The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches
Cloud
ICS/OT
Remote Workforce
Perimeter
Analytics
Security Monitoring
Security Monitoring
App Sec
Database Security
Database Security
Risk
Compliance
Compliance
Threat Intelligence
Endpoint
Authentication
Mobile Security
Privacy
Authentication
Mobile Security
Privacy
Vulnerabilities / Threats
Advanced Threats
Insider Threats
Vulnerability Management
Advanced Threats
Insider Threats
Vulnerability Management
Operations
Identity & Access Management
Careers & People
Identity & Access Management
Careers & People
Physical Security
IoT
DR Global
Middle East & Africa
Middle East & Africa
Black Hat news
Omdia Research
Events
Close
Back
Events
Events
Black Hat Europe - December 4-7 - Learn More
Black Hat Middle East and Africa - Nov 14-16 - Learn More
Webinars
Cyber Risk Assessment Secrets From the Pros
Sep 26, 2023
The Evolution of the Vulnerability Landscape in 2023
Sep 27, 2023
Resources
Close
Back
Resources
Dark Reading Library >
Reports >
Webinars >
White Papers >
Slideshows >
Newsletters >
Events >
Partner Perspectives: Microsoft
Partner Perspectives: Google Cloud
Newsletter Sign-Up
The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches
Cloud
ICS/OT
Remote Workforce
Perimeter
Analytics
Security Monitoring
Security Monitoring
App Sec
Database Security
Database Security
Risk
Compliance
Compliance
Threat Intelligence
Endpoint
Authentication
Mobile Security
Privacy
Authentication
Mobile Security
Privacy
Vulnerabilities / Threats
Advanced Threats
Insider Threats
Vulnerability Management
Advanced Threats
Insider Threats
Vulnerability Management
Operations
Identity & Access Management
Careers & People
Identity & Access Management
Careers & People
Physical Security
IoT
DR Global
Middle East & Africa
Middle East & Africa
Black Hat news
Omdia Research
Events
Close
Back
Events
Events
Black Hat Europe - December 4-7 - Learn More
Black Hat Middle East and Africa - Nov 14-16 - Learn More
Webinars
Cyber Risk Assessment Secrets From the Pros
Sep 26, 2023
The Evolution of the Vulnerability Landscape in 2023
Sep 27, 2023
Resources
Close
Back
Resources
Dark Reading Library >
Reports >
Webinars >
White Papers >
Slideshows >
Newsletters >
Events >
Partner Perspectives: Microsoft
Partner Perspectives: Google Cloud
The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches
Cloud
ICS/OT
Remote Workforce
Perimeter
Analytics
Security Monitoring
Security Monitoring
App Sec
Database Security
Database Security
Risk
Compliance
Compliance
Threat Intelligence
Endpoint
Authentication
Mobile Security
Privacy
Authentication
Mobile Security
Privacy
Vulnerabilities / Threats
Advanced Threats
Insider Threats
Vulnerability Management
Advanced Threats
Insider Threats
Vulnerability Management
Operations
Identity & Access Management
Careers & People
Identity & Access Management
Careers & People
Physical Security
IoT
DR Global
Middle East & Africa
Middle East & Africa
Black Hat news
Omdia Research
Events
Close
Back
Events
Events
Black Hat Europe - December 4-7 - Learn More
Black Hat Middle East and Africa - Nov 14-16 - Learn More
Webinars
Cyber Risk Assessment Secrets From the Pros
Sep 26, 2023
The Evolution of the Vulnerability Landscape in 2023
Sep 27, 2023
Resources
Close
Back
Resources
Dark Reading Library >
Reports >
Webinars >
White Papers >
Slideshows >
Newsletters >
Events >
Partner Perspectives: Microsoft
Partner Perspectives: Google Cloud
Newsletter Sign-Up
SEARCH
A minimum of 3 characters are required to be typed in the search bar in order to perform a search.
Announcements
Event
Think Like an Attacker: Understanding Cybercriminals & Nation-State Threat Actor | Nov 16 Virtual Event <REGISTER NOW>
Event
Tips for A Streamlined Transition to Zero Trust | Sept 28 LIVE Webinar <REGISTER NOW>
Event
The Evolution of the Vulnerability Landscape in 2023 | Sept 27 LIVE Webinar <REGISTER NOW>
Previous
Next
Feature
Security That Never Sleeps
Federal agencies have to shift from annual IT security assessments to continuous monitoring of their risks. Here's a framework for getting there.
September 07, 2011
Federal agencies have to shift from annual IT security assessments to continuous monitoring of their risks. Here's a framework for getting there.
by Dark Reading Staff, Dark Reading
September 07, 2011
2 MIN READ
Article
Just Getting Started
Federal agencies still have a long way to go in implementing continuous monitoring. Only 29% of agencies have the tools in place to continuously monitor their IT systems ...
