The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches
Cloud
ICS/OT
Remote Workforce
Perimeter
Analytics
Security Monitoring
Security Monitoring
App Sec
Database Security
Database Security
Risk
Compliance
Compliance
Threat Intelligence
Endpoint
Authentication
Mobile Security
Privacy
Authentication
Mobile Security
Privacy
Vulnerabilities / Threats
Advanced Threats
Insider Threats
Vulnerability Management
Advanced Threats
Insider Threats
Vulnerability Management
Operations
Identity & Access Management
Careers & People
Identity & Access Management
Careers & People
Physical Security
IoT
Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
Emerging Cybersecurity Technologies - A Dark Reading Mar 23 Event
Black Hat USA - August 5-10 - Learn More
Webinars
SecDevOps: The Smart Way to Shift Left
Mar 22, 2023
Building Out the Best Response Playbook for Ransomware Attacks
Mar 28, 2023
Resources
Close
Back
Resources
Dark Reading Library >
Webinars >
Reports >
Slideshows >
White Papers >
Partner Perspectives: Microsoft
Tech Library >
Newsletter
The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches
Cloud
ICS/OT
Remote Workforce
Perimeter
Analytics
Security Monitoring
Security Monitoring
App Sec
Database Security
Database Security
Risk
Compliance
Compliance
Threat Intelligence
Endpoint
Authentication
Mobile Security
Privacy
Authentication
Mobile Security
Privacy
Vulnerabilities / Threats
Advanced Threats
Insider Threats
Vulnerability Management
Advanced Threats
Insider Threats
Vulnerability Management
Operations
Identity & Access Management
Careers & People
Identity & Access Management
Careers & People
Physical Security
IoT
Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
Emerging Cybersecurity Technologies - A Dark Reading Mar 23 Event
Black Hat USA - August 5-10 - Learn More
Webinars
SecDevOps: The Smart Way to Shift Left
Mar 22, 2023
Building Out the Best Response Playbook for Ransomware Attacks
Mar 28, 2023
Resources
Close
Back
Resources
Dark Reading Library >
Webinars >
Reports >
Slideshows >
White Papers >
Partner Perspectives: Microsoft
Tech Library >
The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches
Cloud
ICS/OT
Remote Workforce
Perimeter
Analytics
Security Monitoring
Security Monitoring
App Sec
Database Security
Database Security
Risk
Compliance
Compliance
Threat Intelligence
Endpoint
Authentication
Mobile Security
Privacy
Authentication
Mobile Security
Privacy
Vulnerabilities / Threats
Advanced Threats
Insider Threats
Vulnerability Management
Advanced Threats
Insider Threats
Vulnerability Management
Operations
Identity & Access Management
Careers & People
Identity & Access Management
Careers & People
Physical Security
IoT
Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
Emerging Cybersecurity Technologies - A Dark Reading Mar 23 Event
Black Hat USA - August 5-10 - Learn More
Webinars
SecDevOps: The Smart Way to Shift Left
Mar 22, 2023
Building Out the Best Response Playbook for Ransomware Attacks
Mar 28, 2023
Resources
Close
Back
Resources
Dark Reading Library >
Webinars >
Reports >
Slideshows >
White Papers >
Partner Perspectives: Microsoft
Tech Library >
Newsletter
SEARCH
A minimum of 3 characters are required to be typed in the search bar in order to perform a search.
Announcements
Event
Emerging Cybersecurity Technologies: What You Need to Know - A Dark Reading March 23 Virtual Event | <GET YOUR PASS>
Report
Black Hat USA 2022 Attendee Report | Supply Chain & Cloud Security Risks Are Top of Mind | <READ IT NOW>
Previous
Next
Cloud
Breaking news, news analysis, and expert commentary on cybersecurity threats to the cloud as well as security tools & technologies to protect it.
Normalyze Granted Patent for Data Security Posture Management (DSPM)
March 21, 2023
March 21, 2023
3 MIN READ
Article
Name That Toon: It's E-Live!
Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card.
March 21, 2023
Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card.
by John Klossner, Cartoonist
March 21, 2023
1 MIN READ
Article
Shouldering the Increasingly Heavy Cloud Shared-Responsibility Model
There are a number of solutions that can help ensure security and compliance mandates are met in the cloud, but organizations should prioritize integration and policy-based management.
March 20, 2023
There are a number of solutions that can help ensure security and compliance mandates are met in the cloud, but organizations should prioritize integration and policy-based management.
by Kirsten Newcomer, Director, Cloud and DevSecOps Strategy, Red Hat
March 20, 2023
4 MIN READ
Article
Prancer Announces Integration With ChatGPT for Enhanced Security Assessments
March 17, 2023
March 17, 2023
2 MIN READ
Article
Meta Proposes Revamped Approach to Online Kill Chain Frameworks
A more holistic model beyond MITRE et al. is needed to help defenders better identify and understand commonalities in different online threat campaigns, the Facebook parent company says.
