informa
/

Operations

How Do I Let Go of 'Human Error' as an Explanation for Incidents?
Successfully learning from incidents requires a deeper and more expansive perspective of them.
July 27, 2021
Successfully learning from incidents requires a deeper and more expansive perspective of them.
by Kelly Shortridge, Senior Principal at Fastly
July 27, 2021
2 min read
Article
When Software Updates Get Hacked
Darned if you do, darned if you don't: Software fixes have become extensively automated, which works when software suppl...
July 26, 2021
Darned if you do, darned if you don't: Software fixes have become extensively automated, which works when software suppl...
by Robert Lemos, Contributing Writer
July 26, 2021
6 min read
Article
SynSaber Launches With $2.5M to Defend Critical Infrastructure
The new company aims to develop simple, low-hardware asset and network monitoring for the industrial ecosystem.
July 22, 2021
The new company aims to develop simple, low-hardware asset and network monitoring for the industrial ecosystem.
by Dark Reading Staff, Dark Reading
July 22, 2021
2 min read
Article
7 Hot Cyber Threat Trends to Expect at Black Hat
A sneak peek of some of the main themes at Black Hat USA next month.
July 21, 2021
A sneak peek of some of the main themes at Black Hat USA next month.
by Ericka Chickowski, Contributing Writer
July 21, 2021
1 min read
Slideshow
Cybersecurity Through the Lens of COVID
Whether you're talking about pandemics or cybersecurity attacks, public health and information security can use the same...
July 21, 2021
Whether you're talking about pandemics or cybersecurity attacks, public health and information security can use the same...
by Greg Bell, Co-founder & Chief Strategy Officer, Corelight
July 21, 2021
4 min read
Article
Top Security Leaders Share Management Tips, Lessons, and Stories
A panel of experts from Microsoft, Twitter, Cisco, and MongoDB share their thoughts on non-technical CISOs, managing thr...
July 21, 2021
A panel of experts from Microsoft, Twitter, Cisco, and MongoDB share their thoughts on non-technical CISOs, managing thr...
by Kelly Sheridan, Senior Editor
July 21, 2021
8 min read
Article
Google Cloud Debuts Security Tools for Public & Private Sectors
Today's announcements include a cloud-native intrusion detection system and government-focused offerings that comply wit...
July 20, 2021
Today's announcements include a cloud-native intrusion detection system and government-focused offerings that comply wit...
by Kelly Sheridan, Senior Editor
July 20, 2021
4 min read
Article
Name That Toon: Buzzard Bestie
Feeling creative? Come up with a clever caption for this month's contest, and our panel of experts will reward the winne...
July 20, 2021
Feeling creative? Come up with a clever caption for this month's contest, and our panel of experts will reward the winne...
by John Klossner, Cartoonist
July 20, 2021
1 min read
Article
Big Game Makes Easy Prey for Cybercriminals
By adopting nation-state methods, cybercriminals have moved on from small prey to large targets to rake in millions of d...
July 20, 2021
By adopting nation-state methods, cybercriminals have moved on from small prey to large targets to rake in millions of d...
by Ian Pratt, Global Head of Security for Personal Systems at HP Inc.
July 20, 2021
4 min read
Article
ShardSecure Closes Funding Round Led by EPIC Ventures
Pre-Series A funding round of $2.5 M
July 20, 2021
Pre-Series A funding round of $2.5 M
July 20, 2021
4 min read
Article
Qrypt Enables Businesses to Easily Replicate the Data Security of Air-Gapped Networks
New Data at Rest Application Offers Secure Data Storage with Quantum-Generated One-Time Pad Encryption for Enterprises, ...
July 19, 2021
New Data at Rest Application Offers Secure Data Storage with Quantum-Generated One-Time Pad Encryption for Enterprises, ...
July 19, 2021
4 min read
Article
MITRE Engenuity Releases First ATT&CK® Evaluations for Industrial Control Systems Security Tools
ATT&CK® Evaluations for ICS Emulated Threats from Triton Malware
July 19, 2021
ATT&CK® Evaluations for ICS Emulated Threats from Triton Malware
July 19, 2021
5 min read
Article
When Ransomware Comes to (Your) Town
While steps for defending against a ransomware attack vary based on the size of the government entity and the resources ...
July 19, 2021
While steps for defending against a ransomware attack vary based on the size of the government entity and the resources ...
by Derek Prall, Contributing Writer
July 19, 2021
7 min read
Article
Breaking Down the Threat of Going All-In With Microsoft Security
Limit risk by dividing responsibility for infrastructure, tools, and security.
July 19, 2021
Limit risk by dividing responsibility for infrastructure, tools, and security.
by Nat Kausik, CEO and Co-Founder of Bitglass
July 19, 2021
4 min read
Article
7 Ways AI and ML Are Helping and Hurting Cybersecurity
In the right hands, artificial intelligence and machine learning can enrich our cyber defenses. In the wrong hands, they...
July 19, 2021
In the right hands, artificial intelligence and machine learning can enrich our cyber defenses. In the wrong hands, they...
by Andrey Shklyarov & Dmitry Vyrostkov, Chief Compliance Officer, DataArt / Chief Software Architect, Security Services, DataArt
July 19, 2021
5 min read
Article