informa
/

Database Security

Name That Toon: Buzzard Bestie
Feeling creative? Come up with a clever caption for this month's contest, and our panel of experts will reward the winne...
July 20, 2021
Feeling creative? Come up with a clever caption for this month's contest, and our panel of experts will reward the winne...
by John Klossner, Cartoonist
July 20, 2021
1 min read
Article
Navigating Active Directory Security: Dangers and Defenses
Microsoft Active Directory, ubiquitous across enterprises, has long been a primary target for attackers seeking network ...
July 12, 2021
Microsoft Active Directory, ubiquitous across enterprises, has long been a primary target for attackers seeking network ...
by Kelly Sheridan, Senior Editor
July 12, 2021
9 min read
Article
Workers Careless in Sharing & Reusing Corporate Secrets
A new survey shows leaked enterprise secrets costs companies millions of dollars each year.
July 06, 2021
A new survey shows leaked enterprise secrets costs companies millions of dollars each year.
by Dark Reading Staff, Dark Reading
July 06, 2021
2 min read
Article
Cyber Analytics Database Exposed 5 Billion Records Online
In an ironic twist, Cognyte's data alerts customers to third-party data exposures.
June 14, 2021
In an ironic twist, Cognyte's data alerts customers to third-party data exposures.
by Dark Reading Staff, Dark Reading
June 14, 2021
1 min read
Article
In Appreciation: Dan Kaminsky
Beloved security industry leader and researcher passes away unexpectedly at the age of 42.
April 26, 2021
Beloved security industry leader and researcher passes away unexpectedly at the age of 42.
by:
April 26, 2021
5 min read
Article
Name That Toon: Greetings, Earthlings
Caption time! Come up with something out of this world for Dark Reading's latest contest, and our panel of experts will ...
April 22, 2021
Caption time! Come up with something out of this world for Dark Reading's latest contest, and our panel of experts will ...
by:
April 22, 2021
1 min read
Article
Web Application Attacks Grow Reliant on Automated Tools
Attackers often use automation in fuzzing attacks, injection attacks, fake bots, and application DDoS attacks.
April 02, 2021
Attackers often use automation in fuzzing attacks, injection attacks, fake bots, and application DDoS attacks.
by Kelly Sheridan, Senior Editor
April 02, 2021
4 min read
Article
In the Rush to Embrace Hybrid Cloud, Don't Forget About Security
Cloud service providers typically only secure the infrastructure itself, while customers are responsible for their data ...
March 30, 2021
Cloud service providers typically only secure the infrastructure itself, while customers are responsible for their data ...
by Ganesh Pai, CEO, Uptycs
March 30, 2021
5 min read
Article
Intel, Microsoft Aim for Breakthrough in DARPA Encryption Project
Together, the vendor giants aim to make "in use" encryption -- also known as "fully homomorphic encryption" -- economica...
March 08, 2021
Together, the vendor giants aim to make "in use" encryption -- also known as "fully homomorphic encryption" -- economica...
by Robert Lemos, Contributing Writer
March 08, 2021
4 min read
Article
How SolarWinds Busted Up Our Assumptions About Code Signing
With so much automation in code writing process, results are rarely double-checked, which opens the door to vulnerabilit...
March 03, 2021
With so much automation in code writing process, results are rarely double-checked, which opens the door to vulnerabilit...
by Dr. Jethro Beekman, Technical Director
March 03, 2021
5 min read
Article
Medical Imaging Leaks Highlight Unhealthy Security Practices
More than 45 million unique images, such as X-rays and MRI scans, are accessible to anyone on the Internet, security fir...
December 15, 2020
More than 45 million unique images, such as X-rays and MRI scans, are accessible to anyone on the Internet, security fir...
by Robert Lemos, Contributing Writer
December 15, 2020
4 min read
Article
5 Steps Every Company Should Take to Avoid Data Theft Risk
It's never been easier for employees to download company data and take it with them to their next gig.
November 12, 2020
It's never been easier for employees to download company data and take it with them to their next gig.
by Bradford K. Newman, Principal, Litigation / Chair of North America Trade Secrets Practice
November 12, 2020
5 min read
Article
3 Tips For Successfully Running Tech Outside the IT Department
When marketing opts for "extra-departmental IT," coordination and communication are required to keep things secured.
November 11, 2020
When marketing opts for "extra-departmental IT," coordination and communication are required to keep things secured.
by Patrick Kehoe, Chief Marketing and Strategy Officer, Coalfire
November 11, 2020
4 min read
Article
Ubiq Rolls Out Encryption-as-a-Service Platform Aimed at Developers
A few lines of code and two API calls is all that it takes for developers to add encryption to their applications, start...
October 21, 2020
A few lines of code and two API calls is all that it takes for developers to add encryption to their applications, start...
by Robert Lemos, Contributing Writer
October 21, 2020
4 min read
Article
New Google Search Hacks Push Viruses & Porn
Three incidents demonstrate how cybercriminals leverage the scourge of black-hat search engine optimization to manipulat...
September 22, 2020
Three incidents demonstrate how cybercriminals leverage the scourge of black-hat search engine optimization to manipulat...
by David Balaban, Editor at Privacy-PC.com
September 22, 2020
5 min read
Article