The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches
Cloud
ICS/OT
Remote Workforce
Perimeter
Analytics
Security Monitoring
Security Monitoring
App Sec
Database Security
Database Security
Risk
Compliance
Compliance
Threat Intelligence
Endpoint
Authentication
Mobile Security
Privacy
Authentication
Mobile Security
Privacy
Vulnerabilities / Threats
Advanced Threats
Insider Threats
Vulnerability Management
Advanced Threats
Insider Threats
Vulnerability Management
Operations
Identity & Access Management
Careers & People
Identity & Access Management
Careers & People
Physical Security
IoT
Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
Black Hat USA - August 5-10 - Learn More
Black Hat Asia - May 9-12 - Learn More
Webinars
How Applications Are Attacked: A Year in Application Security
Apr 04, 2023
Managing Identity in the Cloud
Apr 05, 2023
Resources
Close
Back
Resources
Dark Reading Library >
Webinars >
Reports >
Slideshows >
White Papers >
Partner Perspectives: Microsoft
Tech Library >
Newsletter
The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches
Cloud
ICS/OT
Remote Workforce
Perimeter
Analytics
Security Monitoring
Security Monitoring
App Sec
Database Security
Database Security
Risk
Compliance
Compliance
Threat Intelligence
Endpoint
Authentication
Mobile Security
Privacy
Authentication
Mobile Security
Privacy
Vulnerabilities / Threats
Advanced Threats
Insider Threats
Vulnerability Management
Advanced Threats
Insider Threats
Vulnerability Management
Operations
Identity & Access Management
Careers & People
Identity & Access Management
Careers & People
Physical Security
IoT
Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
Black Hat USA - August 5-10 - Learn More
Black Hat Asia - May 9-12 - Learn More
Webinars
How Applications Are Attacked: A Year in Application Security
Apr 04, 2023
Managing Identity in the Cloud
Apr 05, 2023
Resources
Close
Back
Resources
Dark Reading Library >
Webinars >
Reports >
Slideshows >
White Papers >
Partner Perspectives: Microsoft
Tech Library >
The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches
Cloud
ICS/OT
Remote Workforce
Perimeter
Analytics
Security Monitoring
Security Monitoring
App Sec
Database Security
Database Security
Risk
Compliance
Compliance
Threat Intelligence
Endpoint
Authentication
Mobile Security
Privacy
Authentication
Mobile Security
Privacy
Vulnerabilities / Threats
Advanced Threats
Insider Threats
Vulnerability Management
Advanced Threats
Insider Threats
Vulnerability Management
Operations
Identity & Access Management
Careers & People
Identity & Access Management
Careers & People
Physical Security
IoT
Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
Black Hat USA - August 5-10 - Learn More
Black Hat Asia - May 9-12 - Learn More
Webinars
How Applications Are Attacked: A Year in Application Security
Apr 04, 2023
Managing Identity in the Cloud
Apr 05, 2023
Resources
Close
Back
Resources
Dark Reading Library >
Webinars >
Reports >
Slideshows >
White Papers >
Partner Perspectives: Microsoft
Tech Library >
Newsletter
SEARCH
A minimum of 3 characters are required to be typed in the search bar in order to perform a search.
Announcements
Event
How to Launch a Threat Hunting Program | Webinar <REGISTER>
Event
How to Accelerate XDR Outcomes: Bridging the Gap Between Network and Endpoint | Webinar <REGISTER>
Report
Black Hat USA 2022 Attendee Report | Supply Chain & Cloud Security Risks Are Top of Mind | <READ IT NOW>
Previous
Next
DR Technology
Microsoft Security Copilot Uses GPT-4 to Beef Up Security Incident Response
Microsoft's new AI assistant tool helps cybersecurity teams investigate security incidents and hunt for threats.
March 29, 2023
Microsoft's new AI assistant tool helps cybersecurity teams investigate security incidents and hunt for threats.
by Fahmida Y. Rashid, Managing Editor, Features, Dark Reading
March 29, 2023
4 MIN READ
Article
Drive to Pervasive Encryption Boosts Key Management
Key vaults, aka key-management-as-a-service (KMaaS), promise to allow companies to encrypt sensitive data across cloud and third parties with granular control.
March 27, 2023
Key vaults, aka key-management-as-a-service (KMaaS), promise to allow companies to encrypt sensitive data across cloud and third parties with granular control.
by Robert Lemos, Contributing Writer, Dark Reading
March 27, 2023
5 MIN READ
Article
IAM Startup Aembit Secures How Workloads Connect to Services
Aembit launches from stealth with a cloud-based identity access management platform for enterprise workloads.
March 21, 2023
Aembit launches from stealth with a cloud-based identity access management platform for enterprise workloads.
by Fahmida Y. Rashid, Managing Editor, Features, Dark Reading
March 21, 2023
2 MIN READ
Article
Technology Firms Delivering Much-Sought Encryption-in-Use
If the approaches stand up to scrutiny, companies may soon be able to encrypt most databases in a way that allows using data without the need to decrypt to plaintext.
