informa

Risk

OMB Issues Zero-Trust Strategy for Federal Agencies
Federal officials tout the strategy as a more proactive approach to securing government networks.
January 26, 2022
Federal officials tout the strategy as a more proactive approach to securing government networks.
by Dark Reading Staff, Dark Reading
January 26, 2022
1 min read
Article
VPNLab.net Shuttered in Latest Spate of Global Takedowns
Europol and 10 nations seized servers and disconnected the anonymous network allegedly used by many cybercriminals in the latest effort to hobble cybercrime groups.
January 26, 2022
Europol and 10 nations seized servers and disconnected the anonymous network allegedly used by many cybercriminals in the latest effort to hobble cybercrime groups.
by Robert Lemos, Contributing Writer
January 26, 2022
4 min read
Article
8 Security Startups to Watch in 2022
Cloud security, API security, and incident response are among the issues up-and-coming security companies are working on.
January 25, 2022
Cloud security, API security, and incident response are among the issues up-and-coming security companies are working on.
by Kelly Sheridan, Senior Editor
January 25, 2022
1 min read
Article
Cyber-Physical Security: What It Is and What You Should Do
Ancillary installations like the Internet of Things, operational technology, and industrial control systems enable lots of great functionality, and they face most of the same risks as IT infrastructure.
January 25, 2022
Ancillary installations like the Internet of Things, operational technology, and industrial control systems enable lots of great functionality, and they face most of the same risks as IT infrastructure.
by Morey Haber, CTO and CISO, BeyondTrust
January 25, 2022
5 min read
Article
DHS Sounds Alarm on Potential for Major Russian Cyberattacks on US
Latest bulletin out of DHS advises state and local governments, critical infrastructure operators to be on alert.
January 24, 2022
Latest bulletin out of DHS advises state and local governments, critical infrastructure operators to be on alert.
by Dark Reading Staff, Dark Reading
January 24, 2022
2 min read
Article
Fraud Is On the Rise, and It's Going to Get Worse
The acceleration of the digital transformation resulted in a surge of online transactions, greater adoption of digital payments, and increased fraud.
January 21, 2022
The acceleration of the digital transformation resulted in a surge of online transactions, greater adoption of digital payments, and increased fraud.
by Edge Editors, Dark Reading
January 21, 2022
3 min read
Article
Preparing for the Next Cybersecurity Epidemic: Deepfakes
Using blockchain, multifactor authentication, or signatures can help boost authentication security and reduce fraud.
January 19, 2022
Using blockchain, multifactor authentication, or signatures can help boost authentication security and reduce fraud.
by Elaine Lee, Principal Data Scientist, Cybergraph team, Mimecast
January 19, 2022
4 min read
Article
Take 'Urgent' Steps to Secure Systems From Damaging Attacks, CISA Says
CISA issues alert for senior leadership of US organizations amid rising tensions between Russia and Ukraine.
January 18, 2022
CISA issues alert for senior leadership of US organizations amid rising tensions between Russia and Ukraine.
by Dark Reading Staff, Dark Reading
January 18, 2022
2 min read
Article
Kovrr Translates Cyber Risk into Business Impact with its Quantum Platform
On-demand cyber risk quantification platform enables C-suite to prioritize and justify cybersecurity investments through financial quantification.
January 18, 2022
On-demand cyber risk quantification platform enables C-suite to prioritize and justify cybersecurity investments through financial quantification.
January 18, 2022
3 min read
Article
Name That Toon: Nowhere to Hide
Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card.
January 18, 2022
Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card.
by John Klossner, Cartoonist
January 18, 2022
1 min read
Article
White House Meets With Software Firms and Open Source Orgs on Security
The Log4j vulnerability is only the latest security flaw to have global impact, prompting the Biden administration and software developers to pledge to produce more secure software.
January 14, 2022
The Log4j vulnerability is only the latest security flaw to have global impact, prompting the Biden administration and software developers to pledge to produce more secure software.
by Robert Lemos, Contributing Writer
January 14, 2022
5 min read
Article
What's Next for Patch Management: Automation
The next five years will bring the widespread use of hyperautomation in patch management. Part 3 of 3.
January 14, 2022
The next five years will bring the widespread use of hyperautomation in patch management. Part 3 of 3.
by Srinivas Mukkamala, Senior Vice President, Security Products, Ivanti
January 14, 2022
5 min read
Article
How Cybercriminals Are Cashing in on the Culture of 'Yes'
The reward is always front of mind, while the potential harm of giving out a phone number doesn't immediately reveal itself.
January 13, 2022
The reward is always front of mind, while the potential harm of giving out a phone number doesn't immediately reveal itself.
by Mike Kiser, Director of Strategy and Standards, SailPoint
January 13, 2022
5 min read
Article
Why Is Cyber Assessment So Important in Security?
All the pen testing and tabletop exercises in the world won't help unless an organization has a complete and accurate understanding of its assets.
January 12, 2022
All the pen testing and tabletop exercises in the world won't help unless an organization has a complete and accurate understanding of its assets.
by Erkang Zheng, Founder and CEO, JupiterOne
January 12, 2022
2 min read
Article
Patch Management Today: A Risk-Based Strategy to Defeat Cybercriminals
By combining risk-based vulnerability prioritization and automated patch intelligence, organizations can apply patches based on threat level. Part 2 of 3.
January 12, 2022
By combining risk-based vulnerability prioritization and automated patch intelligence, organizations can apply patches based on threat level. Part 2 of 3.
by Srinivas Mukkamala, Senior Vice President, Security Products, Ivanti
January 12, 2022
4 min read
Article