The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches
Cloud
ICS/OT
Remote Workforce
Perimeter
Analytics
Security Monitoring
Security Monitoring
App Sec
Database Security
Database Security
Risk
Compliance
Compliance
Threat Intelligence
Endpoint
Authentication
Mobile Security
Privacy
Authentication
Mobile Security
Privacy
Vulnerabilities / Threats
Advanced Threats
Insider Threats
Vulnerability Management
Advanced Threats
Insider Threats
Vulnerability Management
Operations
Identity & Access Management
Careers & People
Identity & Access Management
Careers & People
Physical Security
IoT
Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
Black Hat USA - August 5-10 - Learn More
Black Hat Asia - May 9-12 - Learn More
Webinars
Building Out the Best Response Playbook for Ransomware Attacks
Mar 28, 2023
ChatGPT: Defending Your Business Against AI-Supercharged Ransomware
Mar 29, 2023
Resources
Close
Back
Resources
Dark Reading Library >
Webinars >
Reports >
Slideshows >
White Papers >
Partner Perspectives: Microsoft
Tech Library >
Newsletter
The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches
Cloud
ICS/OT
Remote Workforce
Perimeter
Analytics
Security Monitoring
Security Monitoring
App Sec
Database Security
Database Security
Risk
Compliance
Compliance
Threat Intelligence
Endpoint
Authentication
Mobile Security
Privacy
Authentication
Mobile Security
Privacy
Vulnerabilities / Threats
Advanced Threats
Insider Threats
Vulnerability Management
Advanced Threats
Insider Threats
Vulnerability Management
Operations
Identity & Access Management
Careers & People
Identity & Access Management
Careers & People
Physical Security
IoT
Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
Black Hat USA - August 5-10 - Learn More
Black Hat Asia - May 9-12 - Learn More
Webinars
Building Out the Best Response Playbook for Ransomware Attacks
Mar 28, 2023
ChatGPT: Defending Your Business Against AI-Supercharged Ransomware
Mar 29, 2023
Resources
Close
Back
Resources
Dark Reading Library >
Webinars >
Reports >
Slideshows >
White Papers >
Partner Perspectives: Microsoft
Tech Library >
The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches
Cloud
ICS/OT
Remote Workforce
Perimeter
Analytics
Security Monitoring
Security Monitoring
App Sec
Database Security
Database Security
Risk
Compliance
Compliance
Threat Intelligence
Endpoint
Authentication
Mobile Security
Privacy
Authentication
Mobile Security
Privacy
Vulnerabilities / Threats
Advanced Threats
Insider Threats
Vulnerability Management
Advanced Threats
Insider Threats
Vulnerability Management
Operations
Identity & Access Management
Careers & People
Identity & Access Management
Careers & People
Physical Security
IoT
Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
Black Hat USA - August 5-10 - Learn More
Black Hat Asia - May 9-12 - Learn More
Webinars
Building Out the Best Response Playbook for Ransomware Attacks
Mar 28, 2023
ChatGPT: Defending Your Business Against AI-Supercharged Ransomware
Mar 29, 2023
Resources
Close
Back
Resources
Dark Reading Library >
Webinars >
Reports >
Slideshows >
White Papers >
Partner Perspectives: Microsoft
Tech Library >
Newsletter
SEARCH
A minimum of 3 characters are required to be typed in the search bar in order to perform a search.
Announcements
Event
Emerging Cybersecurity Technologies: What You Need to Know - A Dark Reading March 23 Virtual Event | <GET YOUR PASS>
Report
Black Hat USA 2022 Attendee Report | Supply Chain & Cloud Security Risks Are Top of Mind | <READ IT NOW>
Previous
Next
Perimeter
Breaking news, news analysis, and expert commentary on threats to the network perimeter, and the tools & technologies for securing it.
Attackers Are Probing for Zero-Day Vulns in Edge Infrastructure Products
Nearly 20% of the zero-day flaws that attackers exploited in 2022 were in network, security, and IT management products, Mandiant says.
March 22, 2023
Nearly 20% of the zero-day flaws that attackers exploited in 2022 were in network, security, and IT management products, Mandiant says.
by Jai Vijayan, Contributing Writer, Dark Reading
March 22, 2023
4 MIN READ
Article
Name That Toon: It's E-Live!
Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card.
March 21, 2023
Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card.
by John Klossner, Cartoonist
March 21, 2023
1 MIN READ
Article
Change Is Coming to the Network Detection and Response (NDR) Market
After years of relative stability and steady growth, Omdia research indicates the NDR segment is poised for rapid change.
