Dark Reading

Zscaler and AWS Expand Relationship

06/22/2022
Zscaler also announced innovations built on Zscaler’s Zero Trust architecture and AWS.

Zscaler Launches Posture Control Solution

06/22/2022
Enables DevOps and security teams to prioritize and remediate risks in cloud-native applications earlier in the development life cycle.

Zscaler Adds New AI/ML Capabilities for the Zscaler Zero Trust Exchange

06/22/2022
Organizations can strengthen their network defense with a number of intelligent security innovations.

Evolving Beyond the Password: Vanquishing the Password

06/22/2022
Using WebAuthn, physical keys, and biometrics, organizations can adopt more advanced passwordless MFA and true passwordless systems. (Part 2 of 2)

The Risk of Multichannel Phishing Is on the Horizon

06/22/2022
The cybersecurity community is buzzing with concerns of multichannel phishing attacks, particularly on smishing and business text compromise, as hackers turn to mobile to launch attacks.

GitHub's MFA Plans Should Spur Rest of Industry to Raise the Bar

06/22/2022
We as industry leaders should be building on what individual platforms like GitHub are doing in two critical ways: demanding third parties improve security and creating more interoperable architectures.

80% of Firms Suffered Identity-Related Breaches in Last 12 Months

06/22/2022
With almost every business experiencing growth in human and machine identities, firms have made securing those identities a priority.

Risk Disconnect in the Cloud

06/22/2022
New Cloud Security Alliance (CSA) and Google Cloud study shows many enterprises struggle to measure and manage risk in their cloud workloads.

Linux Foundation Announces Open Programmable Infrastructure Project to Drive Open Standards for New Class of Cloud Nativ

06/21/2022
Data Processing and Infrastructure Processing Units – DPU and IPU – are changing the way enterprises deploy and manage compute resources across their networks.

7 Ways to Avoid Worst-Case Cyber Scenarios

06/21/2022
In the wake of devastating attacks, here are some of the best techniques and policies a company can implement to protect its data.

VPNs Persist Despite Zero-Trust Fervor

06/21/2022
Most organizations still rely on virtual private networks for secure remote access.

China-Linked ToddyCat APT Pioneers Novel Spyware

06/21/2022
ToddyCat's Samurai and Ninja tools are designed to give attackers persistent and deep access on compromised networks, security vendor says.

RIG Exploit Kit Replaces Raccoon Stealer Trojan With Dridex

06/21/2022
After the Raccoon Stealer Trojan disappeared, the RIG Exploit Kit seamlessly adopted Dridex for credential theft.

Gartner: Regulation, Human Costs Will Create Stormy Cybersecurity Weather Ahead

06/21/2022
Experts tell teams to prepare for more regulation, platform consolidation, management scrutiny, and attackers with the ability to claim human casualties.

Why Financial Institutions Must Double Down on Open Source Investments

06/21/2022
Open source is here to stay, and it's imperative that CIOs have a mature, open source engagement strategy, across consumption, contribution, and funding as a pillar of digital transformation.

Evolving Beyond the Password: It's Time to Up the Ante

06/21/2022
While there's an immediate need to improve MFA adoption, it's also critical to move to more advanced and secure passwordless frameworks, including biometrics. (Part 1 of 2)

BRATA Android Malware Evolves Into an APT

06/21/2022
The BRATA Android banking Trojan is evolving into a persistent threat with a new phishing technique and event-logging capabilities.

Reducing Risk With Zero Trust

06/21/2022
Zero trust isn’t just about authentication. Organizations can combine identity data with business awareness to address issues such as insider threat.

56 Vulnerabilities Discovered in OT Products From 10 Different Vendors

06/21/2022
Deep-dive study unearthed security flaws that could allow remote code execution, file manipulation, and malicious firmware uploads, among other badness.

AI Is Not a Security Silver Bullet

06/21/2022
AI can help companies more effectively identify and respond to threats, as well as harden applications.