September 07, 2011
Federal agencies still have a long way to go in implementing continuous monitoring. Only 29% of agencies have the tools in place to continuously monitor their IT systems ...
by Dark Reading Staff, Dark Reading
September 07, 2011
1 MIN READ
Article
Midmarket Security: 5 Risks, 5 Practical Responses
Smaller companies deal with enterprise-grade threats and compliance challenges, and partners are imposing requirements for sophisticated controls and audits that may be overwhelming. Here's how to cope.
April 18, 2011
Smaller companies deal with enterprise-grade threats and compliance challenges, and partners are imposing requirements for sophisticated controls and audits that may be overwhelming. Here's how to cope.
by Dark Reading Staff, Dark Reading
April 18, 2011
2 MIN READ
Article
Security Tips For Virtualization
Spinning up VMs is easy--too easy, in fact. Fortunately, keeping virtual servers safe doesn't have to be expensive.
April 03, 2011
Spinning up VMs is easy--too easy, in fact. Fortunately, keeping virtual servers safe doesn't have to be expensive.
by Dark Reading Staff, Dark Reading
April 03, 2011
3 MIN READ
Article
Healthcare's Cloud Challenge
The industry has been slow to embrace cloud computing, but demand could grow.
March 17, 2011
The industry has been slow to embrace cloud computing, but demand could grow.
by Marianne Kolbasuk McGee, Senior Writer, InformationWeek
March 17, 2011
1 MIN READ
Article
Cloud Programming? Ready, Set ... Yow
Clouds today come in two basic flavors: the private cloud (wholly behind the firewall) and the public cloud, which runs on remote hosts. The private cloud currently enjoy...
March 16, 2011
Clouds today come in two basic flavors: the private cloud (wholly behind the firewall) and the public cloud, which runs on remote hosts. The private cloud currently enjoy...
by Dark Reading Staff, Dark Reading
March 16, 2011
2 MIN READ
Article
Backing Up Virtual Machines
We highlight best practices for protecting VM disk files.
March 02, 2011
We highlight best practices for protecting VM disk files.
by Dark Reading Staff, Dark Reading
March 02, 2011
3 MIN READ
Article
Easy-To-Find Brute-Force Tools
Tools are available to create word lists that can be used for brute-force attacks to nab passwords.
October 28, 2010
Tools are available to create word lists that can be used for brute-force attacks to nab passwords.
by Dark Reading Staff, Dark Reading
October 28, 2010
2 MIN READ
Article
SMB Security: Fight The Right Fight
Small businesses must prioritize against the IT security threats they face, which are different from those at larger businesses
October 06, 2010
Small businesses must prioritize against the IT security threats they face, which are different from those at larger businesses
by Dark Reading Staff, Dark Reading
October 06, 2010
9 MIN READ
Article
WAN Security: Your Next Assignment
Firewalls and IDS aren't enough. WAN security pros must embrace data-centric protection.
September 22, 2010
Firewalls and IDS aren't enough. WAN security pros must embrace data-centric protection.
by Dark Reading Staff, Dark Reading
September 22, 2010
2 MIN READ
Article
Protection Efforts Superficial
Database security is a growing concern.
September 17, 2010
Database security is a growing concern.
by Dark Reading Staff, Dark Reading
September 17, 2010
1 MIN READ
Article
For SMBs, Data Protection Is A Virtual Affair
Think you can't afford BC/DR to rival enterprise-class systems? If you have x86 virtualization installed, you might be surprised.
August 27, 2010
Think you can't afford BC/DR to rival enterprise-class systems? If you have x86 virtualization installed, you might be surprised.
by Howard Marks, Network Computing Blogger
August 27, 2010
3 MIN READ
Article
Trusted Identities In Cyberspace
Federal IT and security pros have a role in the development of an "identity ecosystem" in cyberspace that spans the government and business sectors.
August 26, 2010
Federal IT and security pros have a role in the development of an "identity ecosystem" in cyberspace that spans the government and business sectors.
by Dark Reading Staff, Dark Reading
August 26, 2010
2 MIN READ
Article
Next In Cybersecurity Certifications
Cybersecurity certifications from organizations provide important benchmarks that are often a requirement for government jobs.
August 26, 2010
Cybersecurity certifications from organizations provide important benchmarks that are often a requirement for government jobs.
by J. Nicholas Hoover, Senior Editor, InformationWeek Government
August 26, 2010
1 MIN READ
Article
Closing The Cybersecurity Gap In Government
In the face of unrelenting threats to systems and networks, federal agencies must find ways to attract qualified workers and develop new skills internally.
August 26, 2010
In the face of unrelenting threats to systems and networks, federal agencies must find ways to attract qualified workers and develop new skills internally.
by J. Nicholas Hoover, Senior Editor, InformationWeek Government
August 26, 2010
2 MIN READ
Article