March 17, 2023
If the approaches stand up to scrutiny, companies may soon be able to encrypt most databases in a way that allows using data without the need to decrypt to plaintext.
by Robert Lemos, Contributing Writer, Dark Reading
March 17, 2023
5 MIN READ
Article
Orgs Have a Long Way to Go in Securing Remote Workforce
Organizations recognize that they are responsible for protecting remote workers from cyber threats, but they have a long way to go in deploying the necessary security technologies.
March 14, 2023
Organizations recognize that they are responsible for protecting remote workers from cyber threats, but they have a long way to go in deploying the necessary security technologies.
by Dark Reading Staff, Dark Reading
March 14, 2023
2 MIN READ
Article
Tech Giants Go Cloud-Native Shopping
Cisco’s acquisition of cloud-native firewall provider Valtix and HPE’s deal to buy SSE provider Axis Security fill gaps in their existing portfolios.
March 08, 2023
Cisco’s acquisition of cloud-native firewall provider Valtix and HPE’s deal to buy SSE provider Axis Security fill gaps in their existing portfolios.
by Jeffrey Schwartz, Contributing Writer, Dark Reading
March 08, 2023
4 MIN READ
Article
Machine Learning Improves Prediction of Exploited Vulnerabilities
The third iteration of the Exploit Prediction Scoring System (EPSS) performs 82% better than previous versions, giving companies a better tool for evaluating vulnerabilities and prioritizing patching.
March 07, 2023
The third iteration of the Exploit Prediction Scoring System (EPSS) performs 82% better than previous versions, giving companies a better tool for evaluating vulnerabilities and prioritizing patching.
by Robert Lemos, Contributing Writer, Dark Reading
March 07, 2023
5 MIN READ
Article
3 Ways Security Teams Can Use IP Data Context
Innocently or not, residential proxy networks can obscure the actual geolocation of an access point. Here's why that's not great and what you can do about it.
March 03, 2023
Innocently or not, residential proxy networks can obscure the actual geolocation of an access point. Here's why that's not great and what you can do about it.
by Jonathan Tomek, VP of Research and Development, Digital Element
March 03, 2023
4 MIN READ
Article
IBM Contributes Supply Chain Security Tools to OWASP
License Scanner and SBOM Utility will boost the capabilities of OWASP's CycloneDX Software Bill of Materials standard.
March 03, 2023
License Scanner and SBOM Utility will boost the capabilities of OWASP's CycloneDX Software Bill of Materials standard.
by Jeffrey Schwartz, Contributing Writer, Dark Reading
March 03, 2023
4 MIN READ
Article
How to Reduce Code Risk Using Pipelineless Security
The exposure and exploitation of hardcoded secrets continues to drive software supply chain attacks. One solution: zero new hardcoded secrets.
February 27, 2023
The exposure and exploitation of hardcoded secrets continues to drive software supply chain attacks. One solution: zero new hardcoded secrets.
by Nir Valtman, Co-Founder & CEO, Arnica
February 27, 2023
5 MIN READ
Article
Tackling Software Supply Chain Issues With CNAPP
The cloud-native application protection platform market is expanding as security teams look to protect their applications and the software supply chain.
February 24, 2023
The cloud-native application protection platform market is expanding as security teams look to protect their applications and the software supply chain.
by Jeffrey Schwartz, Contributing Writer, Dark Reading
February 24, 2023
3 MIN READ
Article
87% of Container Images in Production Have Critical or High-Severity Vulnerabilities
At the inaugural CloudNativeSecurityCon, DevSecOps practitioners discussed how to shore up the software supply chain.
February 24, 2023
At the inaugural CloudNativeSecurityCon, DevSecOps practitioners discussed how to shore up the software supply chain.
by Jeffrey Schwartz, Contributing Writer, Dark Reading
February 24, 2023
4 MIN READ
Article
How to Stop Attackers That Target Healthcare Imaging Data
Attribute-based encryption could help keep sensitive metadata off of the Dark Web.
February 22, 2023
Attribute-based encryption could help keep sensitive metadata off of the Dark Web.
by Kolawole Samuel Adebayo, Contributing Writer
February 22, 2023
5 MIN READ
Article
Researchers Create an AI Cyber Defender That Reacts to Attackers
Based on deep reinforcement learning, the system can adapt to defenders' tactics and stop 95% of simulated attacks, according to its developers.
February 20, 2023
Based on deep reinforcement learning, the system can adapt to defenders' tactics and stop 95% of simulated attacks, according to its developers.
by Robert Lemos, Contributing Writer, Dark Reading
February 20, 2023
4 MIN READ
Article
Check Point Boosts AppSec Focus With CNAPP Enhancements
Established network security players are responding to the shift to cloud-native applications, which have exposed more vulnerabilities in open source software supply chains.
February 17, 2023
Established network security players are responding to the shift to cloud-native applications, which have exposed more vulnerabilities in open source software supply chains.
by Jeffrey Schwartz, Contributing Writer, Dark Reading
February 17, 2023
3 MIN READ
Article