Dark Reading
Zscaler and AWS Expand Relationship
06/22/2022
Zscaler also announced innovations built on Zscaler’s Zero Trust architecture and AWS.
Zscaler Launches Posture Control Solution
06/22/2022
Enables DevOps and security teams to prioritize and remediate risks in cloud-native applications earlier in the development life cycle.
Zscaler Adds New AI/ML Capabilities for the Zscaler Zero Trust Exchange
06/22/2022
Organizations can strengthen their network defense with a number of intelligent security innovations.
Evolving Beyond the Password: Vanquishing the Password
06/22/2022
Using WebAuthn, physical keys, and biometrics, organizations can adopt more advanced passwordless MFA and true passwordless systems. (Part 2 of 2)
The Risk of Multichannel Phishing Is on the Horizon
06/22/2022
The cybersecurity community is buzzing with concerns of multichannel phishing attacks, particularly on smishing and business text compromise, as hackers turn to mobile to launch attacks.
GitHub's MFA Plans Should Spur Rest of Industry to Raise the Bar
06/22/2022
We as industry leaders should be building on what individual platforms like GitHub are doing in two critical ways: demanding third parties improve security and creating more interoperable architectures.
80% of Firms Suffered Identity-Related Breaches in Last 12 Months
06/22/2022
With almost every business experiencing growth in human and machine identities, firms have made securing those identities a priority.
Risk Disconnect in the Cloud
06/22/2022
New Cloud Security Alliance (CSA) and Google Cloud study shows many enterprises struggle to measure and manage risk in their cloud workloads.
Linux Foundation Announces Open Programmable Infrastructure Project to Drive Open Standards for New Class of Cloud Nativ
06/21/2022
Data Processing and Infrastructure Processing Units – DPU and IPU – are changing the way enterprises deploy and manage compute resources across their networks.
7 Ways to Avoid Worst-Case Cyber Scenarios
06/21/2022
In the wake of devastating attacks, here are some of the best techniques and policies a company can implement to protect its data.
VPNs Persist Despite Zero-Trust Fervor
06/21/2022
Most organizations still rely on virtual private networks for secure remote access.
China-Linked ToddyCat APT Pioneers Novel Spyware
06/21/2022
ToddyCat's Samurai and Ninja tools are designed to give attackers persistent and deep access on compromised networks, security vendor says.
RIG Exploit Kit Replaces Raccoon Stealer Trojan With Dridex
06/21/2022
After the Raccoon Stealer Trojan disappeared, the RIG Exploit Kit seamlessly adopted Dridex for credential theft.
Gartner: Regulation, Human Costs Will Create Stormy Cybersecurity Weather Ahead
06/21/2022
Experts tell teams to prepare for more regulation, platform consolidation, management scrutiny, and attackers with the ability to claim human casualties.
Why Financial Institutions Must Double Down on Open Source Investments
06/21/2022
Open source is here to stay, and it's imperative that CIOs have a mature, open source engagement strategy, across consumption, contribution, and funding as a pillar of digital transformation.
Evolving Beyond the Password: It's Time to Up the Ante
06/21/2022
While there's an immediate need to improve MFA adoption, it's also critical to move to more advanced and secure passwordless frameworks, including biometrics. (Part 1 of 2)
BRATA Android Malware Evolves Into an APT
06/21/2022
The BRATA Android banking Trojan is evolving into a persistent threat with a new phishing technique and event-logging capabilities.
Reducing Risk With Zero Trust
06/21/2022
Zero trust isn’t just about authentication. Organizations can combine identity data with business awareness to address issues such as insider threat.
56 Vulnerabilities Discovered in OT Products From 10 Different Vendors
06/21/2022
Deep-dive study unearthed security flaws that could allow remote code execution, file manipulation, and malicious firmware uploads, among other badness.
AI Is Not a Security Silver Bullet
06/21/2022
AI can help companies more effectively identify and respond to threats, as well as harden applications.
<< Prev 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 Next >>