informa

DR Technology

Exposure Management? Understanding the Attacker Takes Center Stage
Announcing its exposure management platform, Tenable joins other companies in offering ways — such as attack surface management — to look at business networks through the eyes of attackers.
October 04, 2022
Announcing its exposure management platform, Tenable joins other companies in offering ways — such as attack surface management — to look at business networks through the eyes of attackers.
by Robert Lemos, Contributing Writer, Dark Reading
October 04, 2022
4 MIN READ
Article
Growing Reliance on Cloud Brings New Security Challenges
With organizations expanding their cloud operations, cloud security is imperative to protect applications and data.
October 04, 2022
With organizations expanding their cloud operations, cloud security is imperative to protect applications and data.
by Fahmida Y. Rashid, Managing Editor, Features, Dark Reading
October 04, 2022
3 MIN READ
Article
Worried About the Exchange Zero-Day? Here's What to Do
While organizations wait for an official patch for the two zero-day flaws in Microsoft Exchange, they should scan their networks for signs of exploitation and apply these mitigations.
September 30, 2022
While organizations wait for an official patch for the two zero-day flaws in Microsoft Exchange, they should scan their networks for signs of exploitation and apply these mitigations.
by Dark Reading Staff, Dark Reading
September 30, 2022
3 MIN READ
Article
Intel Hardens Confidential Computing With Project Amber Updates
The chip giant has developed new features and services to make it tougher for malicious hackers and insiders to access sensitive data from applications in the cloud.
September 29, 2022
The chip giant has developed new features and services to make it tougher for malicious hackers and insiders to access sensitive data from applications in the cloud.
by Agam Shah, Contributing Writer
September 29, 2022
4 MIN READ
Article
When Will Cybersecurity Get Its Bloomberg Terminal?
The "single pane of glass" that gathers and correlates all the information security professionals need doesn't exist, so it's up to us to create it.
September 28, 2022
The "single pane of glass" that gathers and correlates all the information security professionals need doesn't exist, so it's up to us to create it.
by Yotam Segev, Co-Founder and CEO, Cyera
September 28, 2022
4 MIN READ
Article
Lessons From the GitHub Cybersecurity Breach
This Tech Tip outlines three steps security teams should take to protect information stored in Salesforce.
September 27, 2022
This Tech Tip outlines three steps security teams should take to protect information stored in Salesforce.
by Veroljub Mihajlovic, Senior Director of Product at Flosum
September 27, 2022
2 MIN READ
Article
How Quantum Physics Leads to Decrypting Common Algorithms
YouTuber minutephysics explains how Shor's algorithm builds on existing formulae like Euclid's algorithm and Fourier transforms to leverage quantum superpositioning and break encryption.
September 26, 2022
YouTuber minutephysics explains how Shor's algorithm builds on existing formulae like Euclid's algorithm and Fourier transforms to leverage quantum superpositioning and break encryption.
by Karen Spiegelman, Features Editor
September 26, 2022
2 MIN READ
Video
Mitigating Risk and Communicating Value in Multicloud Environments
Protecting against risk is a shared responsibility that only gets more complex as you mix the different approaches of common cloud services.
September 23, 2022
Protecting against risk is a shared responsibility that only gets more complex as you mix the different approaches of common cloud services.
by Heath Anderson, Vice President of Information Security & Technology at LogicGate
September 23, 2022
6 MIN READ
Article
Quantify Risk, Calculate ROI
SecurityScorecard's ROI Calculator helps organizations quantify cyber-risk to understand the financial impact of a cyberattack.
September 21, 2022
SecurityScorecard's ROI Calculator helps organizations quantify cyber-risk to understand the financial impact of a cyberattack.
by Nathan Eddy, Contributing Writer, Dark Reading
September 21, 2022
4 MIN READ
Article
Microsoft Brings Zero Trust to Hardware in Windows 11
A stacked combination of hardware and software protects the next version of Windows against the latest generation of firmware threats.
September 21, 2022
A stacked combination of hardware and software protects the next version of Windows against the latest generation of firmware threats.
by Karen Spiegelman, Features Editor
September 21, 2022
4 MIN READ
Article
Cast AI Introduces Cloud Security Insights for Kubernetes
The release augments the company's Kubernetes management platform with free, user-friendly insight on security postures, along with cost monitoring and observability.
September 20, 2022
The release augments the company's Kubernetes management platform with free, user-friendly insight on security postures, along with cost monitoring and observability.
by Nathan Eddy, Contributing Writer, Dark Reading
September 20, 2022
4 MIN READ
Article
Note to Security Vendors: Companies Are Picking Favorites
A stunning three-quarters of companies are looking to consolidate their security products this year, up from 29% in 2020, suggesting fiercer competition among cybersecurity vendors.
September 15, 2022
A stunning three-quarters of companies are looking to consolidate their security products this year, up from 29% in 2020, suggesting fiercer competition among cybersecurity vendors.
by Robert Lemos, Contributing Writer, Dark Reading
September 15, 2022
3 MIN READ
Article
How to Use SSH Keys and 1Password to Sign Git Commits
This Tech Tip walks through the steps to set up signed commits with SSH keys stored in 1Password.
September 14, 2022
This Tech Tip walks through the steps to set up signed commits with SSH keys stored in 1Password.
by Nathan Eddy, Contributing Writer, Dark Reading
September 14, 2022
3 MIN READ
Article
Bishop Fox Releases Cloud Enumeration Tool CloudFox
CloudFox is a command-line tool that helps penetration testers understand unknown cloud environments.
September 13, 2022
CloudFox is a command-line tool that helps penetration testers understand unknown cloud environments.
by Dark Reading Staff, Dark Reading
September 13, 2022
2 MIN READ
Article
How Machine Learning Can Boost Network Visibility for OT Teams
Opswat says its new tool uses neural networks to protect critical environments through AI-assisted asset discovery, network visibility, and risk management.
September 12, 2022
Opswat says its new tool uses neural networks to protect critical environments through AI-assisted asset discovery, network visibility, and risk management.
by Nathan Eddy, Contributing Writer, Dark Reading
September 12, 2022
4 MIN READ
Article