informa

Tech News and Analysis

Emerging Tech

Automating Response Is a Marathon, Not a Sprint
Organizations should balance process automation and human interaction to meet their unique security requirements.
January 20, 2022
Organizations should balance process automation and human interaction to meet their unique security requirements.
by Antonio Sanchez, Senior Product Marketing Manager, Alert Logic
January 20, 2022
4 min read
Article
Cloud Identity Startup Permiso Launches With $10M Seed
Permiso's co-founders say the No. 1 problem in the cloud is identity, and their platform is designed to tackle the notoriously difficult challenge of monitoring the activity of those identities.
January 18, 2022
Permiso's co-founders say the No. 1 problem in the cloud is identity, and their platform is designed to tackle the notoriously difficult challenge of monitoring the activity of those identities.
by Dark Reading Staff, Dark Reading
January 18, 2022
2 min read
Article
Enterprise Security at CES 2022 Marked by IoT, Biometrics, and PC Chips
Amid the onslaught of mostly consumer-oriented announcements in Las Vegas, a few key items pertaining to enterprise security emerged.
January 11, 2022
Amid the onslaught of mostly consumer-oriented announcements in Las Vegas, a few key items pertaining to enterprise security emerged.
by Seth Colaner, freelance writer
January 11, 2022
5 min read
Article
CrowdStrike Incorporates Intel CPU Telemetry Into Falcon Sensor
The Falcon sensor uses Intel PT telemetry to identify suspicious operations associated with hard-to-detect exploit techniques.
January 04, 2022
The Falcon sensor uses Intel PT telemetry to identify suspicious operations associated with hard-to-detect exploit techniques.
by Dark Reading Staff, Dark Reading
January 04, 2022
2 min read
Article
6 Security-Tech Innovations We're Excited to See in 2022
The details on cybersecurity technologies that we expect to advance rapidly in the coming year.
December 27, 2021
The details on cybersecurity technologies that we expect to advance rapidly in the coming year.
by Ericka Chickowski, Contributing Writer
December 27, 2021
1 min read
Article
Rise in API-Based Attacks Underscore Investments in New Tools
Noname Security's Series C fundraising tips the startup to over $1 billion in valuation -- a sign that organizations are beginning to look for API security tools and investors are looking for innovation in the space.
December 16, 2021
Noname Security's Series C fundraising tips the startup to over $1 billion in valuation -- a sign that organizations are beginning to look for API security tools and investors are looking for innovation in the space.
by Fahmida Y. Rashid, Features Editor, Dark Reading
December 16, 2021
4 min read
Article
New Firefox Sandbox Isolates Third-Party Libraries
RLBox can be used to protect web browsers and other software applications from vulnerabilities in subcomponents and libraries.
December 10, 2021
RLBox can be used to protect web browsers and other software applications from vulnerabilities in subcomponents and libraries.
by Fahmida Y. Rashid, Features Editor, Dark Reading
December 10, 2021
3 min read
Article
Baffle's Data Privacy Cloud Protects Data for Amazon Redshift Customers
Amazon Redshift customers can use Baffle’s Data Privacy Cloud to secure the data pipeline as source data is migrated to Redshift and used for data analytics.
November 23, 2021
Amazon Redshift customers can use Baffle’s Data Privacy Cloud to secure the data pipeline as source data is migrated to Redshift and used for data analytics.
by Dark Reading Staff, Dark Reading
November 23, 2021
3 min read
Article
Pentagon Partners With GreyNoise to Investigate Internet Scans
With a new five-year, $30 million contract, GreyNoise Intelligence will assist multiple teams across the Department of Defense in a defensive capacity.
November 23, 2021
With a new five-year, $30 million contract, GreyNoise Intelligence will assist multiple teams across the Department of Defense in a defensive capacity.
by Fahmida Y. Rashid, Features Editor, Dark Reading
November 23, 2021
4 min read
Article
Stop Zero-Day Ransomware Cold With AI
AI can help recognize ransomware attacks and stop them at computer speed.
October 28, 2021
AI can help recognize ransomware attacks and stop them at computer speed.
by Max Heinemeyer, Director of Threat Hunting, Darktrace
October 28, 2021
5 min read
Article
Proposed HTTPA Protocol Uses TEEs to Secure the Web
Intel researchers describe how Trusted Execution Environments can enhance HTTPS and boost Web security.
October 20, 2021
Intel researchers describe how Trusted Execution Environments can enhance HTTPS and boost Web security.
by Dark Reading Staff, Dark Reading
October 20, 2021
3 min read
Article
Query.ai Closes $15M Series A for Security Investigations Tool
The funding will support product development for Query.AI's browser-based security investigations tool.
October 19, 2021
The funding will support product development for Query.AI's browser-based security investigations tool.
by Dark Reading Staff, Dark Reading
October 19, 2021
2 min read
Article
7 Cross-Industry Technology Trends That Will Disrupt the World
Recent McKinsey analysis examines which technologies will have the most momentum in the next 10 years. These are the trends security teams need to know to protect their organizations effectively.
October 18, 2021
Recent McKinsey analysis examines which technologies will have the most momentum in the next 10 years. These are the trends security teams need to know to protect their organizations effectively.
by Dark Reading Staff, Dark Reading
October 18, 2021
5 min read
Article
How AI Can Stop Zero-Day Ransomware
Ransomware attacks are unpredictable. AI is better at figuring out what looks malicious and abnormal than humans will ever be.
October 15, 2021
Ransomware attacks are unpredictable. AI is better at figuring out what looks malicious and abnormal than humans will ever be.
by Fahmida Y. Rashid, Features Editor, Dark Reading
October 15, 2021
9 min read
Article
Fugue Adds Kubernetes Security Checks to Secure Infrastructure-as-Code
Developers can apply proper security controls as they programmatically deploy Kubernetes clusters.
October 13, 2021
Developers can apply proper security controls as they programmatically deploy Kubernetes clusters.
by Dark Reading Staff, Dark Reading
October 13, 2021
2 min read
Article