informa
1 MIN READ
Commentary

Google Chrome Polishes Its First Security Update

Last week, Google released its shiny new Chrome browser. However, before the week finished, Google also had to issue a patch for one of security's most common -- and most well-known to developers -- application security issues: a buffer overflow vulnerability that would make it possible for an attacker to completely take over your system.
Last week, Google released its shiny new Chrome browser. However, before the week finished, Google also had to issue a patch for one of security's most common -- and most well-known to developers -- application security issues: a buffer overflow vulnerability that would make it possible for an attacker to completely take over your system.According to this advisory from security firm SVRT-Bkis, they found a critical buffer overflow in Google Chrome that would enable an attacker to take complete control of an unpatched system.

From the advisory:


Type of Issue : Buffer Overflow.

Affected Software : Google Chrome 0.2.149.27.

Exploitation Environment : Google Chrome on Windows XP SP2.

Impact: Remote code execution.

Rating : Critical.

Description : The vulnerability is caused due to a boundary error when handling the "SaveAs" function. On saving a malicious page with an overly long title ( tag in HTML), the program causes a stack-based overflow and makes it possible for attackers to execute arbitrary code on users' systems. <P> How an attacker could exploit the issue : To exploit the Vulnerability, a hacker might construct a specially crafted Web page, which contains malicious code. He then tricks users into visiting his Web site and convinces them to save this Page. Right after that, the code would be executed, giving him the privilege to make use of the affected system. </blockquote> <P> Fortunately, Google promptly fixed the flaw. Just make sure you are running version 0.2.149.29 or higher. You can do that by selecting About, then Update within Chrome, or visiting <a href="http://www.google.com/chrome/">this</a> Google page. <P> I've a suspicion we've many more Google Chrome security-related updates on the way.</p><div class="mb-3"> <div class="informa-dfp-ads" data-name="Native_Ad_native_1v" data-size="fluid" data-targeting="pos=native_1v" ></div> </div></div></div><div id="articleFooter-newsletterSignup" class="newsletter-cta w-100 mt-3"><div class="text">Keep up with the latest cybersecurity threats, newly-discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.</div><a class="subscribe-btn dr-btn" href="https://darkreading.tradepub.com/c/pubRD.mpl?secure=1&sr=pp&_t=pp:&qf=w_defa3135&ch=dr_eoa" title="Subscribe" target="_blank" rel="noreferrer">Subscribe</a></div><div class="lazyload-wrapper "><div class="lazyload-placeholder"></div></div><div class="w-100 d-none d-lg-block"><div class="more-insights mt-2"><div class="title">More Insights</div><div class="container"><div class="row"><div id="articleFooter-moreInsights-" class="smartbox col-md-4"><div class="smartbox-title">White Papers</div><ul class="feed"><li class="feed-item"><div class="bullet-container square"><svg width="8" height="8" fill="none" xmlns="http://www.w3.org/2000/svg" alt="White Papers" class="icon-bullet square"><path fill="#181C21" d="M0 0h8v8H0z"></path></svg><svg width="8" height="8" fill="none" xmlns="http://www.w3.org/2000/svg" alt="White Papers" class="icon-bullet-on-hover square"><path fill="#9F110D" d="M0 0h8v8H0z"></path></svg></div><a target="_blank" rel="noreferrer" href="https://www.informationweek.com/whitepaper/security-management-and-analytics/risk-management-security/enable-and-protect-your-remote-workforce/423573?cid=smartbox_techweb_whitepaper_14.500005324&_mc=smartbox_techweb_whitepaper_14.500005324">Enable and Protect Your Remote Workforce</a></li><li class="feed-item"><div class="bullet-container square"><svg width="8" height="8" fill="none" xmlns="http://www.w3.org/2000/svg" alt="White Papers" class="icon-bullet square"><path fill="#181C21" d="M0 