informa

Sponsored Article

AppSec Playbook 2023: Study of 829M Attacks on 1,400 Websites
The total number of 61,000 open vulnerabilities, including 1,700 critical ones that have been open for 180+ days, exposes businesses to potential attacks.
February 02, 2023
The total number of 61,000 open vulnerabilities, including 1,700 critical ones that have been open for 180+ days, exposes businesses to potential attacks.
Venkatesh Sundar, Founding CTO, Indusface
February 02, 2023
4 MIN READ
Article
Why Most Companies Still Don’t Know What’s on Their Network
Chris Kirsch, CEO of runZero, sits down with Dark Reading’sTerry Sweeney for a Fast Chat on the importance of asset discovery.
January 27, 2023
Chris Kirsch, CEO of runZero, sits down with Dark Reading’sTerry Sweeney for a Fast Chat on the importance of asset discovery.
by Terry Sweeney, Contributing Editor
January 27, 2023
1 MIN READ
Video
SaaS Rootkit Exploits Hidden Rules in Microsoft 365
A vulnerability within Microsoft's OAuth application registration allows an attacker to create hidden forwarding rules that act as a malicious SaaS rootkit.
January 26, 2023
A vulnerability within Microsoft's OAuth application registration allows an attacker to create hidden forwarding rules that act as a malicious SaaS rootkit.
Maor Bin, CEO and Co-Founder, Adaptive Shield
January 26, 2023
4 MIN READ
Article
Shift Identity Left: Preventing Identity-Based Breaches
Traditional compliance and IAM are insufficient to secure the modern enterprise. We must shift left with modern access controls to avoid costly data breaches.
January 19, 2023
Traditional compliance and IAM are insufficient to secure the modern enterprise. We must shift left with modern access controls to avoid costly data breaches.
Alex Bovee, Co-Founder and CEO, ConductorOne
January 19, 2023
4 MIN READ
Article
Governance in the Cloud Shifts Left
CISOs' top cloud challenge is harmonizing standards, policies, and procedures across blended environments.
January 18, 2023
CISOs' top cloud challenge is harmonizing standards, policies, and procedures across blended environments.
Mike Eisenberg, Vice President of Strategy, Privacy, and Risk, Coalfire
January 18, 2023
4 MIN READ
Article
A New Era Is Dawning in Cybersecurity, but Only the Best Algorithms Will Win
Open source AI is lowering the barrier of entry for cybercriminals. Security teams must consider the right way to apply defensive AI to counter this threat.
January 17, 2023
Open source AI is lowering the barrier of entry for cybercriminals. Security teams must consider the right way to apply defensive AI to counter this threat.
Tony Jarvis, Director of Enterprise Security, Asia-Pacific and Japan, Darktrace
January 17, 2023
5 MIN READ
Article
Supply Chain Risks Got You Down? Keep Calm and Get Strategic!
Security leaders must maintain an effective cybersecurity strategy to help filter some of the noise on new vulnerabilities.
December 21, 2022
Security leaders must maintain an effective cybersecurity strategy to help filter some of the noise on new vulnerabilities.
Michael Isbitski, Director of Cybersecurity Strategy, Sysdig
December 21, 2022
4 MIN READ
Article
Threat Intelligence Through Web Scraping
Bright Data CEO Or Lenchner discusses how security teams are utilizing public Web data networks to safeguard their organizations from digital risks.
December 19, 2022
Bright Data CEO Or Lenchner discusses how security teams are utilizing public Web data networks to safeguard their organizations from digital risks.
Or Lenchner, CEO, Bright Data
December 19, 2022
4 MIN READ
Article
Zero Trust in the Era of Edge
Accelerating security challenges and the increasing footprint of edge and IoT devices call for zero-trust principles to drive cyber resiliency.
December 16, 2022
Accelerating security challenges and the increasing footprint of edge and IoT devices call for zero-trust principles to drive cyber resiliency.
Dell Technologies
December 16, 2022
4 MIN READ
Article
Single Sign-on: It's Only as Good as Your Ability to Use It
Increased federal cybersecurity regulations provide a pivot point for manufacturers to reconsider their access management strategy.
December 08, 2022
Increased federal cybersecurity regulations provide a pivot point for manufacturers to reconsider their access management strategy.
Joel Burleson-Davis, Senior Vice President, Worldwide Engineering, Cyber, Imprivata
December 08, 2022
4 MIN READ
Article
Identity Security Needs Humans and AI Working Hand in Hand
In the cybersecurity world, augmenting the human touch with artificial intelligence has produced extremely positive results.
November 21, 2022
In the cybersecurity world, augmenting the human touch with artificial intelligence has produced extremely positive results.
Grady Summers, Executive Vice President, Product, SailPoint
November 21, 2022
4 MIN READ
Article
The Future of Cybersecurity Recruiting: Lessons on What Employers Want and What Students Need
The cybersecurity industry is facing a challenge to find qualified candidates. Here’s what recruiters, educators, and employers can do to fill the talent gap.
November 16, 2022
The cybersecurity industry is facing a challenge to find qualified candidates. Here’s what recruiters, educators, and employers can do to fill the talent gap.
Dr. Kenneth Williams, Executive Director, American Public University System Center for Cyber Defense
November 16, 2022
4 MIN READ
Article
Managing and Mitigating Risk From Unknown Unknowns
Five practical steps to up-level attack surface management programs and gain greater visibility and risk mitigation around the extended ecosystem.
November 10, 2022
Five practical steps to up-level attack surface management programs and gain greater visibility and risk mitigation around the extended ecosystem.
Jonathan Cran, Head of Engineering, Mandiant Advantage Attack Surface Management, Mandiant
November 10, 2022
5 MIN READ
Article
The CIS Benchmarks Community Consensus Process
The CIS Benchmarks are unique for many reasons. None compare to the community consensus process that forms their hardening guidance. Learn how to get involved.
November 08, 2022
The CIS Benchmarks are unique for many reasons. None compare to the community consensus process that forms their hardening guidance. Learn how to get involved.
Center for Internet Security (CIS)
November 08, 2022
3 MIN READ
Article
Why Third-Party Risk Should Be Manufacturing's Top Priority
Manufacturing relies on complex interconnected networks and technologies, but with more vendors comes risk that needs to be secured.
November 03, 2022
Manufacturing relies on complex interconnected networks and technologies, but with more vendors comes risk that needs to be secured.
Wes Wright, Chief Technology Officer, Imprivata
November 03, 2022
4 MIN READ
Article