The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches
Cloud
ICS/OT
Remote Workforce
Perimeter
Analytics
Security Monitoring
Security Monitoring
App Sec
Database Security
Database Security
Risk
Compliance
Compliance
Threat Intelligence
Endpoint
Authentication
Mobile Security
Privacy
Authentication
Mobile Security
Privacy
Vulnerabilities / Threats
Advanced Threats
Insider Threats
Vulnerability Management
Advanced Threats
Insider Threats
Vulnerability Management
Operations
Identity & Access Management
Careers & People
Identity & Access Management
Careers & People
Physical Security
IoT
DR Global
Middle East & Africa
Middle East & Africa
Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
SecTor - Canada's IT Security Conference Oct 23-26 - Learn More
Anatomy of a Data Breach - A Dark Reading June 22 Event
Webinars
Securing the Remote Worker: How to Monitor and Mitigate Offsite Cyberattacks
May 30, 2023
Next-Generation Supply Chain Security
Jun 07, 2023
Resources
Close
Back
Resources
Dark Reading Library >
Webinars >
Reports >
Slideshows >
White Papers >
Partner Perspectives: Microsoft
Tech Library >
Newsletter Sign-Up
The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches
Cloud
ICS/OT
Remote Workforce
Perimeter
Analytics
Security Monitoring
Security Monitoring
App Sec
Database Security
Database Security
Risk
Compliance
Compliance
Threat Intelligence
Endpoint
Authentication
Mobile Security
Privacy
Authentication
Mobile Security
Privacy
Vulnerabilities / Threats
Advanced Threats
Insider Threats
Vulnerability Management
Advanced Threats
Insider Threats
Vulnerability Management
Operations
Identity & Access Management
Careers & People
Identity & Access Management
Careers & People
Physical Security
IoT
DR Global
Middle East & Africa
Middle East & Africa
Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
SecTor - Canada's IT Security Conference Oct 23-26 - Learn More
Anatomy of a Data Breach - A Dark Reading June 22 Event
Webinars
Securing the Remote Worker: How to Monitor and Mitigate Offsite Cyberattacks
May 30, 2023
Next-Generation Supply Chain Security
Jun 07, 2023
Resources
Close
Back
Resources
Dark Reading Library >
Webinars >
Reports >
Slideshows >
White Papers >
Partner Perspectives: Microsoft
Tech Library >
The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches
Cloud
ICS/OT
Remote Workforce
Perimeter
Analytics
Security Monitoring
Security Monitoring
App Sec
Database Security
Database Security
Risk
Compliance
Compliance
Threat Intelligence
Endpoint
Authentication
Mobile Security
Privacy
Authentication
Mobile Security
Privacy
Vulnerabilities / Threats
Advanced Threats
Insider Threats
Vulnerability Management
Advanced Threats
Insider Threats
Vulnerability Management
Operations
Identity & Access Management
Careers & People
Identity & Access Management
Careers & People
Physical Security
IoT
DR Global
Middle East & Africa
Middle East & Africa
Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
SecTor - Canada's IT Security Conference Oct 23-26 - Learn More
Anatomy of a Data Breach - A Dark Reading June 22 Event
Webinars
Securing the Remote Worker: How to Monitor and Mitigate Offsite Cyberattacks
May 30, 2023
Next-Generation Supply Chain Security
Jun 07, 2023
Resources
Close
Back
Resources
Dark Reading Library >
Webinars >
Reports >
Slideshows >
White Papers >
Partner Perspectives: Microsoft
Tech Library >
Newsletter Sign-Up
SEARCH
A minimum of 3 characters are required to be typed in the search bar in order to perform a search.
Announcements
Event
How to Launch a Threat Hunting Program | Webinar <REGISTER>
Event
How to Accelerate XDR Outcomes: Bridging the Gap Between Network and Endpoint | Webinar <REGISTER>
Report
Black Hat USA 2022 Attendee Report | Supply Chain & Cloud Security Risks Are Top of Mind | <READ IT NOW>
Previous
Next
Careers & People
Breaking news, news analysis, and expert commentary on cybersecurity careers and industry leaders.
CISO Criminalization, Vague Cyber Disclosure Rules Create Angst for Security Teams
In the wake of the ex-Uber CISO verdict, CISOs ask for clearer rules and less uncertainty in managing disclosures, amid jail-time fears.
May 25, 2023
In the wake of the ex-Uber CISO verdict, CISOs ask for clearer rules and less uncertainty in managing disclosures, amid jail-time fears.
by Becky Bracken, Editor, Dark Reading
May 25, 2023
6 MIN READ
Article
How Universities Can Bridge Cybersecurity's Gender Gap
It's time to invest in initiatives that engage young women in cybersecurity early and often.
