informa

Cloud

Google Analyzes Methods Behind GCP Workload Attacks
The vast majority of cloud workload compromises stem from poor security configurations or compromised passwords, while cryptojacking is the common payload, research shows.
November 29, 2021
The vast majority of cloud workload compromises stem from poor security configurations or compromised passwords, while cryptojacking is the common payload, research shows.
by Robert Lemos, Contributing Writer
November 29, 2021
4 min read
Article
OpenText Acquires Bricata
The acquisition adds next-generation network detection and response technology to OpenText Security & Protection Cloud.
November 24, 2021
The acquisition adds next-generation network detection and response technology to OpenText Security & Protection Cloud.
by Dark Reading Staff, Dark Reading
November 24, 2021
1 min read
Article
Baffle's Data Privacy Cloud Protects Data for Amazon Redshift Customers
Amazon Redshift customers can use Baffle’s Data Privacy Cloud to secure the data pipeline as source data is migrated to Redshift and used for data analytics.
November 23, 2021
Amazon Redshift customers can use Baffle’s Data Privacy Cloud to secure the data pipeline as source data is migrated to Redshift and used for data analytics.
by Dark Reading Staff, Dark Reading
November 23, 2021
3 min read
Article
3 Takeaways from the Gartner Risk Management Summit
Security leaders can be treated as partners supporting the business and share accountability by establishing relationships with business stakeholders.
November 19, 2021
Security leaders can be treated as partners supporting the business and share accountability by establishing relationships with business stakeholders.
by Fahmida Y. Rashid, Features Editor, Dark Reading
November 19, 2021
4 min read
Article
Search CT Logs for Misconfigured SSL Certificates
Security defenders can run these queries against Certificate Transparency logs to identify misconfigured SSL certificates before they can be used by adversaries to map out attacks.
November 19, 2021
Security defenders can run these queries against Certificate Transparency logs to identify misconfigured SSL certificates before they can be used by adversaries to map out attacks.
by Dark Reading Staff, Dark Reading
November 19, 2021
3 min read
Article
Cloud Security Startup Lacework Gets a Boost With New $1.3B Funding
Lacework's will use its $1.3 billion Series D to expand go-to-market strategies and its data-focused cloud security platform.
November 18, 2021
Lacework's will use its $1.3 billion Series D to expand go-to-market strategies and its data-focused cloud security platform.
by Dark Reading Staff, Dark Reading
November 18, 2021
2 min read
Article
North Korean Hacking Group Targets Diplomats, Forgoes Malware
The TA406 group uses credential harvesting to target diplomats and policy experts in the United States, Russia, China, and South Korea, rarely resorting to malware.
November 18, 2021
The TA406 group uses credential harvesting to target diplomats and policy experts in the United States, Russia, China, and South Korea, rarely resorting to malware.
by Robert Lemos, Contributing Writer
November 18, 2021
4 min read
Article
Addressing the Low-Code Security Elephant in the Room
The danger of anyone being able to spin up new applications is that few are thinking about security. Here's why everyone is responsible for the security of low-code/no-code applications.
November 18, 2021
The danger of anyone being able to spin up new applications is that few are thinking about security. Here's why everyone is responsible for the security of low-code/no-code applications.
by Michael Bargury, CTO & Co-Founder, Zenity
November 18, 2021
8 min read
Article
Palo Alto Networks Delivers What's Next in Security at Ignite '21
Cybersecurity company introduces solutions aimed at network security, cloud security and security operations.
November 17, 2021
Cybersecurity company introduces solutions aimed at network security, cloud security and security operations.
November 17, 2021
5 min read
Article
Can I Have XDR Without EDR?
Yes, extended detection and response is possible without endpoint detection and response, but here's why having both is helpful.
November 17, 2021
Yes, extended detection and response is possible without endpoint detection and response, but here's why having both is helpful.
by Al Huger, Vice President and General Manager of Cisco Security Platform & Response
November 17, 2021
2 min read
Article
Is XDR Overhyped?
Security experts weigh in on the value and pitfalls of extended detection and response (XDR), offering consideration and advice on this growing new category.
November 17, 2021
Security experts weigh in on the value and pitfalls of extended detection and response (XDR), offering consideration and advice on this growing new category.
by Ericka Chickowski, Contributing Writer
November 17, 2021
1 min read
Article
Suppliers, Cloud Providers Are Threats to Enterprise Data, Survey Says
Other threats to enterprise data include cybercriminals, authorized users, foreign governments, and application vulnerabilities, according to Dark Reading's recent Strategic Security Report.
November 16, 2021
Other threats to enterprise data include cybercriminals, authorized users, foreign governments, and application vulnerabilities, according to Dark Reading's recent Strategic Security Report.
by Edge Editors, Dark Reading
November 16, 2021
2 min read
Article
New Global Rackspace Technology Survey Underscores Rapid Pace of Cloud Adoption
More than half of respondents have 100% of their infrastructure in the cloud; IT playing an increasingly critical role in driving corporate strategy.
November 16, 2021
More than half of respondents have 100% of their infrastructure in the cloud; IT playing an increasingly critical role in driving corporate strategy.
November 16, 2021
4 min read
Article
Emotet Makes a Comeback
The popular Trojan has re-emerged on the scene several months after the botnet infrastructure behind it was disrupted by law enforcement.
November 16, 2021
The popular Trojan has re-emerged on the scene several months after the botnet infrastructure behind it was disrupted by law enforcement.
by Dark Reading Staff, Dark Reading
November 16, 2021
1 min read
Article
The Old Ways Aren’t Working: Let’s Rethink OT Security
Ransomware attacks against critical infrastructure go beyond locking up data. They can entirely shut down production in a facility. Here's how AI can help you fight back.
November 16, 2021
Ransomware attacks against critical infrastructure go beyond locking up data. They can entirely shut down production in a facility. Here's how AI can help you fight back.
by Fahmida Y. Rashid, Features Editor, Dark Reading
November 16, 2021
8 min read
Article