0h8v8H0z"></path></svg><svg width="8" height="8" fill="none" xmlns="http://www.w3.org/2000/svg" alt="White Papers" class="icon-bullet-on-hover square"><path fill="#9F110D" d="M0 0h8v8H0z"></path></svg></div><a target="_blank" rel="noreferrer" href="https://www.informationweek.com/whitepaper/cybersecurity/security/cloud-journey-adoption-stage-securing-hybrid-and-multi-cloud-environments/443422?cid=smartbox_techweb_whitepaper_14.500005311&_mc=smartbox_techweb_whitepaper_14.500005311">Cloud Journey Adoption Stage: Securing Hybrid and Multi-cloud Environments</a></li></ul><div class="readmore-link"><a target="_blank" rel="noreferrer" href="https://www.informationweek.com/whitepaper/Security">More White Papers</a></div></div><div id="articleFooter-moreInsights-" class="smartbox col-md-4"><div class="smartbox-title">Webinars</div><ul class="feed"><li class="feed-item"><div class="bullet-container square"><svg width="8" height="8" fill="none" xmlns="http://www.w3.org/2000/svg" alt="Webinars" class="icon-bullet square"><path fill="#181C21" d="M0 0h8v8H0z"></path></svg><svg width="8" height="8" fill="none" xmlns="http://www.w3.org/2000/svg" alt="Webinars" class="icon-bullet-on-hover square"><path fill="#9F110D" d="M0 0h8v8H0z"></path></svg></div><a target="_blank" rel="noreferrer" href="https://darkreading.tradepub.com/c/pubRD.mpl?secure=1&sr=pp&_t=pp:&qf=w_palo190&ch=sbx&cid=smartbox_techweb_upcoming_webinars_8.500001271&_mc=smartbox_techweb_upcoming_webinars_8.500001271">Building Out the Best Response Playbook for Ransomware Attacks</a></li><li class="feed-item"><div class="bullet-container square"><svg width="8" height="8" fill="none" xmlns="http://www.w3.org/2000/svg" alt="Webinars" class="icon-bullet square"><path fill="#181C21" d="M0 0h8v8H0z"></path></svg><svg width="8" height="8" fill="none" xmlns="http://www.w3.org/2000/svg" alt="Webinars" class="icon-bullet-on-hover square"><path fill="#9F110D" d="M0 0h8v8H0z"></path></svg></div><a target="_blank" rel="noreferrer" href="https://darkreading.tradepub.com/c/pubRD.mpl?secure=1&sr=pp&_t=pp:&qf=w_defa3936&ch=sbx&cid=smartbox_techweb_upcoming_webinars_8.500001275&_mc=smartbox_techweb_upcoming_webinars_8.500001275">ChatGPT: Defending Your Business Against AI-Supercharged Ransomware</a></li></ul><div class="readmore-link"><a target="_blank" rel="noreferrer" href="https://www.darkreading.com/upcoming-webinars">More Webinars</a></div></div><div id="articleFooter-moreInsights-" class="smartbox col-md-4"><div class="smartbox-title">Reports</div><ul class="feed"><li class="feed-item"><div class="bullet-container square"><svg width="8" height="8" fill="none" xmlns="http://www.w3.org/2000/svg" alt="Reports" class="icon-bullet square"><path fill="#181C21" d="M0 0h8v8H0z"></path></svg><svg width="8" height="8" fill="none" xmlns="http://www.w3.org/2000/svg" alt="Reports" class="icon-bullet-on-hover square"><path fill="#9F110D" d="M0 0h8v8H0z"></path></svg></div><a target="_blank" rel="noreferrer" href="https://darkreading.tradepub.com/c/pubRD.mpl?secure=1&sr=pp&_t=pp:&pc=w_defa3977&ch=sbx&cid=smartbox_techweb_analytics_7.300005981&_mc=smartbox_techweb_analytics_7.300005981">The 10 Most Impactful Types of Vulnerabilities for Enterprises Today</a></li><li class="feed-item"><div class="bullet-container square"><svg width="8" height="8" fill="none" xmlns="http://www.w3.org/2000/svg" alt="Reports" class="icon-bullet square"><path fill="#181C21" d="M0 0h8v8H0z"></path></svg><svg width="8" height="8" fill="none" xmlns="http://www.w3.org/2000/svg" alt="Reports" class="icon-bullet-on-hover square"><path fill="#9F110D" d="M0 0h8v8H0z"></path></svg></div><a target="_blank" rel="noreferrer" href="https://darkreading.tradepub.com/c/pubRD.mpl?secure=1&sr=pp&_t=pp:&pc=w_defa3940&ch=sbx&cid=smartbox_techweb_analytics_7.300005980&_mc=smartbox_techweb_analytics_7.300005980">Shoring Up the Software Supply Chain Across Enterprise Applications</a></li></ul><div class="readmore-link"><a target="_blank" rel="noreferrer" href="https://www.darkreading.com/must-reads">More