoint
Authentication
Mobile Security
Privacy
Authentication
Mobile Security
Privacy
Vulnerabilities / Threats
Advanced Threats
Insider Threats
Vulnerability Management
Advanced Threats
Insider Threats
Vulnerability Management
Operations
Identity & Access Management
Careers & People
Identity & Access Management
Careers & People
Remote Workforce
Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
Dark Reading Virtual Event - June 23 - Learn More
Black Hat USA - August 6-11 - Learn More
Webinars
Outsourcing Cybersecurity: A Decision Maker's Guide
Jun 29, 2022
Using Threat Modeling to Improve Enterprise Cyber Defenses
Jun 28, 2022
Resources
Close
Back
Resources
Reports >
Slideshows >
Tech Library >
Webinars >
White Papers >
Subscribe
Login
/
Register
The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches
Cloud
IoT
Physical Security
Perimeter
Analytics
Security Monitoring
Security Monitoring
App Sec
Database Security
Database Security
Risk
Compliance
Compliance
Threat Intelligence
Endpoint
Authentication
Mobile Security
Privacy
Authentication
Mobile Security
Privacy
Vulnerabilities / Threats
Advanced Threats
Insider Threats
Vulnerability Management
Advanced Threats
Insider Threats
Vulnerability Management
Operations
Identity & Access Management
Careers & People
Identity & Access Management
Careers & People
Remote Workforce
Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
Dark Reading Virtual Event - June 23 - Learn More
Black Hat USA - August 6-11 - Learn More
Webinars
Outsourcing Cybersecurity: A Decision Maker's Guide
Jun 29, 2022
Using Threat Modeling to Improve Enterprise Cyber Defenses
Jun 28, 2022
Resources
Close
Back
Resources
Reports >
Slideshows >
Tech Library >
Webinars >
White Papers >
The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches
Cloud
IoT
Physical Security
Perimeter
Analytics
Security Monitoring
Security Monitoring
App Sec
Database Security
Database Security
Risk
Compliance
Compliance
Threat Intelligence
Endpoint
Authentication
Mobile Security
Privacy
Authentication
Mobile Security
Privacy
Vulnerabilities / Threats
Advanced Threats
Insider Threats
Vulnerability Management
Advanced Threats
Insider Threats
Vulnerability Management
Operations
Identity & Access Management
Careers & People
Identity & Access Management
Careers & People
Remote Workforce
Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
Dark Reading Virtual Event - June 23 - Learn More
Black Hat USA - August 6-11 - Learn More
Webinars
Outsourcing Cybersecurity: A Decision Maker's Guide
Jun 29, 2022
Using Threat Modeling to Improve Enterprise Cyber Defenses
Jun 28, 2022
Resources
Close
Back
Resources
Reports >
Slideshows >
Tech Library >
Webinars >
White Papers >
Subscribe
Login
/
Register
SEARCH
A minimum of 3 characters are required to be typed in the search bar in order to perform a search.
Announcements
Event
HOW DATA BREACHES HAPPEN & WHAT TO DO WHEN THEY HAPPEN TO YOU | June 23 Virtual Event | <Get Your Pass>
Previous
Next
Analytics
Breaking news, news analysis, and expert commentary about cybersecurity data analytics, including tools & technologies.
Devo Acquires Threat Hunting Company Kognos
Acquisition will blend autonomous threat hunting with cloud-native security analytics for automating security tasks.
April 21, 2022
Acquisition will blend autonomous threat hunting with cloud-native security analytics for automating security tasks.
by Dark Reading Staff, Dark Reading
April 21, 2022
1 min read
Article
Okta Wraps Up Lapsus$ Investigation, Pledges More Third-Party Controls
Companies must enforce more security on their own third-party providers and retain the ability to conduct independent investigations, experts say.
April 20, 2022
Companies must enforce more security on their own third-party providers and retain the ability to conduct independent investigations, experts say.
by Robert Lemos, Contributing Writer
April 20, 2022
5 min read
Article
Security-as-Code Gains More Support, but Still Nascent
Google and other firms are adding security configuration to software so cloud applications and services have well-defined security settings — a key component of DevSecOps.
April 18, 2022
Google and other firms are adding security configuration to software so cloud applications and services have well-defined security settings — a key component of DevSecOps.
by Robert Lemos, Contributing Writer
April 18, 2022
5 min read
Article
Name That Toon: Helping Hands
Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card.
