The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches
Cloud
IoT
Physical Security
Perimeter
Analytics
Security Monitoring
Security Monitoring
App Sec
Database Security
Database Security
Risk
Compliance
Compliance
Threat Intelligence
Endpoint
Authentication
Mobile Security
Privacy
Authentication
Mobile Security
Privacy
Vulnerabilities / Threats
Advanced Threats
Insider Threats
Vulnerability Management
Advanced Threats
Insider Threats
Vulnerability Management
Operations
Identity & Access Management
Careers & People
Identity & Access Management
Careers & People
Remote Workforce
Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
SecTor - Canada's IT Security Conference Oct 1-6 - Learn More
Black Hat USA - August 6-11 - Learn More
Webinars
Building and Maintaining an Effective Remote Access Strategy
Aug 02, 2022
How Ransomware Works - And What You Can Do to Stop It
Jul 14, 2022
Resources
Close
Back
Resources
Reports >
Slideshows >
Tech Library >
Webinars >
White Papers >
Subscribe
Login
/
Register
The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches
Cloud
IoT
Physical Security
Perimeter
Analytics
Security Monitoring
Security Monitoring
App Sec
Database Security
Database Security
Risk
Compliance
Compliance
Threat Intelligence
Endpoint
Authentication
Mobile Security
Privacy
Authentication
Mobile Security
Privacy
Vulnerabilities / Threats
Advanced Threats
Insider Threats
Vulnerability Management
Advanced Threats
Insider Threats
Vulnerability Management
Operations
Identity & Access Management
Careers & People
Identity & Access Management
Careers & People
Remote Workforce
Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
SecTor - Canada's IT Security Conference Oct 1-6 - Learn More
Black Hat USA - August 6-11 - Learn More
Webinars
Building and Maintaining an Effective Remote Access Strategy
Aug 02, 2022
How Ransomware Works - And What You Can Do to Stop It
Jul 14, 2022
Resources
Close
Back
Resources
Reports >
Slideshows >
Tech Library >
Webinars >
White Papers >
The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches
Cloud
IoT
Physical Security
Perimeter
Analytics
Security Monitoring
Security Monitoring
App Sec
Database Security
Database Security
Risk
Compliance
Compliance
Threat Intelligence
Endpoint
Authentication
Mobile Security
Privacy
Authentication
Mobile Security
Privacy
Vulnerabilities / Threats
Advanced Threats
Insider Threats
Vulnerability Management
Advanced Threats
Insider Threats
Vulnerability Management
Operations
Identity & Access Management
Careers & People
Identity & Access Management
Careers & People
Remote Workforce
Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
SecTor - Canada's IT Security Conference Oct 1-6 - Learn More
Black Hat USA - August 6-11 - Learn More
Webinars
Building and Maintaining an Effective Remote Access Strategy
Aug 02, 2022
How Ransomware Works - And What You Can Do to Stop It
Jul 14, 2022
Resources
Close
Back
Resources
Reports >
Slideshows >
Tech Library >
Webinars >
White Papers >
Subscribe
Login
/
Register
SEARCH
A minimum of 3 characters are required to be typed in the search bar in order to perform a search.
Announcements
Event
Building & Maintaining an Effective Remote Access Strategy | August 2 Webinar | <REGISTER NOW>
Event
Building & Maintaining Security at the Network Edge | July 28 Webinar | <REGISTER NOW>
Event
How Ransomware Works - And What You Can Do to Stop It | July 14 Webinar | <REGISTER NOW>
Previous
Next
Compliance
Breaking news, news analysis, and expert commentary on cybersecurity risk, and the tools, technologies, and practices for assessing risk.
Communication Is Key to CISO Success
A panel of CISOs at the RSA Conference outlined what a successful first 90-day plan looks like, and it boiled down to effective communication and listening.
June 06, 2022
A panel of CISOs at the RSA Conference outlined what a successful first 90-day plan looks like, and it boiled down to effective communication and listening.
by Becky Bracken, Editor, Dark Reading
June 06, 2022
3 min read
Article
The FDA's New Cybersecurity Guidance for Medical Devices Reminds Us That Safety & Security Go Hand in Hand
The new draft guidance on premarket submissions incorporates quality system regulations and doubles down on a life-cycle approach to product security.
May 26, 2022
The new draft guidance on premarket submissions incorporates quality system regulations and doubles down on a life-cycle approach to product security.
by Roman Kesler, VP of Research, Cybellum
May 26, 2022
5 min read
Article
Act Now: Leveraging PCI Compliance to Improve Security
Let the threat landscape guide your company's timeline for complying with new data security standards for credit cards. Use the phase-in time to improve security overall — security as a process — not just comply with new standards.
May 26, 2022
Let the threat landscape guide your company's timeline for complying with new data security standards for credit cards. Use the phase-in time to improve security overall — security as a process — not just comply with new standards.
by Tim Erlin, VP of Product Management & Strategy, Tripwire
May 26, 2022
5 min read
Article
Ikea Canada Breach Exposes 95K Customer Records
An unauthorized employee accessed Ikea's customer database, but it's unclear what the intention was.
