The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches
Cloud
ICS/OT
Remote Workforce
Perimeter
Analytics
Security Monitoring
Security Monitoring
App Sec
Database Security
Database Security
Risk
Compliance
Compliance
Threat Intelligence
Endpoint
Authentication
Mobile Security
Privacy
Authentication
Mobile Security
Privacy
Vulnerabilities / Threats
Advanced Threats
Insider Threats
Vulnerability Management
Advanced Threats
Insider Threats
Vulnerability Management
Operations
Identity & Access Management
Careers & People
Identity & Access Management
Careers & People
Physical Security
IoT
DR Global
Middle East & Africa
Middle East & Africa
Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
SecTor - Canada's IT Security Conference Oct 23-26 - Learn More
Anatomy of a Data Breach - A Dark Reading June 22 Event
Webinars
Here's What Zero Trust Really Means
Jun 13, 2023
Mastering Endpoint Security: The Power of Least Privilege
Jun 20, 2023
Resources
Close
Back
Resources
Dark Reading Library >
Webinars >
Reports >
Slideshows >
White Papers >
Partner Perspectives: Microsoft
Tech Library >
Newsletter Sign-Up
The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches
Cloud
ICS/OT
Remote Workforce
Perimeter
Analytics
Security Monitoring
Security Monitoring
App Sec
Database Security
Database Security
Risk
Compliance
Compliance
Threat Intelligence
Endpoint
Authentication
Mobile Security
Privacy
Authentication
Mobile Security
Privacy
Vulnerabilities / Threats
Advanced Threats
Insider Threats
Vulnerability Management
Advanced Threats
Insider Threats
Vulnerability Management
Operations
Identity & Access Management
Careers & People
Identity & Access Management
Careers & People
Physical Security
IoT
DR Global
Middle East & Africa
Middle East & Africa
Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
SecTor - Canada's IT Security Conference Oct 23-26 - Learn More
Anatomy of a Data Breach - A Dark Reading June 22 Event
Webinars
Here's What Zero Trust Really Means
Jun 13, 2023
Mastering Endpoint Security: The Power of Least Privilege
Jun 20, 2023
Resources
Close
Back
Resources
Dark Reading Library >
Webinars >
Reports >
Slideshows >
White Papers >
Partner Perspectives: Microsoft
Tech Library >
The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches
Cloud
ICS/OT
Remote Workforce
Perimeter
Analytics
Security Monitoring
Security Monitoring
App Sec
Database Security
Database Security
Risk
Compliance
Compliance
Threat Intelligence
Endpoint
Authentication
Mobile Security
Privacy
Authentication
Mobile Security
Privacy
Vulnerabilities / Threats
Advanced Threats
Insider Threats
Vulnerability Management
Advanced Threats
Insider Threats
Vulnerability Management
Operations
Identity & Access Management
Careers & People
Identity & Access Management
Careers & People
Physical Security
IoT
DR Global
Middle East & Africa
Middle East & Africa
Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
SecTor - Canada's IT Security Conference Oct 23-26 - Learn More
Anatomy of a Data Breach - A Dark Reading June 22 Event
Webinars
Here's What Zero Trust Really Means
Jun 13, 2023
Mastering Endpoint Security: The Power of Least Privilege
Jun 20, 2023
Resources
Close
Back
Resources
Dark Reading Library >
Webinars >
Reports >
Slideshows >
White Papers >
Partner Perspectives: Microsoft
Tech Library >
Newsletter Sign-Up
SEARCH
A minimum of 3 characters are required to be typed in the search bar in order to perform a search.
Announcements
Event
How to Launch a Threat Hunting Program | Webinar <REGISTER>
Event
How to Accelerate XDR Outcomes: Bridging the Gap Between Network and Endpoint | Webinar <REGISTER>
Report
Black Hat USA 2022 Attendee Report | Supply Chain & Cloud Security Risks Are Top of Mind | <READ IT NOW>
Previous
Next
Commentary
5 Tips for Modernizing Your Security Operations Center Strategy
A solid, dependable SOC strategy that is scalable in the face of various security threats is essential to reduce cybersecurity risks to your business.
June 09, 2023
A solid, dependable SOC strategy that is scalable in the face of various security threats is essential to reduce cybersecurity risks to your business.
by Andrew Hollister, CISO, LogRhythm; VP, LogRhythm Labs
June 09, 2023
5 MIN READ
Article
The Growing Cyber Threats of Generative AI: Who's Accountable?
In the wrong hands, malicious actors can use chatbots to unleash sophisticated cyberattacks that could have devastating consequences.
June 08, 2023
In the wrong hands, malicious actors can use chatbots to unleash sophisticated cyberattacks that could have devastating consequences.
by Zia Muhammad, Ph.D. Scholar, North Dakota State University
June 08, 2023
4 MIN READ
Article
Fighting AI-Powered Fraud: Let the Battle of the Machines Begin
As cybercriminals tap the power of machine learning and generative AI to outwit fraud-detection systems, online fraud-prevention technologies must evolve accordingly.