March 17, 2023
A more holistic model beyond MITRE et al. is needed to help defenders better identify and understand commonalities in different online threat campaigns, the Facebook parent company says.
by Jai Vijayan, Contributing Writer, Dark Reading
March 17, 2023
6 MIN READ
Article
Hornetsecurity Launches VM Backup V9
Hornetsecurity research highlights that more than 1 in 4 companies have fallen victim to ransomware attacks, with 14.1% losing data and 6.6% paying a ransom.
March 15, 2023
Hornetsecurity research highlights that more than 1 in 4 companies have fallen victim to ransomware attacks, with 14.1% losing data and 6.6% paying a ransom.
March 15, 2023
2 MIN READ
Article
Samsung Next Invests in Mitiga, Brings Total Funding to $45M
Financing will help support increasing customer demand while continuing to transform incident response for cloud and SaaS environments
March 14, 2023
Financing will help support increasing customer demand while continuing to transform incident response for cloud and SaaS environments
March 14, 2023
2 MIN READ
Article
Access Control Gap in Microsoft Active Directory Widens Enterprise Attack Surface
One researcher thinks trust is broken in AD. Microsoft disagrees that there's a security vulnerability. But enterprise IT environments should be aware of an authentication gap either way.
March 14, 2023
One researcher thinks trust is broken in AD. Microsoft disagrees that there's a security vulnerability. But enterprise IT environments should be aware of an authentication gap either way.
by Nate Nelson, Contributing Writer, Dark Reading
March 14, 2023
4 MIN READ
Article
Unpatched Zero-Day Bugs in Smart Intercom Allow Remote Eavesdropping
A video-enabled smart intercom made by Chinese company Akuvox has major security vulnerabilities that allow audio and video spying, and the company has so far been unresponsive to the discoveries.
March 10, 2023
A video-enabled smart intercom made by Chinese company Akuvox has major security vulnerabilities that allow audio and video spying, and the company has so far been unresponsive to the discoveries.
by Nathan Eddy, Contributing Writer, Dark Reading
March 10, 2023
4 MIN READ
Article
Inside Threat: Developers Leaked 10M Credentials, Passwords in 2022
More than five out of every 1,000 commits to GitHub included a software secret, half again the rate in 2021, putting applications and businesses at risk.
March 09, 2023
More than five out of every 1,000 commits to GitHub included a software secret, half again the rate in 2021, putting applications and businesses at risk.
by Robert Lemos, Contributing Writer, Dark Reading
March 09, 2023
3 MIN READ
Article
TSA Issues Urgent Directive to Make Aviation More Cyber Resilient
Will stricter cybersecurity requirements make flying safer? The TSA says yes, and sees it as a time-sensitive imperative.
March 08, 2023
Will stricter cybersecurity requirements make flying safer? The TSA says yes, and sees it as a time-sensitive imperative.
by Nate Nelson, Contributing Writer, Dark Reading
March 08, 2023
4 MIN READ
Article
Surge in Cloud Adoption Means a Greater Data Attack Surface for Healthcare and Financial Services
Organizations in both industries are falling short when addressing new challenges to protect data in the cloud, finds Blancco report.
March 08, 2023
Organizations in both industries are falling short when addressing new challenges to protect data in the cloud, finds Blancco report.
March 08, 2023
4 MIN READ
Article
Rising Public Cloud Adoption Is Accelerating Shadow Data Risks
Using a risk-based approach to deal with policy violations and continuous compliance monitoring will help avoid data exposures and fines.
March 08, 2023
Using a risk-based approach to deal with policy violations and continuous compliance monitoring will help avoid data exposures and fines.
by Amit Shaked, CEO & Co-Founder, Laminar
March 08, 2023
4 MIN READ
Article
Akamai Technologies Releases New Service and Tools to Stop Advanced Threats and Drive Zero Trust Adoption
March 07, 2023
March 07, 2023
3 MIN READ
Article
Hacker Cracks Toyota Customer Search Tool
Flaw in Toyota's C360 customer relationship management tool exposed personal data of unknown number of customers in Mexico, a disclosure says.
March 07, 2023
Flaw in Toyota's C360 customer relationship management tool exposed personal data of unknown number of customers in Mexico, a disclosure says.
by Dark Reading Staff, Dark Reading
March 07, 2023
1 MIN READ
Article