The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches
Cloud
ICS/OT
Remote Workforce
Perimeter
Analytics
Security Monitoring
Security Monitoring
App Sec
Database Security
Database Security
Risk
Compliance
Compliance
Threat Intelligence
Endpoint
Authentication
Mobile Security
Privacy
Authentication
Mobile Security
Privacy
Vulnerabilities / Threats
Advanced Threats
Insider Threats
Vulnerability Management
Advanced Threats
Insider Threats
Vulnerability Management
Operations
Identity & Access Management
Careers & People
Identity & Access Management
Careers & People
Physical Security
IoT
Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
Emerging Cybersecurity Technologies - A Dark Reading Mar 23 Event
Black Hat USA - August 5-10 - Learn More
Webinars
A Roadmap to Zero Trust: Steps for Meaningful Progress Amongst the Hype
Feb 01, 2023
Every DDoS Resilience and Response Playbook Should Include These Things
Feb 02, 2023
Resources
Close
Back
Resources
Reports >
Slideshows >
Tech Library >
Webinars >
White Papers >
Partner Perspectives: Microsoft
Partner Perspectives: Zscaler
Newsletter
The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches
Cloud
ICS/OT
Remote Workforce
Perimeter
Analytics
Security Monitoring
Security Monitoring
App Sec
Database Security
Database Security
Risk
Compliance
Compliance
Threat Intelligence
Endpoint
Authentication
Mobile Security
Privacy
Authentication
Mobile Security
Privacy
Vulnerabilities / Threats
Advanced Threats
Insider Threats
Vulnerability Management
Advanced Threats
Insider Threats
Vulnerability Management
Operations
Identity & Access Management
Careers & People
Identity & Access Management
Careers & People
Physical Security
IoT
Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
Emerging Cybersecurity Technologies - A Dark Reading Mar 23 Event
Black Hat USA - August 5-10 - Learn More
Webinars
A Roadmap to Zero Trust: Steps for Meaningful Progress Amongst the Hype
Feb 01, 2023
Every DDoS Resilience and Response Playbook Should Include These Things
Feb 02, 2023
Resources
Close
Back
Resources
Reports >
Slideshows >
Tech Library >
Webinars >
White Papers >
Partner Perspectives: Microsoft
Partner Perspectives: Zscaler
The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches
Cloud
ICS/OT
Remote Workforce
Perimeter
Analytics
Security Monitoring
Security Monitoring
App Sec
Database Security
Database Security
Risk
Compliance
Compliance
Threat Intelligence
Endpoint
Authentication
Mobile Security
Privacy
Authentication
Mobile Security
Privacy
Vulnerabilities / Threats
Advanced Threats
Insider Threats
Vulnerability Management
Advanced Threats
Insider Threats
Vulnerability Management
Operations
Identity & Access Management
Careers & People
Identity & Access Management
Careers & People
Physical Security
IoT
Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
Emerging Cybersecurity Technologies - A Dark Reading Mar 23 Event
Black Hat USA - August 5-10 - Learn More
Webinars
A Roadmap to Zero Trust: Steps for Meaningful Progress Amongst the Hype
Feb 01, 2023
Every DDoS Resilience and Response Playbook Should Include These Things
Feb 02, 2023
Resources
Close
Back
Resources
Reports >
Slideshows >
Tech Library >
Webinars >
White Papers >
Partner Perspectives: Microsoft
Partner Perspectives: Zscaler
Newsletter
SEARCH
A minimum of 3 characters are required to be typed in the search bar in order to perform a search.
Announcements
Event
Emerging Cybersecurity Technologies: What You Need to Know - A Dark Reading March 23 Virtual Event | <GET YOUR PASS>
Event
The Craziest Cyberattacks Seen In the Wild and How You Can Avoid Them | Jan 24 Webinar | <REGISTER NOW>
Report
Black Hat USA 2022 Attendee Report | Supply Chain & Cloud Security Risks Are Top of Mind | <READ IT NOW>
Previous
Next
Perimeter
Breaking news, news analysis, and expert commentary on threats to the network perimeter, and the tools & technologies for securing it.
Name That Toon: Poker Hand
Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card.
January 19, 2023
Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card.
by John Klossner, Cartoonist
January 19, 2023
1 MIN READ
Article
Cybercriminals Target Telecom Provider Networks
The growing use of mobile devices for MFA and the proliferation of 5G and VoIP in general could result in more attacks in future, experts say.