June 08, 2023
As cybercriminals tap the power of machine learning and generative AI to outwit fraud-detection systems, online fraud-prevention technologies must evolve accordingly.
by Dr. Ananth Gundabattula, Co-Founder, Darwinium
June 08, 2023
4 MIN READ
Article
Cyber Essentialism & 'Doing Less With Less'
Cybersecurity benefits from a focus on the vital few chores rather than the trivial many. Find the "right things" to encourage strategic thinking, then move the culture needle to promote that policy.
June 07, 2023
Cybersecurity benefits from a focus on the vital few chores rather than the trivial many. Find the "right things" to encourage strategic thinking, then move the culture needle to promote that policy.
by Ben Johnson, Co-Founder and CTO, Obsidian Security
June 07, 2023
4 MIN READ
Article
The Case for a Federal Cyber-Insurance Backstop
By stepping in to provide aid, the federal government could help protect companies, insurers, and the economy from the impact of a widespread, catastrophic cyberattack.
June 07, 2023
By stepping in to provide aid, the federal government could help protect companies, insurers, and the economy from the impact of a widespread, catastrophic cyberattack.
by Monica Shokrai, Head of Business Risk & Insurance, Google Cloud
June 07, 2023
4 MIN READ
Article
Filling the Gaps: How to Secure the Future of Hybrid Work
By enhancing remote management and adopting hardware-enforced security, productivity can continue without inviting extra cyber-risk.
June 06, 2023
By enhancing remote management and adopting hardware-enforced security, productivity can continue without inviting extra cyber-risk.
by Ian Pratt, Global Head of Security for Personal Systems, HP Inc.
June 06, 2023
4 MIN READ
Article
After 'Inception' Attack, New Due Diligence Requirements Are Needed
To stem supply chain attacks, forging a new dynamic of shared cybersecurity hygiene accountability is the right thing to do.
June 05, 2023
To stem supply chain attacks, forging a new dynamic of shared cybersecurity hygiene accountability is the right thing to do.
by Carlos Morales, Senior Vice President of Solutions, Vercara
June 05, 2023
4 MIN READ
Article
Want Sustainable Security? Find Middle Ground Between Tech & Education
The winning recipe for sustainable security combines strategic user education and tactical automation of well-constructed processes.
June 02, 2023
The winning recipe for sustainable security combines strategic user education and tactical automation of well-constructed processes.
by Johanna Baum, CEO & Founder, Strategic Security Solutions (S3)
June 02, 2023
4 MIN READ
Article
Where SBOMs Stand Today
It's been two years since Executive Order 14028. By using SBOMs as a standard, organizations can manage software risks, protect their reputation, and improve their cybersecurity posture.
June 01, 2023
It's been two years since Executive Order 14028. By using SBOMs as a standard, organizations can manage software risks, protect their reputation, and improve their cybersecurity posture.
by Liran Tancman, CEO & Co-Founder, Rezilion
June 01, 2023
4 MIN READ
Article
Dark Reading Launches Inaugural CISO Advisory Board
Ten chief information security officers from a variety of verticals will provide valuable insights to Dark Reading on what they see as the industry's most pressing issues.
June 01, 2023
Ten chief information security officers from a variety of verticals will provide valuable insights to Dark Reading on what they see as the industry's most pressing issues.
by Kelly Jackson Higgins, Editor-in-Chief, Dark Reading
June 01, 2023
2 MIN READ
Article
Investment May Be Down, but Cybersecurity Remains a Hot Sector
There's still a great deal of capital available for innovative companies helping businesses secure their IT environments.
May 31, 2023
There's still a great deal of capital available for innovative companies helping businesses secure their IT environments.
by Dave DeWalt, Founder & CEO, NightDragon
May 31, 2023
3 MIN READ
Article
Focus Security Efforts on Choke Points, Not Visibility
By finding the places where attack paths converge, you can slash multiple exposures in one fix for more efficient remediation.
May 31, 2023
By finding the places where attack paths converge, you can slash multiple exposures in one fix for more efficient remediation.
by Menachem Shafran, Senior Vice President of Product and Innovation, XM Cyber
May 31, 2023
4 MIN READ
Article
Pentagon Leaks Emphasize the Need for a Trusted Workforce
Tightening access controls and security clearance alone won't prevent insider threat risks motivated by lack of trust or loyalty.
May 30, 2023
Tightening access controls and security clearance alone won't prevent insider threat risks motivated by lack of trust or loyalty.
by Kellie Roessler, Insider Risk Advocate & Author, DTEX Insider Intelligence & Investigations (i3) Team
May 30, 2023
4 MIN READ
Article
How Safe Is Your Wearable Device?
To mitigate risk, both developers and users must include security principles and technologies as core foundations in new devices.
May 26, 2023
To mitigate risk, both developers and users must include security principles and technologies as core foundations in new devices.
by Ján Lunter, CEO & CTO, Innovatrics
May 26, 2023
4 MIN READ
Article
Dangerous Regions: Isolating Branch Offices in High-Risk Countries
Organizations must be cautious about how they interact with other regions around the world in order to operate safely in an at-times adversarial landscape.
May 25, 2023
Organizations must be cautious about how they interact with other regions around the world in order to operate safely in an at-times adversarial landscape.
by John A. Smith, CEO, Conversant Group
May 25, 2023
4 MIN READ
Article