Dark Reading

Forcepoint to Acquire Bitglass

10/11/2021
Deal will merge Bitglass's security service edge technology with Forcepoint’s SASE architecture.

IDrive Remote Desktop Offers Protection from RDP Cyberattacks and Vulnerabilities

10/11/2021
Remote Desktop aims to solve vulnerability issues with RDP by implementing robust access and security controls.

The 5 Phases of Zero-Trust Adoption

10/11/2021
Zero trust aims to replace implicit trust with explicit, continuously adaptive trust across users, devices, networks, applications, and data.

Applying Behavioral Psychology to Strengthen Your Incident Response Team

10/11/2021
A deep-dive study on the inner workings of incident response teams leads to a framework to apply behavioral psychology principles to CSIRTs.

Continuous Authentication Tech Looms Large in Deployment Plans

10/08/2021
Security leaders are interested in continuous authentication technologies, especially behavioral-based capabilities.

North American Orgs Hit With an Average of 497 Cyberattacks per Week

10/08/2021
A new analysis confirms a surge in global cyberattacks since the COVID-19 pandemic began.

'FontOnLake' Malware Family Targets Linux Systems

10/08/2021
Researchers report that the location of its C2 server and the countries where samples were uploaded may indicate targets include Southeast Asia.

71% of Security Pros Find Patching to be Complex and Time Consuming, Ivanti Study Confirms

10/08/2021
Challenges with lack of time and vulnerability and patching prioritization are putting organizations at increased risk of cyberattacks.

Patch 'Immediately': Apache Issues Software Fix Amid Zero-Day Attacks

10/08/2021
CISA reports it's seeing ongoing scanning for the flaws and expects the activity to accelerate.

Hardware Bolsters Medical Device Security

10/08/2021
New microprocessor technologies like secure enclaves and cryptography acceleration enable hardware to better safeguard medical devices.

Microsec.ai Launches Solution to Deliver Agentless Runtime Protection for Multi-cloud Infrastructure as a Service

10/07/2021
Continuous monitoring of network traffic, data loss prevention, and responsive self-healing protection from threats to cloud-native applications.

HP Extends Security Features to Work-from-Home Devices

10/07/2021
HP aims to let admins secure work-from-home endpoints by extending cloud security management that can remotely track, detect and self-heal remote company devices -- including printers.

Microsoft: 58% of Nation-State Cyberattacks Come From Russia

10/07/2021
A wealth of Microsoft data highlights trends in nation-state activity, hybrid workforce security, disinformation, and supply chain, IoT, and OT security.

What Are Some Red Flags in a Vendor Security Assessment?

10/07/2021
The last thing you want is a vendor that lies to you about its security practices.

CyberArk Leads the PAM Omdia Universe

10/07/2021
With more staff working remotely, privileged access management (or PAM) has never been more important. Market forecasts, drivers, and trends are explored.

Rapid RYUK Ransomware Attack Group Christened as FIN12

10/07/2021
Prolific ransomware cybercrime group's approach underscores a complicated, layered model of cybercrime.

Former Google Employees Launch Supply Chain Security Startup

10/07/2021
Chainguard aims to make the software supply chain secure by default as supply chain-focused attacks continue to rise.

New Kaspersky Service Delivers Cyberthreat Insights on Request

10/07/2021
Kaspersky's new Ask the Analyst service will allow businesses to reach out to the company's researchers for their opinions and guidance on cyberthreats and security issues.

New Regulations Are Coming — Get a Handle on Your App Portfolio

10/07/2021
With the realization that any app could be a gateway for a larger attack, there will be more pressure than ever on companies to fully protect their entire application landscape.

What the CEO Saw: Colonial Pipeline, Accellion Execs Share Cyberattack War Stories

10/06/2021
CEOs of the two breached companies said their priorities instantly shifted to joining the response efforts when they first learned of attacks on their systems.