The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches
Cloud
ICS/OT
Remote Workforce
Perimeter
Analytics
Security Monitoring
Security Monitoring
App Sec
Database Security
Database Security
Risk
Compliance
Compliance
Threat Intelligence
Endpoint
Authentication
Mobile Security
Privacy
Authentication
Mobile Security
Privacy
Vulnerabilities / Threats
Advanced Threats
Insider Threats
Vulnerability Management
Advanced Threats
Insider Threats
Vulnerability Management
Operations
Identity & Access Management
Careers & People
Identity & Access Management
Careers & People
Physical Security
IoT
DR Global
Middle East & Africa
Middle East & Africa
Black Hat news
Omdia Research
Events
Close
Back
Events
Events
Black Hat Europe - December 4-7 - Learn More
Black Hat Middle East and Africa - Nov 14-16 - Learn More
Webinars
Cyber Risk Assessment Secrets From the Pros
Sep 26, 2023
The Evolution of the Vulnerability Landscape in 2023
Sep 27, 2023
Resources
Close
Back
Resources
Dark Reading Library >
Reports >
Webinars >
White Papers >
Slideshows >
Newsletters >
Events >
Partner Perspectives: Microsoft
Partner Perspectives: Google Cloud
Newsletter Sign-Up
The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches
Cloud
ICS/OT
Remote Workforce
Perimeter
Analytics
Security Monitoring
Security Monitoring
App Sec
Database Security
Database Security
Risk
Compliance
Compliance
Threat Intelligence
Endpoint
Authentication
Mobile Security
Privacy
Authentication
Mobile Security
Privacy
Vulnerabilities / Threats
Advanced Threats
Insider Threats
Vulnerability Management
Advanced Threats
Insider Threats
Vulnerability Management
Operations
Identity & Access Management
Careers & People
Identity & Access Management
Careers & People
Physical Security
IoT
DR Global
Middle East & Africa
Middle East & Africa
Black Hat news
Omdia Research
Events
Close
Back
Events
Events
Black Hat Europe - December 4-7 - Learn More
Black Hat Middle East and Africa - Nov 14-16 - Learn More
Webinars
Cyber Risk Assessment Secrets From the Pros
Sep 26, 2023
The Evolution of the Vulnerability Landscape in 2023
Sep 27, 2023
Resources
Close
Back
Resources
Dark Reading Library >
Reports >
Webinars >
White Papers >
Slideshows >
Newsletters >
Events >
Partner Perspectives: Microsoft
Partner Perspectives: Google Cloud
The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches
Cloud
ICS/OT
Remote Workforce
Perimeter
Analytics
Security Monitoring
Security Monitoring
App Sec
Database Security
Database Security
Risk
Compliance
Compliance
Threat Intelligence
Endpoint
Authentication
Mobile Security
Privacy
Authentication
Mobile Security
Privacy
Vulnerabilities / Threats
Advanced Threats
Insider Threats
Vulnerability Management
Advanced Threats
Insider Threats
Vulnerability Management
Operations
Identity & Access Management
Careers & People
Identity & Access Management
Careers & People
Physical Security
IoT
DR Global
Middle East & Africa
Middle East & Africa
Black Hat news
Omdia Research
Events
Close
Back
Events
Events
Black Hat Europe - December 4-7 - Learn More
Black Hat Middle East and Africa - Nov 14-16 - Learn More
Webinars
Cyber Risk Assessment Secrets From the Pros
Sep 26, 2023
The Evolution of the Vulnerability Landscape in 2023
Sep 27, 2023
Resources
Close
Back
Resources
Dark Reading Library >
Reports >
Webinars >
White Papers >
Slideshows >
Newsletters >
Events >
Partner Perspectives: Microsoft
Partner Perspectives: Google Cloud
Newsletter Sign-Up
SEARCH
A minimum of 3 characters are required to be typed in the search bar in order to perform a search.
Announcements
Event
Think Like an Attacker: Understanding Cybercriminals & Nation-State Threat Actor | Nov 16 Virtual Event <REGISTER NOW>
Event
Tips for A Streamlined Transition to Zero Trust | Sept 28 LIVE Webinar <REGISTER NOW>
Event
The Evolution of the Vulnerability Landscape in 2023 | Sept 27 LIVE Webinar <REGISTER NOW>
Previous
Next
Analytics
Breaking news, news analysis, and expert commentary about cybersecurity data analytics, including tools & technologies.
Name That Toon: Somewhere in Sleepy Hollow
Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card.
September 19, 2023
Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card.
by John Klossner, Cartoonist
September 19, 2023
1 MIN READ
Article
Companies Explore Ways to Safeguard Data in the Age of LLMs
Generative AI models are forcing companies to become creative about how they keep employees from giving away sensitive data.
September 18, 2023
Generative AI models are forcing companies to become creative about how they keep employees from giving away sensitive data.
by Robert Lemos, Contributing Writer, Dark Reading
September 18, 2023
5 MIN READ
Article
Should Senior IT Professionals Be Accountable for Professional Decisions?
Everyone makes mistakes — but what if your mistakes risk the security of millions of people?
