The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches
Cloud
ICS/OT
Remote Workforce
Perimeter
Analytics
Security Monitoring
Security Monitoring
App Sec
Database Security
Database Security
Risk
Compliance
Compliance
Threat Intelligence
Endpoint
Authentication
Mobile Security
Privacy
Authentication
Mobile Security
Privacy
Vulnerabilities / Threats
Advanced Threats
Insider Threats
Vulnerability Management
Advanced Threats
Insider Threats
Vulnerability Management
Operations
Identity & Access Management
Careers & People
Identity & Access Management
Careers & People
Physical Security
IoT
DR Global
Middle East & Africa
Middle East & Africa
Black Hat news
Omdia Research
Events
Close
Back
Events
Events
Think Like An Attacker - A Dark Reading November 16 Event
Black Hat Europe - December 4-7 - Learn More
Webinars
Cyber Risk Assessment Secrets From the Pros
Sep 26, 2023
The Evolution of the Vulnerability Landscape in 2023
Sep 27, 2023
Resources
Close
Back
Resources
Dark Reading Library >
Reports >
Webinars >
White Papers >
Slideshows >
Newsletters >
Events >
Partner Perspectives: Microsoft
Partner Perspectives: Google Cloud
Newsletter Sign-Up
The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches
Cloud
ICS/OT
Remote Workforce
Perimeter
Analytics
Security Monitoring
Security Monitoring
App Sec
Database Security
Database Security
Risk
Compliance
Compliance
Threat Intelligence
Endpoint
Authentication
Mobile Security
Privacy
Authentication
Mobile Security
Privacy
Vulnerabilities / Threats
Advanced Threats
Insider Threats
Vulnerability Management
Advanced Threats
Insider Threats
Vulnerability Management
Operations
Identity & Access Management
Careers & People
Identity & Access Management
Careers & People
Physical Security
IoT
DR Global
Middle East & Africa
Middle East & Africa
Black Hat news
Omdia Research
Events
Close
Back
Events
Events
Think Like An Attacker - A Dark Reading November 16 Event
Black Hat Europe - December 4-7 - Learn More
Webinars
Cyber Risk Assessment Secrets From the Pros
Sep 26, 2023
The Evolution of the Vulnerability Landscape in 2023
Sep 27, 2023
Resources
Close
Back
Resources
Dark Reading Library >
Reports >
Webinars >
White Papers >
Slideshows >
Newsletters >
Events >
Partner Perspectives: Microsoft
Partner Perspectives: Google Cloud
The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches
Cloud
ICS/OT
Remote Workforce
Perimeter
Analytics
Security Monitoring
Security Monitoring
App Sec
Database Security
Database Security
Risk
Compliance
Compliance
Threat Intelligence
Endpoint
Authentication
Mobile Security
Privacy
Authentication
Mobile Security
Privacy
Vulnerabilities / Threats
Advanced Threats
Insider Threats
Vulnerability Management
Advanced Threats
Insider Threats
Vulnerability Management
Operations
Identity & Access Management
Careers & People
Identity & Access Management
Careers & People
Physical Security
IoT
DR Global
Middle East & Africa
Middle East & Africa
Black Hat news
Omdia Research
Events
Close
Back
Events
Events
Think Like An Attacker - A Dark Reading November 16 Event
Black Hat Europe - December 4-7 - Learn More
Webinars
Cyber Risk Assessment Secrets From the Pros
Sep 26, 2023
The Evolution of the Vulnerability Landscape in 2023
Sep 27, 2023
Resources
Close
Back
Resources
Dark Reading Library >
Reports >
Webinars >
White Papers >
Slideshows >
Newsletters >
Events >
Partner Perspectives: Microsoft
Partner Perspectives: Google Cloud
Newsletter Sign-Up
SEARCH
A minimum of 3 characters are required to be typed in the search bar in order to perform a search.
Announcements
Event
Think Like an Attacker: Understanding Cybercriminals & Nation-State Threat Actor | Nov 16 Virtual Event <REGISTER NOW>
Event
Tips for A Streamlined Transition to Zero Trust | Sept 28 LIVE Webinar <REGISTER NOW>
Event
The Evolution of the Vulnerability Landscape in 2023 | Sept 27 LIVE Webinar <REGISTER NOW>
Previous
Next
Partner Perspectives
Why Shared Fate is a Better Way to Manage Cloud Risk
The shared responsibility model was good enough to cover the first years of the cloud revolution, but the model is showing its limitations. Shared fate is a more mature model for the future of cloud security.
September 15, 2023
The shared responsibility model was good enough to cover the first years of the cloud revolution, but the model is showing its limitations. Shared fate is a more mature model for the future of cloud security.
by Anton Chuvakin, Security Advisor at Office of the CISO, Google Cloud
September 15, 2023
4 MIN READ
Article
Professional Sports: The Next Frontier of Cybersecurity?
Sports teams, major leagues, global sporting associations, and entertainment venues are all home to valuable personal and business data. Here's how to keep them safe.
