The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches
Cloud
IoT
Physical Security
Perimeter
Analytics
Security Monitoring
Security Monitoring
App Sec
Database Security
Database Security
Risk
Compliance
Compliance
Threat Intelligence
Endpoint
Authentication
Mobile Security
Privacy
Authentication
Mobile Security
Privacy
Vulnerabilities / Threats
Advanced Threats
Insider Threats
Vulnerability Management
Advanced Threats
Insider Threats
Vulnerability Management
Operations
Identity & Access Management
Careers & People
Identity & Access Management
Careers & People
Remote Workforce
Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
SecTor - Canada's IT Security Conference Oct 1-6 - Learn More
Black Hat USA - August 6-11 - Learn More
Webinars
Building and Maintaining an Effective Remote Access Strategy
Aug 02, 2022
How Ransomware Works - And What You Can Do to Stop It
Jul 14, 2022
Resources
Close
Back
Resources
Reports >
Slideshows >
Tech Library >
Webinars >
White Papers >
Subscribe
Login
/
Register
The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches
Cloud
IoT
Physical Security
Perimeter
Analytics
Security Monitoring
Security Monitoring
App Sec
Database Security
Database Security
Risk
Compliance
Compliance
Threat Intelligence
Endpoint
Authentication
Mobile Security
Privacy
Authentication
Mobile Security
Privacy
Vulnerabilities / Threats
Advanced Threats
Insider Threats
Vulnerability Management
Advanced Threats
Insider Threats
Vulnerability Management
Operations
Identity & Access Management
Careers & People
Identity & Access Management
Careers & People
Remote Workforce
Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
SecTor - Canada's IT Security Conference Oct 1-6 - Learn More
Black Hat USA - August 6-11 - Learn More
Webinars
Building and Maintaining an Effective Remote Access Strategy
Aug 02, 2022
How Ransomware Works - And What You Can Do to Stop It
Jul 14, 2022
Resources
Close
Back
Resources
Reports >
Slideshows >
Tech Library >
Webinars >
White Papers >
The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches
Cloud
IoT
Physical Security
Perimeter
Analytics
Security Monitoring
Security Monitoring
App Sec
Database Security
Database Security
Risk
Compliance
Compliance
Threat Intelligence
Endpoint
Authentication
Mobile Security
Privacy
Authentication
Mobile Security
Privacy
Vulnerabilities / Threats
Advanced Threats
Insider Threats
Vulnerability Management
Advanced Threats
Insider Threats
Vulnerability Management
Operations
Identity & Access Management
Careers & People
Identity & Access Management
Careers & People
Remote Workforce
Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
SecTor - Canada's IT Security Conference Oct 1-6 - Learn More
Black Hat USA - August 6-11 - Learn More
Webinars
Building and Maintaining an Effective Remote Access Strategy
Aug 02, 2022
How Ransomware Works - And What You Can Do to Stop It
Jul 14, 2022
Resources
Close
Back
Resources
Reports >
Slideshows >
Tech Library >
Webinars >
White Papers >
Subscribe
Login
/
Register
SEARCH
A minimum of 3 characters are required to be typed in the search bar in order to perform a search.
Announcements
Event
Building & Maintaining an Effective Remote Access Strategy | August 2 Webinar | <REGISTER NOW>
Event
Building & Maintaining Security at the Network Edge | July 28 Webinar | <REGISTER NOW>
Event
How Ransomware Works - And What You Can Do to Stop It | July 14 Webinar | <REGISTER NOW>
Previous
Next
Operations
Breaking news, news analysis, and expert commentary on cybersecurity operations, and the tools & technologies for security teams.
ICYMI: A Microsoft Warning, Follina, Atlassian, and More
Dark Reading's digest of the other don't-miss stories of the week, including YouTube account takeovers and a sad commentary on cyber-pro hopelessness.
July 01, 2022
Dark Reading's digest of the other don't-miss stories of the week, including YouTube account takeovers and a sad commentary on cyber-pro hopelessness.
by Tara Seals, Managing Editor, News, Dark Reading
July 01, 2022
6 min read
Article
Criminals Use Deepfake Videos to Interview for Remote Work
The latest evolution in social engineering could put fraudsters in a position to commit insider threats.
July 01, 2022
The latest evolution in social engineering could put fraudsters in a position to commit insider threats.
by Ericka Chickowski, Contributing Writer, Dark Reading
July 01, 2022
6 min read
Article
Microsoft Going Big on Identity with the Launch of Entra
With more staff working remotely, identity, authentication, and access (IAA) has never been more important. Microsoft has a new response.