March 16, 2023
After years of relative stability and steady growth, Omdia research indicates the NDR segment is poised for rapid change.
by Andrew Braunberg, Principal Analyst, SecOps, Omdia
March 16, 2023
2 MIN READ
Article
Cyberattackers Continue Assault Against Fortinet Devices
Patched earlier this month, a code-execution vulnerability is the latest FortiOS weakness to be exploited by attackers, who see the devices as well-placed targets for initial access operations.
March 15, 2023
Patched earlier this month, a code-execution vulnerability is the latest FortiOS weakness to be exploited by attackers, who see the devices as well-placed targets for initial access operations.
by Robert Lemos, Contributing Writer, Dark Reading
March 15, 2023
3 MIN READ
Article
Emotet, QSnatch Malware Dominate Malicious DNS Traffic
An analysis of trillions of DNS requests shows a shocking amount of malicious traffic inside enterprise networks, with threats using DNS as a sort of malicious Autobahn.
March 14, 2023
An analysis of trillions of DNS requests shows a shocking amount of malicious traffic inside enterprise networks, with threats using DNS as a sort of malicious Autobahn.
by Elizabeth Montalbano, Contributor, Dark Reading
March 14, 2023
4 MIN READ
Article
Name That Toon: Join the Club
Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card.
February 21, 2023
Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card.
by John Klossner, Cartoonist
February 21, 2023
1 MIN READ
Article
Name That Toon: Poker Hand
Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card.
January 19, 2023
Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card.
by John Klossner, Cartoonist
January 19, 2023
1 MIN READ
Article
Cybercriminals Target Telecom Provider Networks
The growing use of mobile devices for MFA and the proliferation of 5G and VoIP in general could result in more attacks in future, experts say.
January 19, 2023
The growing use of mobile devices for MFA and the proliferation of 5G and VoIP in general could result in more attacks in future, experts say.
by Jai Vijayan, Contributing Writer, Dark Reading
January 19, 2023
7 MIN READ
Article
WEF's Global Risks Report 2023 Keeps Cybersecurity on the Agenda
Critical national infrastructure, widespread cybercrime, and cyber insecurity are major risks in the report
January 13, 2023
Critical national infrastructure, widespread cybercrime, and cyber insecurity are major risks in the report
by Maxine Holt, Research Director, Omdia
January 13, 2023
3 MIN READ
Article
Critical Cisco SMB Router Flaw Allows Authentication Bypass, PoC Available
Unpatched Cisco bugs, tracked as CVE-2023-20025 and CVE-2023-20026, allow lateral movement, data theft, and malware infestations.
January 12, 2023
Unpatched Cisco bugs, tracked as CVE-2023-20025 and CVE-2023-20026, allow lateral movement, data theft, and malware infestations.
by Tara Seals, Managing Editor, News, Dark Reading
January 12, 2023
3 MIN READ
Article
Catchpoint Announces Solution to Monitor and Protect Companies From BGP Incidents
Catchpoint’s Internet Performance Monitoring Platform helps IT teams identify and mitigate BGP incidents, including hijack attempts and routing issues, with the industry’s broadest network of vantage points in the world drawing on real-time BGP monitoring.
January 11, 2023
Catchpoint’s Internet Performance Monitoring Platform helps IT teams identify and mitigate BGP incidents, including hijack attempts and routing issues, with the industry’s broadest network of vantage points in the world drawing on real-time BGP monitoring.
January 11, 2023
4 MIN READ
Article
Infoblox Appoints Scott Harrell to CEO
Jesper Andersen has decided to retire and will continue to serve on the Board of Directors.
January 11, 2023
Jesper Andersen has decided to retire and will continue to serve on the Board of Directors.
January 11, 2023
3 MIN READ
Article
US Based ICOIN Technology Announces Secure Messaging Solution Using Hardware Wallet Encryption
January 05, 2023
January 05, 2023
2 MIN READ
Article
Name That Toon: Kiss and Tell
Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card.
December 21, 2022
Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card.
by John Klossner, Cartoonist
December 21, 2022
1 MIN READ
Article
With SASE Definition Still Cloudy, Forum Proposes Standard
Even without an overarching dictionary of common definitions, the concept of a secure access service edge (SASE) has spread, but a standard could help cloud services work better together.
December 16, 2022
Even without an overarching dictionary of common definitions, the concept of a secure access service edge (SASE) has spread, but a standard could help cloud services work better together.
by Robert Lemos, Contributing Writer, Dark Reading
December 16, 2022
3 MIN READ
Article