informa

Endpoint

FIDO Alliance Research Tracks Passwordless Authentication as It Moves Mainstream
New Online Authentication Barometer from the FIDO Alliance reveals consumer habits, trends and adoption of authenticatio...
October 18, 2021
New Online Authentication Barometer from the FIDO Alliance reveals consumer habits, trends and adoption of authenticatio...
October 18, 2021
4 min read
Article
NSA, FBI, CISA Issue Advisory on 'BlackMatter' Ransomware
Ransomware has become a "national security issue," NSA director said.
October 18, 2021
Ransomware has become a "national security issue," NSA director said.
by Dark Reading Staff, Dark Reading
October 18, 2021
2 min read
Article
Sinclair Broadcast Group Confirms Ransomware Attack
The US television station operator has revealed certain servers and workstations, as well as office and operational netw...
October 18, 2021
The US television station operator has revealed certain servers and workstations, as well as office and operational netw...
by Dark Reading Staff, Dark Reading
October 18, 2021
2 min read
Article
Cisco Duo Trusted Access Report: More Than 50% of Companies Plan Passwordless Move
Multifactor authentications soar as enterprises move away from passwords to secure hybrid workers.
October 15, 2021
Multifactor authentications soar as enterprises move away from passwords to secure hybrid workers.
October 15, 2021
3 min read
Article
How Security Teams Can Reinforce End-User Awareness
Training programs provide the information, but security teams can reinforce these for better end-user education.
October 14, 2021
Training programs provide the information, but security teams can reinforce these for better end-user education.
by Karen Walsh, Privacy & Compliance Expert
October 14, 2021
4 min read
Article
6 Lessons From the Expiration of the Let's Encrypt Root Certificate
Fallout from the transition highlights the need for organizations to monitor and have processes for updating CA roots, e...
October 14, 2021
Fallout from the transition highlights the need for organizations to monitor and have processes for updating CA roots, e...
by Jai Vijayan, Contributing Writer
October 14, 2021
1 min read
Article
VirusTotal Shares Data on Ransomware Activity
Google's online malware scanning service analyzed 80 million ransomware samples that were uploaded in the past year-and-...
October 13, 2021
Google's online malware scanning service analyzed 80 million ransomware samples that were uploaded in the past year-and-...
by Kelly Jackson Higgins, Executive Editor
October 13, 2021
2 min read
Article
Microsoft Fixes Zero-Day Flaw in Win32 Driver
A previously known threat actor is using the flaw in a broad cyber-espionage campaign, security vendor warns.
October 12, 2021
A previously known threat actor is using the flaw in a broad cyber-espionage campaign, security vendor warns.
by Jai Vijayan, Contributing Writer
October 12, 2021
5 min read
Article
New CrowdXDR Alliance Defines Data Exchange Standard for XDR
Google Cloud, Okta, ServiceNow, Zscaler, Netskope, Proofpoint, Extrahop, Mimecast, Claroty, and Corelight have joined th...
October 12, 2021
Google Cloud, Okta, ServiceNow, Zscaler, Netskope, Proofpoint, Extrahop, Mimecast, Claroty, and Corelight have joined th...
by Dark Reading Staff, Dark Reading
October 12, 2021
3 min read
Article
IDrive Remote Desktop Offers Protection from RDP Cyberattacks and Vulnerabilities
Remote Desktop aims to solve vulnerability issues with RDP by implementing robust access and security controls.
October 11, 2021
Remote Desktop aims to solve vulnerability issues with RDP by implementing robust access and security controls.
October 11, 2021
3 min read
Article
The 5 Phases of Zero-Trust Adoption
Zero trust aims to replace implicit trust with explicit, continuously adaptive trust across users, devices, networks, ap...
October 11, 2021
Zero trust aims to replace implicit trust with explicit, continuously adaptive trust across users, devices, networks, ap...
by Steve Riley, Technical Leader, Netskope Field CTO
October 11, 2021
6 min read
Article
Applying Behavioral Psychology to Strengthen Your Incident Response Team
A deep-dive study on the inner workings of incident response teams leads to a framework to apply behavioral psychology p...
October 11, 2021
A deep-dive study on the inner workings of incident response teams leads to a framework to apply behavioral psychology p...
by Kelly Sheridan, Senior Editor
October 11, 2021
5 min read
Article
Hardware Bolsters Medical Device Security
New microprocessor technologies like secure enclaves and cryptography acceleration enable hardware to better safeguard m...
October 08, 2021
New microprocessor technologies like secure enclaves and cryptography acceleration enable hardware to better safeguard m...
by Stephanie Domas, Director Strategic Security & Communications at Intel
October 08, 2021
5 min read
Article
HP Extends Security Features to Work-from-Home Devices
HP aims to let admins secure work-from-home endpoints by extending cloud security management that can remotely track, de...
October 07, 2021
HP aims to let admins secure work-from-home endpoints by extending cloud security management that can remotely track, de...
by Steve Zurier, Contributing Writer
October 07, 2021
4 min read
Article
Microsoft: 58% of Nation-State Cyberattacks Come From Russia
A wealth of Microsoft data highlights trends in nation-state activity, hybrid workforce security, disinformation, and su...
October 07, 2021
A wealth of Microsoft data highlights trends in nation-state activity, hybrid workforce security, disinformation, and su...
by Kelly Sheridan, Senior Editor
October 07, 2021
6 min read
Article