August 30, 2023
Everyone makes mistakes — but what if your mistakes risk the security of millions of people?
by James Watts, Managing Director, Databarracks
August 30, 2023
4 MIN READ
Article
Everest Group Research: C-Suite Must Recognize Critical Difference Between Cybersecurity and Cyber Resilience
August 29, 2023
August 29, 2023
3 MIN READ
Article
Vendors Training AI With Customer Data Is an Enterprise Risk
While Zoom has scrapped plans to harvest customer content for use in its AI and ML models, the incident should raise concerns for enterprises and consumers alike.
August 25, 2023
While Zoom has scrapped plans to harvest customer content for use in its AI and ML models, the incident should raise concerns for enterprises and consumers alike.
by Jai Vijayan, Contributing Writer, Dark Reading
August 25, 2023
4 MIN READ
Article
Name That Toon: Swift as an Arrow
Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card.
August 23, 2023
Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card.
by John Klossner, Cartoonist
August 23, 2023
1 MIN READ
Article
Following Pushback, Zoom Says It Won't Use Customer Data to Train AI Models
Company's experience highlights the tightrope tech organizations walk when integrating AI into their products and services.
August 14, 2023
Company's experience highlights the tightrope tech organizations walk when integrating AI into their products and services.
by Jai Vijayan, Contributing Writer, Dark Reading
August 14, 2023
3 MIN READ
Article
Threat Intelligence Efforts, Investment Lagging, Says Opswat
In an annual survey, 62% of respondents admited their threat intel efforts need stepping up.
August 11, 2023
In an annual survey, 62% of respondents admited their threat intel efforts need stepping up.
by Dark Reading Staff, Dark Reading
August 11, 2023
1 MIN READ
Article
OWASP Lead Flags Gaping Hole in Software Supply Chain Security
SBOMs aren't enough: Developers need to dig deeper into how software is built by using a process called binary source validation.
August 09, 2023
SBOMs aren't enough: Developers need to dig deeper into how software is built by using a process called binary source validation.
by Elizabeth Montalbano, Contributor, Dark Reading
August 09, 2023
5 MIN READ
Article
Attacker Breakout Time Shrinks Again, Underscoring Need for Automation
Just 79 minutes — that's how long it takes attackers to move from an initial compromise to extending their infiltration of a firm's network.
August 09, 2023
Just 79 minutes — that's how long it takes attackers to move from an initial compromise to extending their infiltration of a firm's network.
by Robert Lemos, Contributing Writer, Dark Reading
August 09, 2023
4 MIN READ
Article
World Cup Glory Looms, and So Do Cyber Threats, Microsoft Warns
The attack surface of a live event like this summer’s World Cup in Australia and New Zealand rivals that of a large multinational enterprise, or even a small city.
August 03, 2023
The attack surface of a live event like this summer’s World Cup in Australia and New Zealand rivals that of a large multinational enterprise, or even a small city.
by Nate Nelson, Contributing Writer, Dark Reading
August 03, 2023
4 MIN READ
Article
Instagram Flags AI-Generated Content
Amid the national discussion about AI safety and non-human-originated content in the US, an app researcher spotted an effort by the social media app to flag AI posts for its 2+ billion users.
August 02, 2023
Amid the national discussion about AI safety and non-human-originated content in the US, an app researcher spotted an effort by the social media app to flag AI posts for its 2+ billion users.
by Dark Reading Staff, Dark Reading
August 02, 2023
2 MIN READ
Article
CISA: 'Submarine' Backdoor Torpedoes Barracuda Email Security
A China-nexus cyber-espionage campaign rages on with the fourth backdoor to surface in the wild that takes advantage of the CVE-2023-2868 zero-day security bug — with severe threat of lateral movement, CISA warns.
August 01, 2023
A China-nexus cyber-espionage campaign rages on with the fourth backdoor to surface in the wild that takes advantage of the CVE-2023-2868 zero-day security bug — with severe threat of lateral movement, CISA warns.
by Jai Vijayan, Contributing Writer, Dark Reading
August 01, 2023
3 MIN READ
Article
CVSS 4.0 Is Here, but Prioritizing Patches Still a Hard Problem
CVSS Version 4 arguably performs better, but companies also need to tailor any measure of threat to their own environment to quickly evaluate new software bugs for patching order.
July 21, 2023
CVSS Version 4 arguably performs better, but companies also need to tailor any measure of threat to their own environment to quickly evaluate new software bugs for patching order.
by Robert Lemos, Contributing Writer, Dark Reading
July 21, 2023
3 MIN READ
Article
Microsoft 365 Breach Risk Widens to Millions of Azure AD Apps
China-linked APT actors could have single-hop access to the gamut of Microsoft cloud services and apps, including SharePoint, Teams, and OneDrive, among many others.
July 21, 2023
China-linked APT actors could have single-hop access to the gamut of Microsoft cloud services and apps, including SharePoint, Teams, and OneDrive, among many others.
by Tara Seals, Managing Editor, News, Dark Reading
July 21, 2023
4 MIN READ
Article