September 14, 2023
Sports teams, major leagues, global sporting associations, and entertainment venues are all home to valuable personal and business data. Here's how to keep them safe.
by Microsoft Security, Microsoft
September 14, 2023
3 MIN READ
Article
Security for Multicloud and Hybrid Cloud Environments
In multicloud environments, security challenges are most common at the connecting points between different clouds. Internal cloud security skill sets and cloud-native security tools are also key.
September 07, 2023
In multicloud environments, security challenges are most common at the connecting points between different clouds. Internal cloud security skill sets and cloud-native security tools are also key.
by Anton Chuvakin, Security Advisor at Office of the CISO, Google Cloud
September 07, 2023
4 MIN READ
Article
Overcoming Open Source Vulnerabilities in the Software Supply Chain
By securing access to code and running scans against all code changes, developers can better prevent — and detect — potential risks and vulnerabilities.
September 06, 2023
By securing access to code and running scans against all code changes, developers can better prevent — and detect — potential risks and vulnerabilities.
by Microsoft Security, Microsoft
September 06, 2023
3 MIN READ
Article
Considerations for Reducing Risk When Migrating to the Cloud
Proper planning is an essential part of reducing security and compliance risks before, during, and after a migration to a new cloud environment.
August 28, 2023
Proper planning is an essential part of reducing security and compliance risks before, during, and after a migration to a new cloud environment.
by Rob Sadowski, Director, Trust & Security Product Marketing for Google Cloud at Google
August 28, 2023
4 MIN READ
Article
Iran and the Rise of Cyber-Enabled Influence Operations
Iranian threat actors are combining offensive network ops with messaging and amplification to manipulate targets' perceptions and behavior. Here are three examples.
August 16, 2023
Iranian threat actors are combining offensive network ops with messaging and amplification to manipulate targets' perceptions and behavior. Here are three examples.
by Microsoft Security, Microsoft
August 16, 2023
3 MIN READ
Article
Closing Coverage Gaps Where Customer Resources Meet Cloud Environments
Protecting the spaces where private, public, and hybrid clouds meet users' technologies requires a cloud-centric approach.
August 09, 2023
Protecting the spaces where private, public, and hybrid clouds meet users' technologies requires a cloud-centric approach.
by Microsoft Security, Microsoft
August 09, 2023
4 MIN READ
Article
Unified XDR and SIEM Alleviate Security Alert Fatigue
By integrating detection response with information and event management, organizations can move beyond protective controls and harden their defenses.
August 02, 2023
By integrating detection response with information and event management, organizations can move beyond protective controls and harden their defenses.
by Microsoft Security, Microsoft
August 02, 2023
3 MIN READ
Article
Threat Intelligence Is Growing — Here's How SOCs Can Keep Up
By integrating XDR and SIEM, security professionals can automate correlation and prioritization of alerts across a broad swath of security infrastructure.
July 26, 2023
By integrating XDR and SIEM, security professionals can automate correlation and prioritization of alerts across a broad swath of security infrastructure.
by Microsoft Security, Microsoft
July 26, 2023
3 MIN READ
Article
Leverage Threat Intelligence, AI, and Data at Scale to Boost Cyber Defenses
By combining these leading-edge tools, security professionals can amplify the impact of their security strategies.
July 19, 2023
By combining these leading-edge tools, security professionals can amplify the impact of their security strategies.
by Microsoft Security, Microsoft
July 19, 2023
3 MIN READ
Article
6 Steps To Outsmart Business Email Compromise Scammers
Email fraud is a confidence game that costs the economy billions. An effective defense takes technology and vigilance.
July 06, 2023
Email fraud is a confidence game that costs the economy billions. An effective defense takes technology and vigilance.
by Microsoft Security, Microsoft
July 06, 2023
3 MIN READ
Article
3 Ways to Build a More Skilled Cybersecurity Workforce
With the right collaboration among employers, educators, and policymakers, we can come together to create a more secure environment for all.
June 30, 2023
With the right collaboration among employers, educators, and policymakers, we can come together to create a more secure environment for all.
by Microsoft Security, Microsoft
June 30, 2023
3 MIN READ
Article
3 Tips to Increase Hybrid and Multicloud Security
As cloud adoption grows, organizations need to rethink their approaches to securing hybrid cloud and multicloud environments.
June 29, 2023
As cloud adoption grows, organizations need to rethink their approaches to securing hybrid cloud and multicloud environments.
by Microsoft Security, Microsoft
June 29, 2023
3 MIN READ
Article
How Infrastructure as Code Can Help Minimize Human Error
Infrastructure as code lets organizations manage cloud infrastructure with the same versioning, testing, and automation processes they use for application code.
June 26, 2023
Infrastructure as code lets organizations manage cloud infrastructure with the same versioning, testing, and automation processes they use for application code.
by Microsoft Security, Microsoft
June 26, 2023
3 MIN READ
Article
6 Attack Surfaces You Must Protect
More connectivity means more potential ways into your enterprise, so securing every main attack surface is imperative.
June 22, 2023
More connectivity means more potential ways into your enterprise, so securing every main attack surface is imperative.
by Microsoft Security, Microsoft
June 22, 2023
4 MIN READ
Article