informa

DR Technology

Microsoft Security Copilot Uses GPT-4 to Beef Up Security Incident Response
Microsoft's new AI assistant tool helps cybersecurity teams investigate security incidents and hunt for threats.
March 29, 2023
Microsoft's new AI assistant tool helps cybersecurity teams investigate security incidents and hunt for threats.
by Fahmida Y. Rashid, Managing Editor, Features, Dark Reading
March 29, 2023
4 MIN READ
Article
Drive to Pervasive Encryption Boosts Key Management
Key vaults, aka key-management-as-a-service (KMaaS), promise to allow companies to encrypt sensitive data across cloud and third parties with granular control.
March 27, 2023
Key vaults, aka key-management-as-a-service (KMaaS), promise to allow companies to encrypt sensitive data across cloud and third parties with granular control.
by Robert Lemos, Contributing Writer, Dark Reading
March 27, 2023
5 MIN READ
Article
IAM Startup Aembit Secures How Workloads Connect to Services
Aembit launches from stealth with a cloud-based identity access management platform for enterprise workloads.
March 21, 2023
Aembit launches from stealth with a cloud-based identity access management platform for enterprise workloads.
by Fahmida Y. Rashid, Managing Editor, Features, Dark Reading
March 21, 2023
2 MIN READ
Article
Technology Firms Delivering Much-Sought Encryption-in-Use
If the approaches stand up to scrutiny, companies may soon be able to encrypt most databases in a way that allows using data without the need to decrypt to plaintext.
March 17, 2023
If the approaches stand up to scrutiny, companies may soon be able to encrypt most databases in a way that allows using data without the need to decrypt to plaintext.
by Robert Lemos, Contributing Writer, Dark Reading
March 17, 2023
5 MIN READ
Article
Orgs Have a Long Way to Go in Securing Remote Workforce
Organizations recognize that they are responsible for protecting remote workers from cyber threats, but they have a long way to go in deploying the necessary security technologies.
March 14, 2023
Organizations recognize that they are responsible for protecting remote workers from cyber threats, but they have a long way to go in deploying the necessary security technologies.
by Dark Reading Staff, Dark Reading
March 14, 2023
2 MIN READ
Article
Tech Giants Go Cloud-Native Shopping
Cisco’s acquisition of cloud-native firewall provider Valtix and HPE’s deal to buy SSE provider Axis Security fill gaps in their existing portfolios.
March 08, 2023
Cisco’s acquisition of cloud-native firewall provider Valtix and HPE’s deal to buy SSE provider Axis Security fill gaps in their existing portfolios.
by Jeffrey Schwartz, Contributing Writer, Dark Reading
March 08, 2023
4 MIN READ
Article
Machine Learning Improves Prediction of Exploited Vulnerabilities
The third iteration of the Exploit Prediction Scoring System (EPSS) performs 82% better than previous versions, giving companies a better tool for evaluating vulnerabilities and prioritizing patching.
March 07, 2023
The third iteration of the Exploit Prediction Scoring System (EPSS) performs 82% better than previous versions, giving companies a better tool for evaluating vulnerabilities and prioritizing patching.
by Robert Lemos, Contributing Writer, Dark Reading
March 07, 2023
5 MIN READ
Article
3 Ways Security Teams Can Use IP Data Context
Innocently or not, residential proxy networks can obscure the actual geolocation of an access point. Here's why that's not great and what you can do about it.
March 03, 2023
Innocently or not, residential proxy networks can obscure the actual geolocation of an access point. Here's why that's not great and what you can do about it.
by Jonathan Tomek, VP of Research and Development, Digital Element
March 03, 2023
4 MIN READ
Article
IBM Contributes Supply Chain Security Tools to OWASP
License Scanner and SBOM Utility will boost the capabilities of OWASP's CycloneDX Software Bill of Materials standard.
March 03, 2023
License Scanner and SBOM Utility will boost the capabilities of OWASP's CycloneDX Software Bill of Materials standard.
by Jeffrey Schwartz, Contributing Writer, Dark Reading
March 03, 2023
4 MIN READ
Article
How to Reduce Code Risk Using Pipelineless Security
The exposure and exploitation of hardcoded secrets continues to drive software supply chain attacks. One solution: zero new hardcoded secrets.
February 27, 2023
The exposure and exploitation of hardcoded secrets continues to drive software supply chain attacks. One solution: zero new hardcoded secrets.
by Nir Valtman, Co-Founder & CEO, Arnica
February 27, 2023
5 MIN READ
Article
Tackling Software Supply Chain Issues With CNAPP
The cloud-native application protection platform market is expanding as security teams look to protect their applications and the software supply chain.
February 24, 2023
The cloud-native application protection platform market is expanding as security teams look to protect their applications and the software supply chain.
by Jeffrey Schwartz, Contributing Writer, Dark Reading
February 24, 2023
3 MIN READ
Article
87% of Container Images in Production Have Critical or High-Severity Vulnerabilities
At the inaugural CloudNativeSecurityCon, DevSecOps practitioners discussed how to shore up the software supply chain.
February 24, 2023
At the inaugural CloudNativeSecurityCon, DevSecOps practitioners discussed how to shore up the software supply chain.
by Jeffrey Schwartz, Contributing Writer, Dark Reading
February 24, 2023
4 MIN READ
Article
How to Stop Attackers That Target Healthcare Imaging Data
Attribute-based encryption could help keep sensitive metadata off of the Dark Web.
February 22, 2023
Attribute-based encryption could help keep sensitive metadata off of the Dark Web.
by Kolawole Samuel Adebayo, Contributing Writer
February 22, 2023
5 MIN READ
Article
Researchers Create an AI Cyber Defender That Reacts to Attackers
Based on deep reinforcement learning, the system can adapt to defenders' tactics and stop 95% of simulated attacks, according to its developers.
February 20, 2023
Based on deep reinforcement learning, the system can adapt to defenders' tactics and stop 95% of simulated attacks, according to its developers.
by Robert Lemos, Contributing Writer, Dark Reading
February 20, 2023
4 MIN READ
Article
Check Point Boosts AppSec Focus With CNAPP Enhancements
Established network security players are responding to the shift to cloud-native applications, which have exposed more vulnerabilities in open source software supply chains.
February 17, 2023
Established network security players are responding to the shift to cloud-native applications, which have exposed more vulnerabilities in open source software supply chains.
by Jeffrey Schwartz, Contributing Writer, Dark Reading
February 17, 2023
3 MIN READ
Article