May 24, 2023
It's time to invest in initiatives that engage young women in cybersecurity early and often.
by Dr. Ashley Podhradsky, Vice President for Research and Economic Development, Dakota State University
May 24, 2023
4 MIN READ
Article
FBI: Human Trafficking Rings Force Job Seekers Into Cryptojacking Schemes
Victims of the cybercrime schemes are coerced to participate through violence and having their belongings taken away.
May 23, 2023
Victims of the cybercrime schemes are coerced to participate through violence and having their belongings taken away.
by Dark Reading Staff, Dark Reading
May 23, 2023
1 MIN READ
Article
A New Look for Risk in Awareness Training
Changes in the way risk is viewed are leading to changes in the way training is conducted.
May 23, 2023
Changes in the way risk is viewed are leading to changes in the way training is conducted.
by Curtis Franklin, Senior Analyst, Omdia
May 23, 2023
3 MIN READ
Article
Russian Ransomware Perp Charged After High-Profile Hive, Babuk & LockBit Hits
LockBit, Babuk, and Hive ransomware used by Russian to target critical US organizations, DOJ says.
May 16, 2023
LockBit, Babuk, and Hive ransomware used by Russian to target critical US organizations, DOJ says.
by Dark Reading Staff, Dark Reading
May 16, 2023
1 MIN READ
Article
Name That Toon: One by One
Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card.
May 16, 2023
Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card.
by John Klossner, Cartoonist
May 16, 2023
1 MIN READ
Article
Lacework Appoints Lea Kissner as Chief Information Security Officer
Former Humu, Google, and Twitter security leader adds deep security experience.
May 15, 2023
Former Humu, Google, and Twitter security leader adds deep security experience.
May 15, 2023
2 MIN READ
Article
Dragos Employee Hacked, Revealing Ransomware, Extortion Scheme
Attackers compromised the personal email of a new employee and, when the initial attack failed, attempted through socially engineered messages to get the company to pay them off.
May 11, 2023
Attackers compromised the personal email of a new employee and, when the initial attack failed, attempted through socially engineered messages to get the company to pay them off.
by Elizabeth Montalbano, Contributor, Dark Reading
May 11, 2023
4 MIN READ
Article
Security Leaders Discuss Industry Trends at Dark Reading's News Desk at RSAC 2023
Watch News Desk interviews with Dark Reading and cybersecurity leaders as they discuss trends and industry drivers druing RSA Conference 2023 in San Francisco.
May 11, 2023
Watch News Desk interviews with Dark Reading and cybersecurity leaders as they discuss trends and industry drivers druing RSA Conference 2023 in San Francisco.
by Dark Reading Staff, Dark Reading
May 11, 2023
5 MIN READ
Video
The Industrywide Consequences of Making Security Products Inaccessible
Accessibility won't solve all of the industry's problems, but it can help tackle a few.
May 10, 2023
Accessibility won't solve all of the industry's problems, but it can help tackle a few.
by Ross Haleliuk , Product Leader and Head of Product, LimaCharlie
May 10, 2023
4 MIN READ
Article
Keep Your Company Cyber Competent Without Adding Cyber Anxiety
With the right attitude, businesses can maximize employee satisfaction and protection, without sacrificing productivity.
May 09, 2023
With the right attitude, businesses can maximize employee satisfaction and protection, without sacrificing productivity.
by Kevin Reed, CISO, Acronis
May 09, 2023
4 MIN READ
Article
Google Launches Cybersecurity Career Certificate Program
Google's new program aims to offer accessible training to fill 750K open cybersecurity jobs with diverse array of talent.
May 04, 2023
Google's new program aims to offer accessible training to fill 750K open cybersecurity jobs with diverse array of talent.
by Dark Reading Staff, Dark Reading
May 04, 2023
1 MIN READ
Article
Famine to Feast and Back: Startups Adjust to Economic Realities
Cybersecurity is a hotbed of startup activity, and with good reason. Startups typically look for an IPO or acquisition, but right now IPOs are off the table.
May 04, 2023
Cybersecurity is a hotbed of startup activity, and with good reason. Startups typically look for an IPO or acquisition, but right now IPOs are off the table.
by Rik Turner, Principal Analyst, Infrastructure Solutions, Omdia
May 04, 2023
6 MIN READ
Article
Google Bans Thousands of Play Store Developer Accounts to Block Malware
Last year, Google banned 173,000 developer accounts and prevented 1.5 million apps from reaching the Play Store as it fought policy violations and malware.
April 28, 2023
Last year, Google banned 173,000 developer accounts and prevented 1.5 million apps from reaching the Play Store as it fought policy violations and malware.
by Nathan Eddy, Contributing Writer, Dark Reading
April 28, 2023
3 MIN READ
Article
Major US CFPB Data Breach Caused by Employee
The sensitivity of the personal information involved in the breach has yet to be determined by agency officials, but it affects 256,000 consumers.
April 20, 2023
The sensitivity of the personal information involved in the breach has yet to be determined by agency officials, but it affects 256,000 consumers.
by Dark Reading Staff, Dark Reading
April 20, 2023
2 MIN READ
Article