Dark Reading

5 Things ML Teams Should Know About Privacy and the GDPR

11/17/2021
Machine learning delivers plenty of benefits. But as the emerging technology gets applied more broadly, be careful about how you handle all the data used in the process.

Is XDR Overhyped?

11/17/2021
Security experts weigh in on the value and pitfalls of extended detection and response (XDR), offering consideration and advice on this growing new category.

How to Navigate the Mitigation of Deepfakes

11/17/2021
Deepfakes are already several steps ahead of the technology that can detect and warn us about them.

Belarus Linked to Big European Disinformation Campaign

11/17/2021
EU officials and others previously had blamed Russia's intelligence operations for the so-called Ghostwriter campaign.

Team Cymru Acquires Amplicy

11/16/2021
The combination of Team Cymru's threat intelligence and threat hunting capabilities and Amplicy's Internet asset discovery and vulnerability management will give enterprise defenders a comprehensive view of their organization's cyber risk.

Suppliers, Cloud Providers Are Threats to Enterprise Data, Survey Says

11/16/2021
Other threats to enterprise data include cybercriminals, authorized users, foreign governments, and application vulnerabilities, according to Dark Reading's recent Strategic Security Report.

New Global Rackspace Technology Survey Underscores Rapid Pace of Cloud Adoption

11/16/2021
More than half of respondents have 100% of their infrastructure in the cloud; IT playing an increasingly critical role in driving corporate strategy.

Emotet Makes a Comeback

11/16/2021
The popular Trojan has re-emerged on the scene several months after the botnet infrastructure behind it was disrupted by law enforcement.

Cybercriminals Increasingly Employ Crypto-Mixers to Launder Stolen Profits

11/16/2021
Crypto-mixer services are set to grow as ransomware and other cybercriminal enterprises increasingly lean into cryptocurrency, new research shows.

The Old Ways Aren’t Working: Let’s Rethink OT Security

11/16/2021
Ransomware attacks against critical infrastructure go beyond locking up data. They can entirely shut down production in a facility. Here's how AI can help you fight back.

4 Considerations for Improving Cloud Security Hygiene

11/16/2021
Mixing cloud security and maintenance practices with legacy enterprise approaches usually ends up shortchanging cloud hygiene. Here are some ways to remedy that.

Navigating the Complexity of Today's Digital Supply Chain

11/16/2021
An efficient way to monitor security is to model user behavior using time series data and watching for anomalies.

The Troubling Rise of Initial Access Brokers

11/15/2021
Criminal groups are ramping up use of IABs to get access to networks without having to deal with the initial reconnaissance and intrusion phases.

Immersive Labs Acquires Snap Labs to Power Cyber Simulations With New Depth and Realism

11/15/2021
Integrated offering to deliver hyper-realistic team exercises specific to customer environments for more relevant cyber knowledge, skills, and judgment.

6 Tips To Keep in Mind for Ransomware Defense

11/15/2021
Ransomware is everywhere, including the nightly news. Most people know what it is, but how do ransomware attackers get in, and how can we defend against them?

FBI Attributes Abuse of Its Email Account to Software 'Misconfiguration'

11/15/2021
A wave of phony emails from an FBI mail server originated from an issue with the agency's Law Enforcement Enterprise Portal.

Name That Toon: Cubicle for Four

11/15/2021
Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card.

How to Negotiate With Ransomware Attackers

11/15/2021
Security researchers investigate the ransom negotiation process to create strategies businesses can use if they face an attack.

JupiterOne and Cisco Announce Launch of Secure Cloud Insights

11/15/2021
The partnership is designed to provide businesses with a range of cybersecurity services.

How Visibility Became the Lifeblood of SecOps and Business Success

11/15/2021
The best way to succeed in long-term cybersecurity is to invest in visibility because you can't protect or defend against what you can't see.