May 06, 2022
An unauthorized employee accessed Ikea's customer database, but it's unclear what the intention was.
by Dark Reading Staff, Dark Reading
May 06, 2022
1 min read
Article
ByteChek Founder AJ Yawn Brings Discipline to Everything He Does
Security Pro File: The former Army captain, whose security startup is on an upward trajectory, works hard to "make compliance suck less."
April 08, 2022
Security Pro File: The former Army captain, whose security startup is on an upward trajectory, works hard to "make compliance suck less."
by Carlo Massimo, Freelance Writer
April 08, 2022
7 min read
Article
What You Need to Know About PCI DSS 4.0's New Requirements
The updated security payment standard's goal is to “address emerging threats and technologies and enable innovative methods to combat new threats” to customer payment information, the PCI Security Standards Council says.
April 01, 2022
The updated security payment standard's goal is to “address emerging threats and technologies and enable innovative methods to combat new threats” to customer payment information, the PCI Security Standards Council says.
by Anastasios Arampatzis, Writer, Bora Design
April 01, 2022
5 min read
Article
Security's Life Cycle Isn't the Developers' Life Cycle
Whether it's PCI-DSS, SSDLC, or GDPR, the criteria that security standards expect businesses to uphold are neither realistic or feasible.
March 28, 2022
Whether it's PCI-DSS, SSDLC, or GDPR, the criteria that security standards expect businesses to uphold are neither realistic or feasible.
by Chen Gour-Arie, Chief Architect, Enso Security
March 28, 2022
5 min read
Article
DORA's Global Reach and Why Enterprises Need to Prepare
The new EU regulation is a response to the rise of ransomware attacks and other new cyberthreats that have proliferated in the wake of the global pandemic.
March 04, 2022
The new EU regulation is a response to the rise of ransomware attacks and other new cyberthreats that have proliferated in the wake of the global pandemic.
by Ilias Chantzos, Global Privacy Officer and Head of EMEA Government Affairs, Broadcom
March 04, 2022
5 min read
Article
Microsoft Debuts Unified Service for Multicloud ID Management
With nine in 10 companies adopting a multicloud strategy, service providers are focused on finding ways to support the management and security efforts of businesses that rely on multiple cloud resources.
February 23, 2022
With nine in 10 companies adopting a multicloud strategy, service providers are focused on finding ways to support the management and security efforts of businesses that rely on multiple cloud resources.
by Robert Lemos, Contributing Writer
February 23, 2022
4 min read
Article
Preparing for the Next Cybersecurity Epidemic: Deepfakes
Using blockchain, multifactor authentication, or signatures can help boost authentication security and reduce fraud.
January 19, 2022
Using blockchain, multifactor authentication, or signatures can help boost authentication security and reduce fraud.
by Elaine Lee, Principal Data Scientist, Cybergraph team, Mimecast
January 19, 2022
4 min read
Article
Name That Toon: Nowhere to Hide
Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card.
January 18, 2022
Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card.
by John Klossner, Cartoonist
January 18, 2022
1 min read
Article
Breach Response Shift: More Lawyers, Less Cyber-Insurance Coverage
Companies are more likely to rely on outside attorneys to handle cyber response in order to contain potential lawsuits. Meanwhile, cyber-insurance premiums are rising but covering less.
January 10, 2022
Companies are more likely to rely on outside attorneys to handle cyber response in order to contain potential lawsuits. Meanwhile, cyber-insurance premiums are rising but covering less.
by Robert Lemos, Contributing Writer
January 10, 2022
5 min read
Article
Why Cyber Due Diligence Is Essential to the M&A Process
That announcement may feel good, but if your prospective acquisition's cybersecurity levels are substandard, it might be best to hold off.
December 29, 2021
That announcement may feel good, but if your prospective acquisition's cybersecurity levels are substandard, it might be best to hold off.
by Jim Crowley, CEO at Industrial Defender
December 29, 2021
5 min read
Article
Is Data Security Worthless if the Data Life Cycle Lacks Clarity?
If you cannot track, access, or audit data at every stage of the process, then you can't claim your data is secure.
December 17, 2021
If you cannot track, access, or audit data at every stage of the process, then you can't claim your data is secure.
by François Amigorena, Founder & CEO, IS Decisions
December 17, 2021
4 min read
Article
Dear Congress: It's Complicated. Please Consider This When Crafting New Cybersecurity Legislation
As mandatory reporting bills work their way through the halls of Congress, what should businesses do to prepare for this pending legislation?
December 16, 2021
As mandatory reporting bills work their way through the halls of Congress, what should businesses do to prepare for this pending legislation?
by Lyndon Brown, Chief Strategy Officer, Pondurance
December 16, 2021
5 min read
Article