Dark Reading

7 Cross-Industry Technology Trends That Will Disrupt the World

Recent McKinsey analysis examines which technologies will have the most momentum in the next 10 years. These are the trends security teams need to know to protect their organizations effectively.

FIDO Alliance Research Tracks Passwordless Authentication as It Moves Mainstream

New Online Authentication Barometer from the FIDO Alliance reveals consumer habits, trends and adoption of authentication technologies.

Group With Potential Links to Iranian Threat Actor Resurfaces

The Lyceum group has previously been linked to attacks on targets in the Middle East.

Loss Prevention Teams Up With Cybersecurity to Address Retail Fraud

As retailers roll out more fulfillment options, loss prevention professionals are increasingly shifting their attention from in-store theft to e-commerce fraud.

NSA, FBI, CISA Issue Advisory on 'BlackMatter' Ransomware

Ransomware has become a "national security issue," NSA director said.

(ISC)² Plans Entry-Level Certification for Aspiring Security Pros

The certification aims to help new entrants to the security field with professional development and career paths early on.

Sinclair Broadcast Group Confirms Ransomware Attack

The US television station operator has revealed certain servers and workstations, as well as office and operational networks, were disrupted in the attack.

In Cyberwar, Attribution Can Be Impossible — and That's OK

Instead of using a substantial proportion of resources to determine attribution, organizations should focus on defenses that will help them remediate an attack.

10 Hot Red Team Tools Set to Hit Black Hat Europe

The slate of Arsenal presentations at Black Hat Europe is set to feature lots of low-cost and free goodies for offensive security pros.

China's Hackers Crack Devices at Tianfu Cup for $1.5M in Prizes

China's premier hackers will target web browsers, operating systems, mobile devices, and even a car at Tianfu Cup.

Cisco Duo Trusted Access Report: More Than 50% of Companies Plan Passwordless Move

Multifactor authentications soar as enterprises move away from passwords to secure hybrid workers.

How Attackers Hack Humans

Inside their motivations, how they go about it -- and what businesses can do about it, according to Counterintelligence Institute founder Peter Warmka.

'Clumsy' BlackByte Malware Reuses Crypto Keys, Worms Into Networks

Discovered during a recent incident response engagement, the malware avoids Russian computers and uses a single symmetric key for encrypting every compromised system.

Evolution Equity Partners Close $400M for Cybersecurity Investments

The firm expands capital base, team, and platform addressing a rapidly growing cybersecurity investment opportunity.

6 Lessons From the Expiration of the Let's Encrypt Root Certificate

Fallout from the transition highlights the need for organizations to monitor and have processes for updating CA roots, experts say.

Fugue Adds Kubernetes Security Checks to Secure Infrastructure-as-Code

Developers can apply proper security controls as they programmatically deploy Kubernetes clusters.

SonicWall Secures Mix of Cloud, Hybrid and Traditional Networks

Company’s virtual offerings, cloud services match with on-premises deployments to solve real-world security challenges for SMBs, enterprises, governments, and MSSPs.

What Does a Chief Product Security Officer Do?

A CPSO bridges the gap between developers and security to ensure products are built securely and safely.

VirusTotal Shares Data on Ransomware Activity

Google's online malware scanning service analyzed 80 million ransomware samples that were uploaded in the past year-and-a-half.

Are You Ready for the Privacy Laws Tsunami?

Think PCI, HIPAA, and GDPR compliance is tough? There's a tsunami of similar laws on the way. Prepare your business for success with privacy by design.