informa
/

Identity & Access Management

Name That Toon: Buzzard Bestie
Feeling creative? Come up with a clever caption for this month's contest, and our panel of experts will reward the winne...
July 20, 2021
Feeling creative? Come up with a clever caption for this month's contest, and our panel of experts will reward the winne...
by John Klossner, Cartoonist
July 20, 2021
1 min read
Article
When Ransomware Comes to (Your) Town
While steps for defending against a ransomware attack vary based on the size of the government entity and the resources ...
July 19, 2021
While steps for defending against a ransomware attack vary based on the size of the government entity and the resources ...
by Derek Prall, Contributing Writer
July 19, 2021
7 min read
Article
Breaking Down the Threat of Going All-In With Microsoft Security
Limit risk by dividing responsibility for infrastructure, tools, and security.
July 19, 2021
Limit risk by dividing responsibility for infrastructure, tools, and security.
by Nat Kausik, CEO and Co-Founder of Bitglass
July 19, 2021
4 min read
Article
Cartoon Caption Winner: Sight Unseen
And the winner of Dark Reading's June contest is ...
July 09, 2021
And the winner of Dark Reading's June contest is ...
by John Klossner, Cartoonist
July 09, 2021
1 min read
Article
Watch for Cybersecurity Games at the Tokyo Olympics
The cybersecurity professionals guarding the Summer Olympics are facing at least as much competition as the athletes, an...
July 02, 2021
The cybersecurity professionals guarding the Summer Olympics are facing at least as much competition as the athletes, an...
by Jessica Amado, Head of Cyber Research at Sepio Systems
July 02, 2021
4 min read
Article
NSA & CISA Issue Warning About Russian GRU Brute-Force Cyberattacks Against US, Global Orgs
Fancy Bear nation-state hacking team add a modern twist on old-school hacking method by using a cluster of Kubernetes so...
July 01, 2021
Fancy Bear nation-state hacking team add a modern twist on old-school hacking method by using a cluster of Kubernetes so...
by Kelly Jackson Higgins, Executive Editor
July 01, 2021
2 min read
Article
New CPU Baseline for Windows 11 Will Ensure Better Security, Microsoft Says
Redmond's latest OS will run only on systems with TPM 2.0 chips.
June 26, 2021
Redmond's latest OS will run only on systems with TPM 2.0 chips.
by Jai Vijayan, Contributing Writer
June 26, 2021
4 min read
Article
Data Privacy Is in 23andMe CSO's DNA
How serious is the company about safeguarding its customers and their genetic information? "We're hiding data even from ...
June 25, 2021
How serious is the company about safeguarding its customers and their genetic information? "We're hiding data even from ...
by Carlo Massimo, Freelance Writer
June 25, 2021
4 min read
Article
School's Out for Summer, but Don't Close the Book on Cybersecurity Training
Strengthening their security posture should be at the top of school IT departments' summer to-do list.
June 25, 2021
Strengthening their security posture should be at the top of school IT departments' summer to-do list.
by Drew Daniels, CIO & CISO, Druva
June 25, 2021
5 min read
Article
What Industrial Control System Vulnerabilities Can Teach Us About Protecting the Supply Chain
Older technologies used in industrial and critical infrastructure leave the sector highly vulnerable to attack, but orga...
June 15, 2021
Older technologies used in industrial and critical infrastructure leave the sector highly vulnerable to attack, but orga...
by Chen Fradkin, Security Researcher at Claroty
June 15, 2021
4 min read
Article
Colonial Pipeline Cyberattack Proves a Single Password Isn't Enough
Since the attack, it's been revealed that it was down to a single password. Yes, ransomware needs to be on your radar --...
June 14, 2021
Since the attack, it's been revealed that it was down to a single password. Yes, ransomware needs to be on your radar --...
by Dark Reading Staff, Dark Reading
June 14, 2021
3 min read
Article
Secure Access Trade-offs for DevSecOps Teams
Thanks to recent advancements in access technologies, everyone can apply identity-based authentication and authorization...
June 11, 2021
Thanks to recent advancements in access technologies, everyone can apply identity-based authentication and authorization...
by Ev Kontsevoy, CEO of Teleport
June 11, 2021
5 min read
Article
Required MFA Is Not Sufficient for Strong Security: Report
Attackers and red teams find multiple ways to bypass poorly deployed MFA in enterprise environments, underscoring how re...
June 09, 2021
Attackers and red teams find multiple ways to bypass poorly deployed MFA in enterprise environments, underscoring how re...
by Robert Lemos, Contributing Writer
June 09, 2021
4 min read
Article
Colonial Pipeline CEO: Ransomware Attack Started via Pilfered 'Legacy' VPN Account
No multifactor authentication was attached to the stolen VPN password used by the attackers, Colonial Pipeline president...
June 08, 2021
No multifactor authentication was attached to the stolen VPN password used by the attackers, Colonial Pipeline president...
by Dark Reading Staff, Dark Reading
June 08, 2021
2 min read
Article
How Employees Can Keep Their 401(k)s Safe From Cybercriminals
As retirement fund balances grow, cybercriminals are becoming more brazen in their efforts to deplete people's savings.
June 08, 2021
As retirement fund balances grow, cybercriminals are becoming more brazen in their efforts to deplete people's savings.
by Matt Lindley, COO and CISO at NINJIO
June 08, 2021
5 min read
Article