Dark Reading

InQuest: Adding File Detection and Response to the Security Arsenal

08/22/2022
InQuest’s Pedram Amini takes a deep dive into file detection and response as a way to prevent file-borne attacks.

Secureworks: How To Distinguish Hype From Reality With AI in SecOps

08/22/2022
Secureworks’ Nash Borges describes how his team has applied AI and ML to threat detection.

New 'BianLian' Ransomware Variant on the Rise

08/22/2022
Novel ransomware was created with the Go open source programming language, demonstrating how malware authors increasingly are opting to employ the flexible coding language.

Tanium: Taking A Deeper Cut At Converged Endpoint Management

08/22/2022
Tanium’s Chris Hollenbeck explains how converged endpoint management helps overcome obstacles to endpoint visibility.

Pentera Helps Enterprises Reduce Their Security Exposure

08/22/2022
Pentera’s Omer Zucker outlines exposure management’s biggest challenges in closing security gaps.

Cisco: All Intelligence is Not Created Equal

08/22/2022
Threat intel has changed over the years and that’s changed how customers use it, says Matt Olney, director of Talos threat intelligence and interdiction at Cisco.

Identity Security Pain Points and What Can Be Done

08/22/2022
Replacing passwords is not as easy as people think, but there is hope.

How Qualys Reduces Risk and Enables Tool Consolidation

08/22/2022
Sumedh Thakar, CEO of Qualys, explains how moving to a cloud-based asset management platform can simplify their strategies and improve overall security.

Expiring Root Certificates Threaten IoT in the Enterprise

08/22/2022
What happens when businesses' smart devices break? CSOs have things to fix beyond security holes.

Mimecast: Mitigating Risk Across a Complex Threat Landscape

08/21/2022
Garret O’Hara of Mimecast discusses how companies can bolster security of their Microsoft 365 and Google Workspace environments, since cloud services often add complexity.

Banyan Recommends Phased Approach When Introducing Zero Trust

08/21/2022
Banyan Security’s Jayanth Gummaraju makes the case for why zero trust is superior to VPN technology.

DeepSurface Adds Risk-Based Approach to Vulnerability Management

08/20/2022
DeepSurface’s Tim Morgan explains how network complexity and cloud computing have contributed to the challenge, and how automation can help.

The HEAT Is On, Says Menlo Security

08/20/2022
Neko Papez, senior manager, cybersecurity strategy for Menlo Security, helps customers understand if they’re vulnerable to highly evasive adaptive threats (HEAT).

PIXM: Stopping Targeted Phishing Attacks With 'Computer Vision'

08/19/2022
Chris Cleveland, founder of PIXM, talks about phishers’ evasive maneuvers and how organizations can tap Computer Vision to keep email and its users safe.

Intel Adds New Circuit to Chips to Ward Off Motherboard Exploits

08/19/2022
The countermeasure, which compares the time and voltage at which circuits are activated, is being implemented in 12th Gen Intel Core processors.

NIST Weighs in on AI Risk

08/19/2022
NIST is developing the AI Risk Management Framework and a companion playbook to help organizations navigate algorithmic bias and risk.

Patch Now: 2 Apple Zero-Days Exploited in Wild

08/19/2022
The fact that the flaws enable remote code execution, exist across all major Apple OS technologies, and are being actively exploited heightens the need for a quick response.

Cybersecurity Solutions Must Evolve, Says Netography CEO

08/19/2022
Just as cyber criminals change tactics and strategy for more effectiveness, so must infosec pros and their organizations, according to Martin Roesch of Netography.

State-Sponsored APTs Dangle Job Opps to Lure In Spy Victims

08/19/2022
APTs continue to exploit the dynamic job market and the persistent phenomenon of remote working, as explored by PwC at Black Hat USA.

Cyber Resiliency Isn't Just About Technology, It's About People

08/19/2022
To lessen burnout and prioritize staff resiliency, put people in a position to succeed with staffwide cybersecurity training to help ease the burden on IT and security personnel.