Dark Reading
Biden Requests Nearly $11B for Federal Cybersecurity Spending
03/29/2022
The administration's 2023 IT budget for civilian agencies includes $500 million more for CISA.
Cyera Launches From Stealth With $60M to Identify, Secure, and Remediate Cloud Data Security Risks
03/29/2022
Backed by Sequoia, Accel, and Cyberstarts, Cyera is building the security layer for the data plane in the cloud and enabling enterprises to identify and reduce risks across all cloud-based data repositories.
Exploring the Intersection of Physical Security and Cybersecurity
03/29/2022
Residential, commercial, and public buildings are getting smarter; fitting them with a network of connected systems allows buildings to regulate their environment, save energy, and be more secure.
Low-Code/No-Code Tools Are Popular, But Untrusted
03/28/2022
While low-code and no-code tools make application development more flexible, they open up security flaws.
Zero-Day Surge Led to More Rapid Exploitation of Bugs in 2021
03/28/2022
New vulnerability study shows how "attacker economies of scale" have shaped the risk landscape.
Triton Malware Still Targeting Energy Firms
03/28/2022
The FBI's latest Private Industry Notification warns the energy sector that the group behind Triton is still up to no good.
Vodafone Portugal: The Attack on Brand Reputations and Public Confidence Through Cybercrime
03/28/2022
Companies must prepare effective, data-driven threat-response strategies as they monitor for reputational risks as well as cyberattacks.
Security's Life Cycle Isn't the Developers' Life Cycle
03/28/2022
Whether it's PCI-DSS, SSDLC, or GDPR, the criteria that security standards expect businesses to uphold are neither realistic or feasible.
Indictment of Russian National Offers Glimpse Into Methodical Targeting of Energy Firm
03/25/2022
Evgeny Viktorovich Gladkikh tried to cause catastrophic damage to Saudi oil refinery in 2017 via the Triton/Trisis malware, the US has alleged.
How Do I Demonstrate the ROI of My Security Program?
03/25/2022
Security teams must shift away from saying no, align security initiatives to business goals, and report metrics in a way business leaders can understand.
WiCyS Members Now Have Access to Cyber Defense Challenge Through Target
03/25/2022
Target's cybersecurity team has designed a Cyber Defense Challenge exclusively for members of Women in CyberSecurity (WiCyS).
Here's How Fast Ransomware Encrypts Files
03/25/2022
New analysis shows how long it takes for each of the top 10 ransomware families to encrypt 100,000 files.
HR Alone Can't Solve the Great Resignation
03/25/2022
Here's how IT teams and decision-makers can step up to support the workforce. Creating a culture of feedback and introducing automation can mitigate burnout, inspire employees, and reduce turnover.
Russian Nationals Indicted for Epic Triton/Trisis and Dragonfly Cyberattacks on Energy Firms
03/24/2022
Four Russian government employees were charged by the DoJ for attack campaigns targeting hundreds of energy sector companies and organizations in 135 countries, including the US.
Downloaders Currently the Most Prevalent Android Malware
03/24/2022
Of the top 10 Trojans targeting Android devices, downloaders and infostealers accounted for 87% of detections in February, Bitdefender says.
How Casinos Can Prevent Loyalty Incentive and Account Takeover Fraud
03/24/2022
As casinos go digital, their loyalty programs and authentic accounts are at risk.
Ransomware Payments, Demands Rose Dramatically in 2021
03/24/2022
New data pulled from incident response cases by Unit 42 shows cyber-extortion attacks jumped by 85%.
Pandemic Leaves Firms Scrambling for Cybersecurity Specialists
03/24/2022
Companies have trouble retaining workers, with almost two-thirds of business reporting unfilled positions and massive unmet demand for technical cybersecurity professionals, study shows.
For MSPs, Next-Gen Email Security Is a Must
03/24/2022
Stay one step ahead of the constantly evolving cyber threats with the right MSP email security solution. Discover how to evaluate and select the best service and solutions for your clients.
APIs & the Software Supply Chain — Evolving Security for Today's Digital Ecosystem
03/24/2022
Securing APIs requires both a "shift left" methodology and "shield right" action.
<< Prev 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 Next >>