January 19, 2023
The growing use of mobile devices for MFA and the proliferation of 5G and VoIP in general could result in more attacks in future, experts say.
by Jai Vijayan, Contributing Writer, Dark Reading
January 19, 2023
7 MIN READ
Article
WEF's Global Risks Report 2023 Keeps Cybersecurity on the Agenda
Critical national infrastructure, widespread cybercrime, and cyber insecurity are major risks in the report
January 13, 2023
Critical national infrastructure, widespread cybercrime, and cyber insecurity are major risks in the report
by Maxine Holt, Research Director, Omdia
January 13, 2023
3 MIN READ
Article
Critical Cisco SMB Router Flaw Allows Authentication Bypass, PoC Available
Unpatched Cisco bugs, tracked as CVE-2023-20025 and CVE-2023-20026, allow lateral movement, data theft, and malware infestations.
January 12, 2023
Unpatched Cisco bugs, tracked as CVE-2023-20025 and CVE-2023-20026, allow lateral movement, data theft, and malware infestations.
by Tara Seals, Managing Editor, News, Dark Reading
January 12, 2023
3 MIN READ
Article
Catchpoint Announces Solution to Monitor and Protect Companies From BGP Incidents
Catchpoint’s Internet Performance Monitoring Platform helps IT teams identify and mitigate BGP incidents, including hijack attempts and routing issues, with the industry’s broadest network of vantage points in the world drawing on real-time BGP monitoring.
January 11, 2023
Catchpoint’s Internet Performance Monitoring Platform helps IT teams identify and mitigate BGP incidents, including hijack attempts and routing issues, with the industry’s broadest network of vantage points in the world drawing on real-time BGP monitoring.
January 11, 2023
4 MIN READ
Article
Infoblox Appoints Scott Harrell to CEO
Jesper Andersen has decided to retire and will continue to serve on the Board of Directors.
January 11, 2023
Jesper Andersen has decided to retire and will continue to serve on the Board of Directors.
January 11, 2023
3 MIN READ
Article
US Based ICOIN Technology Announces Secure Messaging Solution Using Hardware Wallet Encryption
January 05, 2023
January 05, 2023
2 MIN READ
Article
Name That Toon: Kiss and Tell
Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card.
December 21, 2022
Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card.
by John Klossner, Cartoonist
December 21, 2022
1 MIN READ
Article
With SASE Definition Still Cloudy, Forum Proposes Standard
Even without an overarching dictionary of common definitions, the concept of a secure access service edge (SASE) has spread, but a standard could help cloud services work better together.
December 16, 2022
Even without an overarching dictionary of common definitions, the concept of a secure access service edge (SASE) has spread, but a standard could help cloud services work better together.
by Robert Lemos, Contributing Writer, Dark Reading
December 16, 2022
3 MIN READ
Article
Identity Digital Releases Its First DNS Anti-Abuse Report
The quarterly report, made possible by its Dynamic Defense™ service, demonstrates significant progress in mitigating domain abuse among its top-level domains (TLDs).
November 30, 2022
The quarterly report, made possible by its Dynamic Defense™ service, demonstrates significant progress in mitigating domain abuse among its top-level domains (TLDs).
November 30, 2022
2 MIN READ
Article
Name That Toon: Fall Cleanup
Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card.
November 21, 2022
Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card.
by John Klossner, Cartoonist
November 21, 2022
1 MIN READ
Article
Zero-Trust Initiatives Stall, as Cyberattack Costs Rocket to $1M per Incident
Researchers find current data protections strategies are failing to get the job done, and IT leaders are concerned, while a lack of qualified IT security talent hampers cyber-defense initiatives.
November 17, 2022
Researchers find current data protections strategies are failing to get the job done, and IT leaders are concerned, while a lack of qualified IT security talent hampers cyber-defense initiatives.
by Nathan Eddy, Contributing Writer, Dark Reading
November 17, 2022
6 MIN READ
Article
Akamai Announces Next Generation DDoS Defense Platform
Upgrade boosts Akamai's dedicated mitigation capacity by 100% and enhances attack fighting capabilities for increasingly sophisticated DDoS threats.
October 25, 2022
Upgrade boosts Akamai's dedicated mitigation capacity by 100% and enhances attack fighting capabilities for increasingly sophisticated DDoS threats.
October 25, 2022
3 MIN READ
Article
Passkey Demos Hint at What's Ahead for Passwordless Authentication
At the Authenticate Conference, Google and Microsoft demonstrated their passkey prototypes. Apple, meanwhile, already launched its version in iOS 16.
October 21, 2022
At the Authenticate Conference, Google and Microsoft demonstrated their passkey prototypes. Apple, meanwhile, already launched its version in iOS 16.
by Jeffrey Schwartz, Contributing Writer, Dark Reading
October 21, 2022
5 MIN READ
Article
Corsa Security Drives Forward with Additional $10 Million Funding
Latest investment to broaden integrations with top firewall vendors.
October 20, 2022
Latest investment to broaden integrations with top firewall vendors.
October 20, 2022
2 MIN READ
Article