July 01, 2022
With more staff working remotely, identity, authentication, and access (IAA) has never been more important. Microsoft has a new response.
by Don Tait, Senior Analyst, Omdia
July 01, 2022
7 min read
Article
Facebook Business Pages Targeted via Chatbot in Data-Harvesting Campaign
The clever, interactive phishing campaign is a sign of increasingly complex social-engineering attacks, researchers warn.
June 28, 2022
The clever, interactive phishing campaign is a sign of increasingly complex social-engineering attacks, researchers warn.
by Tara Seals, Managing Editor, News, Dark Reading
June 28, 2022
7 min read
Article
Thrive Acquires DSM
DSM is now the third acquisition by Thrive in Florida in the past six months.
June 27, 2022
DSM is now the third acquisition by Thrive in Florida in the past six months.
June 27, 2022
3 min read
Article
Johnson Controls Acquires Tempered Networks to Bring Zero Trust Cybersecurity to Connected Buildings
Johnson Controls will roll out the Tempered Networks platform across deployments of its OpenBlue AI-enabled platform.
June 23, 2022
Johnson Controls will roll out the Tempered Networks platform across deployments of its OpenBlue AI-enabled platform.
June 23, 2022
3 min read
Article
Pair of Brand-New Cybersecurity Bills Become Law
Bipartisan legislation allows cybersecurity experts to work across multiple agencies and provides federal support for local governments.
June 23, 2022
Bipartisan legislation allows cybersecurity experts to work across multiple agencies and provides federal support for local governments.
by Dark Reading Staff, Dark Reading
June 23, 2022
1 min read
Article
80% of Legacy MSSP Users Planning MDR Upgrade
False positives and staff shortages are inspiring a massive managed detection and response (MDR) services migration, research finds.
June 23, 2022
False positives and staff shortages are inspiring a massive managed detection and response (MDR) services migration, research finds.
by Dark Reading Staff, Dark Reading
June 23, 2022
1 min read
Article
Microsoft 365 Users in US Face Raging Spate of Attacks
A voicemail-themed phishing campaign is hitting specific industry verticals across the country, bent on scavenging credentials that can be used for a range of nefarious purposes.
June 22, 2022
A voicemail-themed phishing campaign is hitting specific industry verticals across the country, bent on scavenging credentials that can be used for a range of nefarious purposes.
by Tara Seals, Managing Editor, News, Dark Reading
June 22, 2022
7 min read
Article
Getting a Better Handle on Identity Management in the Cloud
Treat identity management as a first-priority problem, not something to figure out later while you get your business up and running in the cloud.
June 22, 2022
Treat identity management as a first-priority problem, not something to figure out later while you get your business up and running in the cloud.
by Matt Quirion, Director of Design and Engineering, Kion
June 22, 2022
5 min read
Article
80% of Firms Suffered Identity-Related Breaches in Last 12 Months
With almost every business experiencing growth in human and machine identities, firms have made securing those identities a priority.
June 22, 2022
With almost every business experiencing growth in human and machine identities, firms have made securing those identities a priority.
by Robert Lemos, Contributing Writer, Dark Reading
June 22, 2022
4 min read
Article
7 Ways to Avoid Worst-Case Cyber Scenarios
In the wake of devastating attacks, here are some of the best techniques and policies a company can implement to protect its data.
June 21, 2022
In the wake of devastating attacks, here are some of the best techniques and policies a company can implement to protect its data.
by Sakshi Udavant, Freelance Writer
June 21, 2022
1 min read
Article
Name That Toon: Cuter Than a June Bug
Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card.
June 20, 2022
Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card.
by John Klossner, Cartoonist
June 20, 2022
1 min read
Article
Are You Hiring Enough Entry-Level Security Pros?
New (ISC)² survey shows employment levels for entry-level cyber pros lag behind every other experience level.
June 16, 2022
New (ISC)² survey shows employment levels for entry-level cyber pros lag behind every other experience level.
by Ericka Chickowski, Contributing Writer, Dark Reading
June 16, 2022
5 min read
Article
In Case You Missed RSA Conference 2022: A News Digest
Here's a rundown of Dark Reading's reporting and commentary from and surrounding the first in-person RSA Conference since the pandemic began in 2020.
June 14, 2022
Here's a rundown of Dark Reading's reporting and commentary from and surrounding the first in-person RSA Conference since the pandemic began in 2020.
by Dark Reading Staff, Dark Reading
June 14, 2022
4 min read
Article