The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches
Cloud
ICS/OT
Remote Workforce
Perimeter
Analytics
Security Monitoring
Security Monitoring
App Sec
Database Security
Database Security
Risk
Compliance
Compliance
Threat Intelligence
Endpoint
Authentication
Mobile Security
Privacy
Authentication
Mobile Security
Privacy
Vulnerabilities / Threats
Advanced Threats
Insider Threats
Vulnerability Management
Advanced Threats
Insider Threats
Vulnerability Management
Operations
Identity & Access Management
Careers & People
Identity & Access Management
Careers & People
Physical Security
IoT
Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
Black Hat USA - August 5-10 - Learn More
Black Hat Asia - May 9-12 - Learn More
Webinars
ChatGPT: Defending Your Business Against AI-Supercharged Ransomware
Mar 29, 2023
Ten Emerging Vulnerabilities Every Enterprise Should Know
Mar 30, 2023
Resources
Close
Back
Resources
Dark Reading Library >
Webinars >
Reports >
Slideshows >
White Papers >
Partner Perspectives: Microsoft
Tech Library >
Newsletter
The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches
Cloud
ICS/OT
Remote Workforce
Perimeter
Analytics
Security Monitoring
Security Monitoring
App Sec
Database Security
Database Security
Risk
Compliance
Compliance
Threat Intelligence
Endpoint
Authentication
Mobile Security
Privacy
Authentication
Mobile Security
Privacy
Vulnerabilities / Threats
Advanced Threats
Insider Threats
Vulnerability Management
Advanced Threats
Insider Threats
Vulnerability Management
Operations
Identity & Access Management
Careers & People
Identity & Access Management
Careers & People
Physical Security
IoT
Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
Black Hat USA - August 5-10 - Learn More
Black Hat Asia - May 9-12 - Learn More
Webinars
ChatGPT: Defending Your Business Against AI-Supercharged Ransomware
Mar 29, 2023
Ten Emerging Vulnerabilities Every Enterprise Should Know
Mar 30, 2023
Resources
Close
Back
Resources
Dark Reading Library >
Webinars >
Reports >
Slideshows >
White Papers >
Partner Perspectives: Microsoft
Tech Library >
The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches
Cloud
ICS/OT
Remote Workforce
Perimeter
Analytics
Security Monitoring
Security Monitoring
App Sec
Database Security
Database Security
Risk
Compliance
Compliance
Threat Intelligence
Endpoint
Authentication
Mobile Security
Privacy
Authentication
Mobile Security
Privacy
Vulnerabilities / Threats
Advanced Threats
Insider Threats
Vulnerability Management
Advanced Threats
Insider Threats
Vulnerability Management
Operations
Identity & Access Management
Careers & People
Identity & Access Management
Careers & People
Physical Security
IoT
Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
Black Hat USA - August 5-10 - Learn More
Black Hat Asia - May 9-12 - Learn More
Webinars
ChatGPT: Defending Your Business Against AI-Supercharged Ransomware
Mar 29, 2023
Ten Emerging Vulnerabilities Every Enterprise Should Know
Mar 30, 2023
Resources
Close
Back
Resources
Dark Reading Library >
Webinars >
Reports >
Slideshows >
White Papers >
Partner Perspectives: Microsoft
Tech Library >
Newsletter
SEARCH
A minimum of 3 characters are required to be typed in the search bar in order to perform a search.
Announcements
Event
How to Launch a Threat Hunting Program | Webinar <REGISTER>
Event
How to Accelerate XDR Outcomes: Bridging the Gap Between Network and Endpoint | Webinar <REGISTER>
Report
Black Hat USA 2022 Attendee Report | Supply Chain & Cloud Security Risks Are Top of Mind | <READ IT NOW>
Previous
Next
Partner Perspectives
Deepfakes, Synthetic Media: How Digital Propaganda Undermines Trust
Organizations must educate themselves and their users on how to detect, disrupt, and defend against the increasing volume of online disinformation.
March 14, 2023
Organizations must educate themselves and their users on how to detect, disrupt, and defend against the increasing volume of online disinformation.
by Microsoft Security, Microsoft
March 14, 2023
3 MIN READ
Article
4 Tips to Guard Against DDoS Attacks
Attackers are now using multiple types of distributed denial-of-service (DDoS) attacks to take down sites. Here are some ways to defend and protect.
February 22, 2023
Attackers are now using multiple types of distributed denial-of-service (DDoS) attacks to take down sites. Here are some ways to defend and protect.
by Microsoft Security, Microsoft
February 22, 2023
3 MIN READ
Article
Encrypted Traffic, Once Thought Safe, Now Responsible For Most Cyberthreats
It's a classic attacker move: Use security protections against those who deploy them. But organizations can still defuse and prevent these encrypted attacks.
