AppSec Playbook 2023: Study of 829M Attacks on 1,400 Websites
The total number of 61,000 open vulnerabilities, including 1,700 critical ones that have been open for 180+ days, exposes businesses to potential attacks.
February 02, 2023
Why Most Companies Still Don’t Know What’s on Their Network
Chris Kirsch, CEO of runZero, sits down with Dark Reading’sTerry Sweeney for a Fast Chat on the importance of asset discovery.
January 27, 2023
SaaS Rootkit Exploits Hidden Rules in Microsoft 365
A vulnerability within Microsoft's OAuth application registration allows an attacker to create hidden forwarding rules that act as a malicious SaaS rootkit.
January 26, 2023
Shift Identity Left: Preventing Identity-Based Breaches
Traditional compliance and IAM are insufficient to secure the modern enterprise. We must shift left with modern access controls to avoid costly data breaches.
January 19, 2023
Governance in the Cloud Shifts Left
CISOs' top cloud challenge is harmonizing standards, policies, and procedures across blended environments.
January 18, 2023
A New Era Is Dawning in Cybersecurity, but Only the Best Algorithms Will Win
Open source AI is lowering the barrier of entry for cybercriminals. Security teams must consider the right way to apply defensive AI to counter this threat.
January 17, 2023
Supply Chain Risks Got You Down? Keep Calm and Get Strategic!
Security leaders must maintain an effective cybersecurity strategy to help filter some of the noise on new vulnerabilities.
December 21, 2022
Threat Intelligence Through Web Scraping
Bright Data CEO Or Lenchner discusses how security teams are utilizing public Web data networks to safeguard their organizations from digital risks.
December 19, 2022
Zero Trust in the Era of Edge
Accelerating security challenges and the increasing footprint of edge and IoT devices call for zero-trust principles to drive cyber resiliency.
December 16, 2022
Single Sign-on: It's Only as Good as Your Ability to Use It
Increased federal cybersecurity regulations provide a pivot point for manufacturers to reconsider their access management strategy.
December 08, 2022
Identity Security Needs Humans and AI Working Hand in Hand
In the cybersecurity world, augmenting the human touch with artificial intelligence has produced extremely positive results.
November 21, 2022
The Future of Cybersecurity Recruiting: Lessons on What Employers Want and What Students Need
The cybersecurity industry is facing a challenge to find qualified candidates. Here’s what recruiters, educators, and employers can do to fill the talent gap.
November 16, 2022
Managing and Mitigating Risk From Unknown Unknowns
Five practical steps to up-level attack surface management programs and gain greater visibility and risk mitigation around the extended ecosystem.
November 10, 2022
The CIS Benchmarks Community Consensus Process
The CIS Benchmarks are unique for many reasons. None compare to the community consensus process that forms their hardening guidance. Learn how to get involved.
November 08, 2022