Dark Reading

UK MoD Data Breach Shows Cybersecurity Must Protect Both People and Data

09/22/2021
The UK MoD has failed to protect personally identifiable information (PII) for Afghan interpreters; the incident highlights how avoidable cybersecurity mistakes can have devastating consequences.

A Cyber-Resilience Model for the Next Era

09/22/2021
Digital dilemmas have driven security to the forefront of business leaders' priorities. Understanding how to provide security at the speed of change and build a cyber-resilient organization will drive competitive advantage and help organizations run and transform with ease.

UK MoD Data Breach Shows Cybersecurity Must Protect Both People and Data

09/22/2021
The UK MoD has failed to protect personally identifiable information (PII) for Afghan interpreters; the incident highlights how avoidable cybersecurity mistakes can have devastating consequences.

Strained Relationships Hinder DevSecOps Innovation

09/22/2021
A new survey from Forrester and VMware finds more than half of developers still think security gets in the way.

CISA, FBI, NSA Warn of Increase in Conti Ransomware Attacks

09/22/2021
A new alert provides the technical details of ongoing attacks and guidance for organizations to secure systems against Conti.

Midmarket Security: Think You’re Safe? Think Again

09/22/2021
Gone is the false perception that large enterprises, banks, and financial institutions are the only organizations under attack.

CyberGRX Shows Organizations Fail to Mitigate Third-Party Risk

09/22/2021
Independent Research Firm uncovers that significant events would need to happen for organizations to elevate the importance of third-party cyber-risk mitigation strategies.

Why Security Pros Should Rethink Their Focus on Information Resilience

09/22/2021
Resilience is often defined as being able to withstand disruptions and rebound to a previous state. But a system's ability to return to a prior state doesn't mean it's sufficiently resilient.

Druva Introduces Curated Recovery Technology for Accelerated Ransomware Recovery

09/22/2021
Combining this comprehensive ransomware recovery module with Druva's built-in security framework, businesses can now better protect critical data and recover faster with confidence.

Synology Releases C2 Backup for Windows

09/22/2021
Synology launches C2 Backup, providing powerful and efficient data protection for Windows devices.

New Cooperative's Ransomware Attack Underscores Threat to Food & Agriculture

09/21/2021
The Iowa grain cooperative took its systems offline in response to a security incident earlier this week.

CTO 2.0: Maiffret Rejoins BeyondTrust

09/21/2021
Hacker-turned-entrepreneur Marc Maiffret reflects on his past few years "embedded" with enterprise security teams and how it has shaped his security view.

10 Threat Trends in DNS Security

09/21/2021
Cisco Security examines Cisco Umbrella data for trends in malicious DNS activity during 2020.

US Treasury Dept. Sanctions Suex Cryptocurrency Exchange

09/21/2021
Sanctions are a result of Suex's role in facilitating transactions for ransomware attackers., officials say.

Data Sharing, Added Security Steps Drive Consumers to Shop Elsewhere

09/21/2021
A new survey finds most shoppers will stop a transaction if asked for too much personal information or to complete many security steps.

5 Ways to Become a Better Cyber-Threat Exterminator

09/21/2021
Tactical threat intelligence feeds directly into security operations and helps tighten existing security controls and improve incident response times.

Elizabeth Kolade on How AI Is a 'Double-Edged Sword' & the Challenge of Harmonizing Cyber and Physical Security

09/21/2021
An analyst at the Defence Space Administration, Nigeria, Elizabeth Kolade was named in the list of 'One to watch: Security' for the IFSEC Global Influencers in Security and Fire 2021. Julian Hall put some quickfire questions to her on the trends and issues she's witnessing in the sector.

Why Cryptomining Malware Is a Harbinger of Future Attacks

09/21/2021
Crypto thieves rely on users not noticing installation of their tiny payload on thousands of machines, or the CPU cycles being siphoned off to perpetuate the schemes.

Open Source Software Projects Up Their Security Game but Face More Attacks

09/20/2021
Patches for dependencies are trickling up through the open source ecosystem faster than ever — a good thing because attackers are focusing more on open source software.

archTIS Acquires Cipherpoint Technology Assets and Customers

09/20/2021
Accretive asset purchase adds to archTIS’ rapidly growing annual recurring revenue, global distribution and industry-leading intellectual property.