informa
/

Privacy

Researchers Find Significant Vulnerabilities in macOS Privacy Protections
Attacks require executing code on a system but foil Apple's approach to protecting private data and systems files.
August 05, 2021
Attacks require executing code on a system but foil Apple's approach to protecting private data and systems files.
by Robert Lemos, Contributing Writer
August 05, 2021
4 min read
Article
Why Trust Matters for the National Artificial Intelligence Research Resource Task Force
As the National Artificial Intelligence Research Resource Task Force sets about its work preparing recommendations for t...
July 27, 2021
As the National Artificial Intelligence Research Resource Task Force sets about its work preparing recommendations for t...
by Richard Searle, Customer Solutions Director at Fortanix
July 27, 2021
5 min read
Article
Name That Toon: Buzzard Bestie
Feeling creative? Come up with a clever caption for this month's contest, and our panel of experts will reward the winne...
July 20, 2021
Feeling creative? Come up with a clever caption for this month's contest, and our panel of experts will reward the winne...
by John Klossner, Cartoonist
July 20, 2021
1 min read
Article
Cartoon Caption Winner: Sight Unseen
And the winner of Dark Reading's June contest is ...
July 09, 2021
And the winner of Dark Reading's June contest is ...
by John Klossner, Cartoonist
July 09, 2021
1 min read
Article
8 Ways to Preserve Legal Privilege After a Cybersecurity Incident
Knowing your legal distinctions can make defense easier should you end up in court after a breach, attack, or data loss.
July 02, 2021
Knowing your legal distinctions can make defense easier should you end up in court after a breach, attack, or data loss.
by Caroline Morgan & Melissa Parisi, Partner, Culhane Meadows, PLLC / Senior Director of Worldwide Privacy, Herbalife Nutrition
July 02, 2021
5 min read
Article
The Role of Encryption in Protecting LGBTQ+ Community Members
The Internet is a vital tool that helps LGBTQ+ community members communicate without fear of persecution — and strong en...
June 28, 2021
The Internet is a vital tool that helps LGBTQ+ community members communicate without fear of persecution — and strong en...
by Anna Higgins, Policy Advisor, Internet Society
June 28, 2021
5 min read
Article
Data Privacy Is in 23andMe CSO's DNA
How serious is the company about safeguarding its customers and their genetic information? "We're hiding data even from ...
June 25, 2021
How serious is the company about safeguarding its customers and their genetic information? "We're hiding data even from ...
by Carlo Massimo, Freelance Writer
June 25, 2021
4 min read
Article
Survey Seeks to Learn How 2020 Changed Security
Respondents to a new Dark Reading/Omdia survey will be entered into a drawing for a Black Hat Black Card.
June 23, 2021
Respondents to a new Dark Reading/Omdia survey will be entered into a drawing for a Black Hat Black Card.
by Dark Reading Staff, Dark Reading
June 23, 2021
1 min read
Article
Security Experts Scrutinize Apple, Amazon IoT Networks
Both companies have done their due diligence in creating connected-device networks, but the pervasiveness of the devices...
June 15, 2021
Both companies have done their due diligence in creating connected-device networks, but the pervasiveness of the devices...
by Robert Lemos, Contributing Writer
June 15, 2021
4 min read
Article
Name That Toon: Sight Unseen
Feeling creative? Submit your caption in the comments, and our panel of experts will reward the winner with a $25 Amazon...
June 14, 2021
Feeling creative? Submit your caption in the comments, and our panel of experts will reward the winner with a $25 Amazon...
by John Klossner, Cartoonist
June 14, 2021
1 min read
Article
What to Know About Updates to the PCI Secure Software Standard
New requirements add 50 controls covering five control objectives. Here's a high-level look at each objective.
June 09, 2021
New requirements add 50 controls covering five control objectives. Here's a high-level look at each objective.
by Sean Smith, Manager II, PCI Compliance Services, Optiv
June 09, 2021
4 min read
Article
Sophos Research Uncovers Widespread Use of TLS By Cybercriminals
SPONSORED CONTENT: Nearly half of all malware is being disseminated via the Transport Layer Security cryptographic proto...
May 24, 2021
SPONSORED CONTENT: Nearly half of all malware is being disseminated via the Transport Layer Security cryptographic proto...
by Terry Sweeney, Contributing Editor
May 24, 2021
1 min read
Article
Best 11 Quotes From Cryptographers' Panel
Cryptographers at an RSA Conference panel aren't worried about adversarial quantum cryptography. Machine learning, thoug...
May 18, 2021
Cryptographers at an RSA Conference panel aren't worried about adversarial quantum cryptography. Machine learning, thoug...
by Sara Peters, Senior Editor
May 18, 2021
1 min read
Article
How Faster COVID-19 Research Is Being Made Possible by Secure Silicon
When Intel and Leidos set up a "trusted execution environment" to enable a widespread group of researchers to securely s...
May 14, 2021
When Intel and Leidos set up a "trusted execution environment" to enable a widespread group of researchers to securely s...
by Sara Peters, Senior Editor
May 14, 2021
6 min read
Article
Cartoon Caption Winner: Greetings, Earthlings
And the winner of Dark Reading's April cartoon caption contest is ...
May 11, 2021
And the winner of Dark Reading's April cartoon caption contest is ...
by:
May 11, 2021
1 min read
Article