informa

Risk

White House Meets With Software Firms and Open Source Orgs on Security
The Log4j vulnerability is only the latest security flaw to have global impact, prompting the Biden administration and software developers to pledge to produce more secure software.
January 14, 2022
The Log4j vulnerability is only the latest security flaw to have global impact, prompting the Biden administration and software developers to pledge to produce more secure software.
by Robert Lemos, Contributing Writer
January 14, 2022
5 min read
Article
What's Next for Patch Management: Automation
The next five years will bring the widespread use of hyperautomation in patch management. Part 3 of 3.
January 14, 2022
The next five years will bring the widespread use of hyperautomation in patch management. Part 3 of 3.
by Srinivas Mukkamala, Senior Vice President, Security Products, Ivanti
January 14, 2022
5 min read
Article
How Cybercriminals Are Cashing in on the Culture of 'Yes'
The reward is always front of mind, while the potential harm of giving out a phone number doesn't immediately reveal itself.
January 13, 2022
The reward is always front of mind, while the potential harm of giving out a phone number doesn't immediately reveal itself.
by Mike Kiser, Director of Strategy and Standards, SailPoint
January 13, 2022
5 min read
Article
Why Is Cyber Assessment So Important in Security?
All the pen testing and tabletop exercises in the world won't help unless an organization has a complete and accurate understanding of its assets.
January 12, 2022
All the pen testing and tabletop exercises in the world won't help unless an organization has a complete and accurate understanding of its assets.
by Erkang Zheng, Founder and CEO, JupiterOne
January 12, 2022
2 min read
Article
Patch Management Today: A Risk-Based Strategy to Defeat Cybercriminals
By combining risk-based vulnerability prioritization and automated patch intelligence, organizations can apply patches based on threat level. Part 2 of 3.
January 12, 2022
By combining risk-based vulnerability prioritization and automated patch intelligence, organizations can apply patches based on threat level. Part 2 of 3.
by Srinivas Mukkamala, Senior Vice President, Security Products, Ivanti
January 12, 2022
4 min read
Article
Let's Play! Raising the Stakes for Threat Modeling With Card Games
On a recent Friday night, three security experts got together to play custom games that explore attack risks in an engaging way.
January 11, 2022
On a recent Friday night, three security experts got together to play custom games that explore attack risks in an engaging way.
by Andrada Fiscutean, Contributing Writer
January 11, 2022
7 min read
Article
Honeywell Adds Deception Tech to Building Automation Systems Security
New OT security platform directs attackers toward phony assets to deflect threats.
January 11, 2022
New OT security platform directs attackers toward phony assets to deflect threats.
by Dark Reading Staff, Dark Reading
January 11, 2022
2 min read
Article
FBI, NSA & CISA Issue Advisory on Russian Cyber Threat to US Critical Infrastructure
Advisory explains how to detect, respond to, and mitigate cyberattacks from Russian state-sponsored hacking groups.
January 11, 2022
Advisory explains how to detect, respond to, and mitigate cyberattacks from Russian state-sponsored hacking groups.
by Dark Reading Staff, Dark Reading
January 11, 2022
1 min read
Article
Breach Response Shift: More Lawyers, Less Cyber-Insurance Coverage
Companies are more likely to rely on outside attorneys to handle cyber response in order to contain potential lawsuits. Meanwhile, cyber-insurance premiums are rising but covering less.
January 10, 2022
Companies are more likely to rely on outside attorneys to handle cyber response in order to contain potential lawsuits. Meanwhile, cyber-insurance premiums are rising but covering less.
by Robert Lemos, Contributing Writer
January 10, 2022
5 min read
Article
Cerberus Sentinel Acquires True Digital Security
US cybersecurity services firm expands security services and network monitoring capabilities.
January 07, 2022
US cybersecurity services firm expands security services and network monitoring capabilities.
January 07, 2022
3 min read
Article
Why Cyber Due Diligence Is Essential to the M&A Process
That announcement may feel good, but if your prospective acquisition's cybersecurity levels are substandard, it might be best to hold off.
December 29, 2021
That announcement may feel good, but if your prospective acquisition's cybersecurity levels are substandard, it might be best to hold off.
by Jim Crowley, CEO at Industrial Defender
December 29, 2021
5 min read
Article
Nearly 50% of People Will Abandon Sites Prohibiting Password Reuse
A new study investigating consumer password use found 25% of online shoppers would abandon their carts of $100 if prompted to reset a password at checkout.
December 22, 2021
A new study investigating consumer password use found 25% of online shoppers would abandon their carts of $100 if prompted to reset a password at checkout.
by Steve Zurier, Contributing Writer
December 22, 2021
4 min read
Article
93% of Tested Networks Vulnerable to Breach, Pen Testers Find
Data from dozens of penetration tests and security assessments suggest nearly every organization can be infiltrated by cyberattackers.
December 21, 2021
Data from dozens of penetration tests and security assessments suggest nearly every organization can be infiltrated by cyberattackers.
by Robert Lemos, Contributing Writer
December 21, 2021
4 min read
Article
Lights Out: Cyberattacks Shut Down Building Automation Systems
Security experts in Germany discover similar attacks that lock building engineering management firms out of the BASes they built and manage — by turning a security feature against them.
December 20, 2021
Security experts in Germany discover similar attacks that lock building engineering management firms out of the BASes they built and manage — by turning a security feature against them.
by Kelly Jackson Higgins, Executive Editor
December 20, 2021
9 min read
Article
Executive Partnerships Are Critical for Cybersecurity Success
One leader alone can't protect an organization from cyber threats, C-suite leaders agree.
December 17, 2021
One leader alone can't protect an organization from cyber threats, C-suite leaders agree.
by Sakshi Udavant, Freelance writer.
December 17, 2021
4 min read
Article