Dark Reading

In the Fight Against Cybercrime, Takedowns Are Only Temporary

12/30/2021
Disrupting access to servers and infrastructure continues to interfere with cybercrime activity, but it's far from a perfect strategy.

Why Cyber Due Diligence Is Essential to the M&A Process

12/29/2021
That announcement may feel good, but if your prospective acquisition's cybersecurity levels are substandard, it might be best to hold off.

7 Steps for Navigating a Zero-Trust Journey

12/29/2021
Don't think of zero trust as a product. Think of it as "how you actually practice security."

How Do I Reduce the Risk of An Insider Threat?

12/27/2021
The principle of least level of access gives employees just the privileges they need to do their jobs. Limiting what an employee can do is a core tenet of Zero Trust.

The CISO as Sustaining Force: Helping Infosec Staff Beat Burnout

12/27/2021
To protect their staffers, leaders should focus on identifying and alleviating root causes of burnout.

6 Security-Tech Innovations We're Excited to See in 2022

12/27/2021
The details on cybersecurity technologies that we expect to advance rapidly in the coming year.

Log4j: A CISO's Practical Advice

12/24/2021
Working together is going to make getting through this problem a lot easier.

The Future of Work Has Changed, and Your Security Mindset Needs to Follow

12/23/2021
VPNs have become a vulnerability that puts organizations at risk of cyberattacks.

7 of the Most Impactful Cybersecurity Incidents of 2021

12/23/2021
There was a lot to learn from breaches, vulnerabilities, and attacks this year.

Microsoft Customer Source Code Exposed via Azure App Service Bug

12/22/2021
Researchers found an insecure default behavior in Azure App Service exposing source code of some customer applications deployed using "Local Git."

Nearly 50% of People Will Abandon Sites Prohibiting Password Reuse

12/22/2021
A new study investigating consumer password use found 25% of online shoppers would abandon their carts of $100 if prompted to reset a password at checkout.

CISA's New Log4j Scanner Aims to Find Vulnerable Apps

12/22/2021
The open-sourced scanner was derived from scanners built by members across the open source community, CISA reports.

Log4j Reveals Cybersecurity's Dirty Little Secret

12/22/2021
Once the dust settles on Log4j, many IT teams will brush aside the need for the fundamental, not-exciting need for better asset and application management.

Why We Need to Consolidate Digital Identity Management Before Zero Trust

12/22/2021
Zero trust may be one of the hottest trends in cybersecurity, but just eliminating trust from networks isn’t enough to prevent successful organizational data breaches, says Wes Wright, CTO of Imprivata.

Future of Identity-Based Security: All-in-One Platforms or Do-It-Yourself Solutions?

12/22/2021
The functionality of all-in-one platforms is being deconstructed into a smorgasbord of services that can be used to develop bespoke end-user security procedures for specific work groups, lines of businesses, or customer communities.

UK Security Agency Shares 225M Passwords With 'Have I Been Pwned'

12/21/2021
The UK's NCA and NCCU have shared 225 million stolen emails and passwords with HIBP, which tracks stolen credentials.

Meta Files Federal Lawsuit Against Phishing Operators

12/21/2021
The Facebook parent company seeks court's help in identifying the individuals behind some 39,000 websites impersonating its brands to collect login credentials.

93% of Tested Networks Vulnerable to Breach, Pen Testers Find

12/21/2021
Data from dozens of penetration tests and security assessments suggest nearly every organization can be infiltrated by cyberattackers.

How Modern Log Management Strengthens Enterprises’ Security Posture

12/21/2021
If security teams are not logging everything, they are increasing security risk and making it more difficult to investigate and recover from a data breach. Modern log management goes beyond just a SIEM.

Preemptive Strategies to Stop Log4j and Its Variants

12/21/2021
Zero trust is key to not falling victim to the next big vulnerability.