February 16, 2023
It's a classic attacker move: Use security protections against those who deploy them. But organizations can still defuse and prevent these encrypted attacks.
by Deepen Desai, CISO and VP, Security Research, Zscaler
February 16, 2023
4 MIN READ
Article
Infrastructure Risks Increase As IT and OT Converge
Explosive growth of devices associated with the Internet of Things and operational technologies gives attackers a larger pool of targets.
February 15, 2023
Explosive growth of devices associated with the Internet of Things and operational technologies gives attackers a larger pool of targets.
by Microsoft Security, Microsoft
February 15, 2023
3 MIN READ
Article
How to Optimize Your Cyber Insurance Coverage
From prevention and detection processes to how you handle policy information, having strong cyber insurance coverage can help mitigate cybersecurity attacks.
February 08, 2023
From prevention and detection processes to how you handle policy information, having strong cyber insurance coverage can help mitigate cybersecurity attacks.
by Microsoft Security, Microsoft
February 08, 2023
3 MIN READ
Article
A Fool With a Tool Is Still a Fool: A Cyber Take
New tech often requires new thinking — but that's harder to install.
February 07, 2023
New tech often requires new thinking — but that's harder to install.
by Tony Fergusson, CISO EMEA, Zscaler
February 07, 2023
5 MIN READ
Article
Cybercrime Shows No Signs of Slowing Down
Look for recent trends in attacks, strategies, and vulnerabilities to continue gaining steam throughout 2023.
February 06, 2023
Look for recent trends in attacks, strategies, and vulnerabilities to continue gaining steam throughout 2023.
by Emily Laufer, Senior Manager of Product Marketing, ThreatLabz, Zscaler
February 06, 2023
3 MIN READ
Article
Predictions For Securing Today's Hybrid Workforce
Since requirements differ for users who work both from home and in the office, policies — and underlying technology — must adapt.
January 31, 2023
Since requirements differ for users who work both from home and in the office, policies — and underlying technology — must adapt.
by Kanishka Pandit, Senior Product Marketing Manager, Zscaler
January 31, 2023
4 MIN READ
Article
Unleash the Full Potential of Zero-Trust Security
The demand is unmistakeable and the business case is readily justified — it's time to implement zero trust.
January 31, 2023
The demand is unmistakeable and the business case is readily justified — it's time to implement zero trust.
by Emily Laufer, Senior Manager of Product Marketing, ThreatLabz, Zscaler
January 31, 2023
4 MIN READ
Article
Multicloud Security Challenges Will Persist in 2023
Some predictions about impending security challenges, with a few tips for proactively addressing them.
January 25, 2023
Some predictions about impending security challenges, with a few tips for proactively addressing them.
by Rich Campagna, Senior Vice President and General Manager, CNAPP, Zscaler
January 25, 2023
4 MIN READ
Article
As Social Engineering Tactics Change, So Must Your Security Training
Craft specific awareness training for high-exposure teams like finance, and reinforce other critical awareness training across the organization.
January 19, 2023
Craft specific awareness training for high-exposure teams like finance, and reinforce other critical awareness training across the organization.
by Ben Corll, CISO Americas, Zscaler
January 19, 2023
5 MIN READ
Article
5 Ways Cybersecurity for Cloud Workloads Will Evolve in 2023
Organizations are looking for new methods to safeguard the virtual machines, containers, and workload services they use in the cloud.
January 11, 2023
Organizations are looking for new methods to safeguard the virtual machines, containers, and workload services they use in the cloud.
by Sakthi Chandra, Senior Director, Product Marketing, Zscaler
January 11, 2023
4 MIN READ
Article
CISOs Are Focused on These 3 Trends. Are You?
The macro issues shaping the threat landscape can help security pros reset their priorities and reformulate strategy.
January 09, 2023
The macro issues shaping the threat landscape can help security pros reset their priorities and reformulate strategy.
by Microsoft Security, Microsoft
January 09, 2023
4 MIN READ
Article
6 Ways to Protect Your Organization Against LAPSUS$
Businesses need to educate employees the type of social engineering attacks used by hacking group DEV-0537 (LAPSUS$) and strengthen their security posture.
December 29, 2022
Businesses need to educate employees the type of social engineering attacks used by hacking group DEV-0537 (LAPSUS$) and strengthen their security posture.
by Microsoft Security, Microsoft
December 29, 2022
3 MIN READ
Article
Securing and Improving User Experience for the Future of Hybrid Work
Digital transformation initiatives are challenging because IT still has to make sure performance doesn't suffer by making applications available from anywhere.
December 28, 2022
Digital transformation initiatives are challenging because IT still has to make sure performance doesn't suffer by making applications available from anywhere.
by Rohit Goyal, director of product marketing, Zscaler
December 28, 2022
5 MIN READ
Article