Dark Reading

Cisco Revamps Cloud Security Strategy With New Secure Access, SASE Portfolio

06/09/2022
The company's vision for the future of cloud security is based on simplified, horizontal coverage across multiple cloud platforms.

How AI Is Useful — and Not Useful — for Cybersecurity

06/09/2022
AI works best when security professionals and AI are complementing each other.

Want Better Security? Up Your Collaboration Game

06/09/2022
BAE Systems' Peder Jungck joins Dark Reading's Terry Sweeney at Dark Reading News Desk during RSA Conference to discuss the importance of collaboration.

Uptycs: Observability Is Key to Cloud Security

06/09/2022
Uptycs' Ganesh Pai joins Dark Reading's Terry Sweeney at Dark Reading News Desk during RSA Conference to talk about cloud security and observability.

Automox Adds Automation to Patching, Vuln Management

06/09/2022
Automox's Paul Zimski joins Dark Reading's Terry Sweeney at Dark Reading News Desk during RSA Conference to talk about automated patch management.

Why AIs Will Become Hackers

06/09/2022
At a 2022 RSA Conference keynote, technologist Bruce Schneier asserted that artificial intelligence agents will start to hack human systems — and what that will mean for us.

ReliaQuest Bolsters Extended Detection With Threat Intelligence

06/09/2022
ReliaQuest CTO Joe Partlow joins Dark Reading's Terry Sweeney at Dark Reading News Desk during RSA Conference to discuss extended detection response — and acquisition news.

How Poor Communication Opens the Door to Ransomware and Extortion

06/09/2022
Organizations can no longer rely on traditional responses to ransomware.

Security & Productivity: The New Power Couple

06/08/2022
Seemplicity's Ravid Circus joins Dark Reading's Terry Sweeney at Dark Reading News Desk during RSA Conference to talk up accelerating time-to-remediation and reducing risk.

DeepSurface Security: Risk-Based Prioritization Adds New Depth to Vulnerability Management

06/08/2022
DeepSurface's Tim Morgan joins Dark Reading's Terry Sweeney at Dark Reading News Desk during RSA Conference to discuss how to fortify vulnerability management.

China-Sponsored Cyberattackers Target Networking Gear to Build Widespread Attack Infrastructure

06/08/2022
Compromised routers, VPNs, and NAS devices from Cisco, Citrix, Pulse, Zyxel, and others are all being used as part of an extensive cyber espionage campaign.

Concentric: How To Maximize Your AI Returns, In and Out of the SOC

06/08/2022
Concentric AI's Karthik Krishnan joins Dark Reading's Terry Sweeney at Dark Reading News Desk during RSA Conference to discuss how artificial intelligence has transformed the security landscape.

Cracking the Email Security Code: 12 Best Practices for Small and Midsize Businesses

06/08/2022
It only takes one successful attack to spell disaster for a company. Learn how to protect your company with this email security best practice guide.

Lookout: Getting It Right at the Secure Service Edge

06/08/2022
Lookout's Jim Dolce joins Dark Reading's Terry Sweeney at Dark Reading News Desk during RSA Conference to discuss the advantages of Secure Service Edge.

Talon Grasps Victory at a Jubilant RSAC Innovation Sandbox

06/08/2022
Spirits were high at the return of the in-person contest, which kicked off by bringing last year's virtual event winner on stage.

Black Basta Ransomware Targets ESXi Servers in Active Campaign

06/08/2022
The new ransomware strain Black Basta is now actively targeting VMware ESXi servers in an ongoing campaign, encrypting files inside a targeted volumes folder.

How Do We Secure Our Cities From Attack?

06/08/2022
Physical access matters in keeping people and buildings safe. Points to consider when establishing a physical security protocol are ways to lock down an area to keep people safe, approaches to communicate clear safety directions, and access control.

Now Is the Time to Plan for Post-Quantum Cryptography

06/07/2022
Panelists from an RSA Conference keynote agreed that organizations need to begin work on PQC migration, if they haven't already.

An Emerging Threat: Attacking 5G Via Network Slices

06/07/2022
A successful attack against 5G networks could disrupt critical infrastructure, manipulate sensor data, or even cause physical harm to humans.

Mandia: Keep 'Shields Up' to Survive the Current Escalation of Cyberattacks

06/07/2022
As Mandiant CEO Kevin Mandia's company prepares to become part of Google, the incident response company continues to investigate many of the most critical cyber incidents.