A code backdoor in a package on the Python Package Index demonstrates the importance of verifying code brought in from code repositories.By Curtis Franklin Jr. Senior Editor at Dark Reading, 7/19/20190 comments | Read | Post a Comment
More than 30% of Mirai attacks, and an increasing number of variants of the malicious malare, are going after enterprise IoT devices, raising the stakes for business.By Robert Lemos Contributing Writer, 7/19/20190 comments | Read | Post a Comment
Why apples-to-apples performance tests are the only way to accurately gauge the impact of network security products and solutions. By Brian Monkman Executive Director at NetSecOPEN, 7/19/20193 comments | Read | Post a Comment
A security professional needed a secure language for IoT development. So he wrote his own, applying learned lessons about memory and resources in the process.By Curtis Franklin Jr. Senior Editor at Dark Reading, 7/18/20190 comments | Read | Post a Comment
Threat actors are increasingly 'living off the land,' using publicly available management and administration tools to conceal malicious activity.
By Jai Vijayan Contributing Writer, 7/18/20191 Comment | Read | Post a Comment
These competitions challenge participants with problems involving digital forensics, cryptography, binary analysis, web security, and many other fields.By Dr. Giovanni Vigna Chief Technology Officer at Lastline, 7/18/20191 Comment | Read | Post a Comment
What will it take to align staff and budget to protect the organization?By Jason Sandys Microsoft Enterprise Mobility MVP and Senior Consultant at Coretech Alliance, 7/18/20191 Comment | Read | Post a Comment
At Black Hat, analysts from MITRE and Splunk will detail how organizations of many different sizes are leveraging ATT&CK's common language.By Curtis Franklin Jr. Senior Editor at Dark Reading, 7/17/20191 Comment | Read | Post a Comment
Researchers discover a third-party algorithm in multiple high-profile Bluetooth devices exposes users to third-party tracking and data access.By Kelly Sheridan Staff Editor, Dark Reading, 7/17/20190 comments | Read | Post a Comment
Organizations with systems exploitable via the RDP flaw pose an increasing risk to themselves and other organizations, BitSight says.By Jai Vijayan Contributing Writer, 7/17/20190 comments | Read | Post a Comment
New research on password management tools identifies the relative strengths and weaknesses of 12 competing offerings.
By Maxine Holt Research Director, Ovum, 7/17/20190 comments | Read | Post a Comment
For too long, we've focused almost exclusively on keeping out the bad guys rather than what to do when they get in (and they will). By Zane Lackey Co-Founder and CSO of Signal Sciences, 7/17/20191 Comment | Read | Post a Comment