April 18, 2022
Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card.
by John Klossner, Cartoonist
April 18, 2022
1 min read
Article
CISA Alert on ICS, SCADA Devices Highlights Growing Enterprise IoT Security Risks
Omdia Senior Analyst Hollie Hennessy says the new threat to multiple ICS and SCADA devices underscores the importance of a rapid response to IoT and OT security risks.
April 15, 2022
Omdia Senior Analyst Hollie Hennessy says the new threat to multiple ICS and SCADA devices underscores the importance of a rapid response to IoT and OT security risks.
by Hollie Hennessy, Senior Analyst, IoT Cybersecurity, Omdia
April 15, 2022
3 min read
Article
Data Scientists, Watch Out: Attackers Have Your Number
Researchers should take extra care in deploying data-science applications to the cloud, as cybercriminals are already targeting popular data-science tools such as Jupyter Notebook.
April 14, 2022
Researchers should take extra care in deploying data-science applications to the cloud, as cybercriminals are already targeting popular data-science tools such as Jupyter Notebook.
by Robert Lemos, Contributing Writer
April 14, 2022
4 min read
Article
More Than 60% of Organizations Suffered a Breach in the Past 12 Months
Firms focus too narrowly on external attackers when it's insiders, third parties, and stolen assets that cause many breaches, new study shows.
April 13, 2022
Firms focus too narrowly on external attackers when it's insiders, third parties, and stolen assets that cause many breaches, new study shows.
by Robert Lemos, Contributing Writer
April 13, 2022
4 min read
Article
SeeMetrics to Help CISOs Measure Security Success
The company makes cybersecurity performance management software to quantify how well cyber-risk solutions are actually working.
April 07, 2022
The company makes cybersecurity performance management software to quantify how well cyber-risk solutions are actually working.
by Dark Reading Staff, Dark Reading
April 07, 2022
2 min read
Article
How IP Data Can Help Security Professionals Protect Their Networks
Beefing up security requires a combination of forensic efforts and proactive mitigation. IP context aids both.
April 05, 2022
Beefing up security requires a combination of forensic efforts and proactive mitigation. IP context aids both.
by Jonathan Tomek, VP of Research and Development, Digital Envoy
April 05, 2022
5 min read
Article
Ransomware Payments, Demands Rose Dramatically in 2021
New data pulled from incident response cases by Unit 42 shows cyber-extortion attacks jumped by 85%.
March 24, 2022
New data pulled from incident response cases by Unit 42 shows cyber-extortion attacks jumped by 85%.
by Dark Reading Staff, Dark Reading
March 24, 2022
1 min read
Article
Name That Toon: Sleep Like a Baby
Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card.
March 21, 2022
Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card.
by John Klossner, Cartoonist
March 21, 2022
1 min read
Article
Will the Biggest Clouds Win? Lessons From Google's Mandiant Buy
Google eventually won out in the competition for Mandiant, but Microsoft's interest underscores the trend in consolidation of security services into large cloud providers, experts say.
March 21, 2022
Google eventually won out in the competition for Mandiant, but Microsoft's interest underscores the trend in consolidation of security services into large cloud providers, experts say.
by Robert Lemos, Contributing Writer
March 21, 2022
5 min read
Article
Cut Down on Alert Overload and Leverage Layered Security Measures
Feeling overwhelmed by the number of alerts? It doesn't have to be that way.
March 17, 2022
Feeling overwhelmed by the number of alerts? It doesn't have to be that way.
by Jason Manar, Chief Information Security Officer, Kaseya
March 17, 2022
4 min read
Article
VPNs Give Russians an End Run Around Censorship
As the invasion of Ukraine continues, Russian citizens have turned to virtual private networks — boosting demand for the software by 27x — to circumvent the government's blocks on social media and news sites critical of the war.
March 16, 2022
As the invasion of Ukraine continues, Russian citizens have turned to virtual private networks — boosting demand for the software by 27x — to circumvent the government's blocks on social media and news sites critical of the war.
by Robert Lemos, Contributing Writer
March 16, 2022
4 min read
Article
How Enterprises Can Get Used to Deploying AI for Security
It's important to take a "trust journey" to see how AI technology can benefit an organization's cybersecurity.
March 11, 2022
It's important to take a "trust journey" to see how AI technology can benefit an organization's cybersecurity.
by Fahmida Y. Rashid, Features Editor, Dark Reading
March 11, 2022
4 min read
Article