Dark Reading

SecureAuth Buys Acceptto to Deliver Low-Friction Authentication to Enterprises

11/05/2021
Acceptto’s contextual behavior threat intelligence technology will help SecureAuth deliver AI-driven MFA and continuous password-less authentication, SecureAuth says.

US Defense Contractor Discloses Data Breach

11/05/2021
Electronic Warfare Associates says an attackers infiltrated EWA email in August, which led to the exfiltration of files with personal data.

Who's Minding Your Company's Crypto Decisions?

11/05/2021
Security teams must first evaluate security protocols and the reputation of the cryptocurrency payment platform before their companies can proceed to accept the alternative currency as payment.

How InfoSec Should Use the Minimum Viable Secure Product Checklist

11/05/2021
Google and Salesforce executives discuss the need for the newly released MVSP, how tech companies came together to work on it, and how organizations should use it.

To Secure DevOps, Security Teams Must be Agile

11/05/2021
The evolution of agile development and infrastructure-as-code has given security teams the tools they need to gain visibility, find vulnerabilities early, and continuously evaluate infrastructure.

4 Tips on How Small to Midsize Businesses Can Combat Cyberattacks

11/05/2021
The first step in improving your cybersecurity is understanding your risk of attack.

How Is Zero Trust Different From Traditional Security?

11/04/2021
Unlike traditional security approaches, the zero-trust security model verifies a user's identity each and every time they need specific system access.

API Security Issues Hinder Application Delivery

11/04/2021
A new survey explains why nearly all organizations experience API security problems to varying degrees.

Ripping Off the Blindfold: Illuminating OT Environments

11/04/2021
A security tool that monitors OT devices can't disrupt operations. This is why the Self-Learning AI acts only on information obtained by passive monitoring of the network.

US Offers $10M Reward For ID, Location of DarkSide Leadership

11/04/2021
The State Department offers multimillion-dollar rewards for information related to the leaders and members involved in DarkSide ransomware.

Phishing Attack Blends Spoofed Amazon Order and Fraudulent Customer Service Agents

11/04/2021
It's the latest in a series of clever brand impersonation scams that use multiple vectors to lure victims.

Appsian Security Announces Acquisition of Q Software, a Leader in JD Edwards Security and Compliance

11/04/2021
The acquisition provides customers of JD Edwards, along with Oracle EBS and Oracle Cloud, with expanded capabilities for data masking, threat detection and response, and real-time analytics across multiple ERP applications.

Having Trouble Finding Cybersecurity Talent? You Might Be the Problem

11/04/2021
Hiring managers must rethink old-school practices to find the right candidates and be ready to engage in meaningful conversations about their company's values. Here are three ways to start.

Coalfire Expands Application Security Vision With Major Upgrade to Application Security Platform, ThreadFix

11/04/2021
ThreadFix v3.1 delivers fastest speed for AppSec automation and remediation.

How to Avoid Another Let's Encrypt-Like Meltdown

11/03/2021
Experts weigh in on steps network and security administrators need to take before the next time a root certificate expires.

Researchers Scan the Web to Uncover Malware Infections

11/03/2021
Dozens of companies and universities regularly scan the Internet to gather data on connected devices, but some firms are looking deeper to uncover the extent of detectable malware infections.

CISA Issues New Directive for Patching Known Exploited Vulnerabilities

11/03/2021
The goal is to reduce civilian federal agency exposure to attacks that threat actors are actively using in campaigns, agency says.

5 MITRE ATT&CK Tactics Most Frequently Detected by Cisco Secure Firewalls

11/03/2021
Cisco Security examines the most frequently encountered MITRE ATT&CK tactics and techniques.

Cloud Data Security Startup Launches

11/03/2021
TrustLogix aims to streamline and simplify data governance in the cloud.

Where Is Cloud Permissions Management Headed?

11/03/2021
Cloud permissions management emerged as a standalone cloud security technology but is quickly becoming part of a broader set of capabilities