Dark Reading

How to Secure a High-Profile Event Like the Super Bowl

06/10/2022
Cisco's TK Keanini and the NFL's Tomás Maldonado join Dark Reading's Terry Sweeney at Dark Reading News Desk during RSA Conference to talk about end-to-end security.

Application Security Testing Is on the Mend With Automated Remediation

06/10/2022
Mend's Arabella Hallawell joins Dark Reading's Terry Sweeney at Dark Reading News Desk at RSA Conference to talk about the benefits of automated remediation.

New Linux Malware 'Nearly Impossible to Detect'

06/10/2022
So-called Symbiote malware, first found targeting financial institutions, contains stealthy rootkit capabilities.

Mitigating the Security Skills Shortage

06/10/2022
Panther Labs' Jack Naglieri joins Dark Reading's Terry Sweeney at Dark Reading News Desk at RSA Conference to discuss how to improve hiring and training.

A Few Simple Ways to Transform Your Cybersecurity Hiring

06/10/2022
Raytheon Intelligence & Space's Jon Check joins Dark Reading's Terry Sweeney at Dark Reading News Desk at RSA Conference to talk about how hiring must change.

Artificial Intelligence and Security: What You Should Know

06/10/2022
Next-generation AI products learn proactively and identify changes in the networks, users, and databases using "data drift" to adapt to specific threats as they evolve.

How 4 Young Musicians Hacked Sheet Music to Help Fight the Cold War

06/10/2022
In 1985, a group of klezmer musicians from the US rendezvoused with underground dissidents in Tbilisi, Georgia. This is the story of how they pulled it off with homebrew cryptography.

In a Quickly Evolving Landscape, CISOs Shift Their 2022 Priorities

06/10/2022
Cloud migration, DevSecOps, cyber insurance, and more have emerged as important motivators for cybersecurity investment and focus.

Design Weakness Discovered in Apple M1 Kernel Protections

06/10/2022
The proof-of-concept attack from MIT CSAIL researchers undermines the pointer authentication feature used to defend the Apple chip's OS kernel.

Sysdig Takes a Deeper Cut at Cloud Security

06/09/2022
Sysdig's Omer Azaria joins Dark Reading's Terry Sweeney at Dark Reading News Desk during RSA Conference to talk about cloud security.

Noname: Proactiveness Is the Name of the Game in App Security

06/09/2022
Noname Security's Shay Levi joins Dark Reading's Terry Sweeney at Dark Reading News Desk during RSA Conference to talk about making code more secure.

Lacework Blends Artificial Intelligence and Automation to Bolster Cloud Security

06/09/2022
Lacework's Mark Nunnikhoven joins Dark Reading's Terry Sweeney at Dark Reading News Desk during RSA Conference to talk about AI and cloud security.

Prevent Breaches and Malware With Proactive Defenses

06/09/2022
Darktrace's Mike Beck joins Dark Reading's Terry Sweeney at Dark Reading News Desk during RSA Conference to talk about risk management.

DigiCert Acquires DNS Made Easy

06/09/2022
The certificate management company plans to integrate DNS services throughout its portfolio.

Identity-First Security Helps Reduce and Neutralize Enterprise Threats

06/09/2022
Okta's Marc Rogers and Auth0's Jameeka Aaron join Dark Reading's Terry Sweeney at Dark Reading News Desk during RSA Conference to talk about remote work security.

Emotet Banking Trojan Resurfaces, Skating Past Email Security

06/09/2022
The malware is using spreadsheets, documents, and other types of Microsoft Office attachments in a new and improved version that is often able to bypass email gateway-security scanners.

Cisco Makes Resilience a Cornerstone of Security Strategy

06/09/2022
Cisco's Jeetu Patel joins Dark Reading's Terry Sweeney at Dark Reading News Desk during RSA Conference to discuss the power of information sharing.

Sophos: Keeping Tabs on the Bad Guys Using Threat Research

06/09/2022
Sophos' John Shier joins Dark Reading's Terry Sweeney at Dark Reading News Desk during RSA Conference to discuss the ransomware problem.

Cisco Revamps Cloud Security Strategy With New Secure Access, SASE Portfolio

06/09/2022
The company's vision for the future of cloud security is based on simplified, horizontal coverage across multiple cloud platforms.

How AI Is Useful — and Not Useful — for Cybersecurity

06/09/2022
AI works best when security professionals and AI are complementing each other.