Reports</a></div></div></div></div></div></div><div class="w-100 d-lg-block"><div class="informa-dfp-ads" data-name="Native_Ad_insight_1v" data-size="fluid" data-targeting="pos=nativeinsight_1v"></div></div></div><div class="col-lg-4"><div class="d-flex w-100 justify-content-center align-items-center flex-column"><div class="informa-dfp-ads add-border-bottom add-pb" data-size="5*5,300*250,300*600" data-name="TAP_Native_Ad_300_1v" data-targeting="pos=300_1v" data-mapping="1119*0=300*600,300*250,5*5|0*0=5*5,320*250"></div><div class="informa-dfp-ads add-border-bottom add-pb" data-name="Right_300x250_Rectangle_300_2v" data-size="300*250,300*600" data-targeting="pos=300_2v"></div></div><div class="right-hand-rail-wrap"><div id="rhc-editorsChoice" class="right-hand-rail-first editor-choice"><div class="editor-choice-title">Editors' Choice</div><div class="editor-choice-article"><a href="https://www.darkreading.com/application-security/microsoft-outlook-vulnerability-2023-it-bug" title="Microsoft Outlook Vulnerability Could Be 2023's 'It' Bug" class="d-flex align-items-center justify-content-center"><div class="lazyload-wrapper " style="margin:auto"><div style="height:75px" class="lazyload-placeholder"></div></div></a><div class="info pl-3"><div class="title"><a href="https://www.darkreading.com/application-security/microsoft-outlook-vulnerability-2023-it-bug">Microsoft Outlook Vulnerability Could Be 2023's 'It' Bug</a></div><div class="author">Nathan Eddy, Contributing Writer, Dark Reading</div></div></div><div class="editor-choice-article"><a href="https://www.darkreading.com/endpoint/okta-post-exploit-method-exposes-user-passwords" title="Okta Post-Exploitation Method Exposes User Passwords" class="d-flex align-items-center justify-content-center"><div class="lazyload-wrapper " style="margin:auto"><div style="height:75px" class="lazyload-placeholder"></div></div></a><div class="info pl-3"><div class="title"><a href="https://www.darkreading.com/endpoint/okta-post-exploit-method-exposes-user-passwords">Okta Post-Exploitation Method Exposes User Passwords</a></div><div class="author">Elizabeth Montalbano, Contributor, Dark Reading</div></div></div><div class="editor-choice-article"><a href="https://www.darkreading.com/ics-ot/chinese-warships-suspected-signal-jamming-passenger-jets" title="Chinese Warships Suspected of Signal-Jamming Passenger Jets" class="d-flex align-items-center justify-content-center"><div class="lazyload-wrapper " style="margin:auto"><div style="height:75px" class="lazyload-placeholder"></div></div></a><div class="info pl-3"><div class="title"><a href="https://www.darkreading.com/ics-ot/chinese-warships-suspected-signal-jamming-passenger-jets">Chinese Warships Suspected of Signal-Jamming Passenger Jets</a></div><div class="author">Tara Seals, Managing Editor, News, Dark Reading</div></div></div><div class="editor-choice-article"><a href="https://www.darkreading.com/attacks-breaches/chatgpt-gut-check-openai-cybersecurity-threat-overhyped" title="ChatGPT Gut Check: Cybersecurity Threats Overhyped or Not?" class="d-flex align-items-center justify-content-center"><div class="lazyload-wrapper " style="margin:auto"><div style="height:75px" class="lazyload-placeholder"></div></div></a><div class="info pl-3"><div class="title"><a href="https://www.darkreading.com/attacks-breaches/chatgpt-gut-check-openai-cybersecurity-threat-overhyped">ChatGPT Gut Check: Cybersecurity Threats Overhyped or Not?</a></div><div class="author">Becky Bracken, Editor, Dark Reading</div></div></div></div><div id="rhc-webinars" class="smartbox " type="Webinars"><div class="smartbox-title">Webinars</div><ul class="feed"><li class="feed-item"><svg width="20" height="18" fill="none" xmlns="http://www.w3.org/2000/svg" class="feed-item-icon"><path d="M19.803 14.639a.807.807 0 00-.088-.156l-1.822-2.52a.775.775 0 00-.628-.323H3.516V3.2c0-.882.701-1.6 1.563-1.6h9.842c.862 0 1.563.718 1.563 1.6v5.2c0 .442.35.8.781.8a.79.79 0 00.781-.8V3.2c0-1.764-1.402-3.2-3.125-3.2H5.08C3.356 0 1.954 1.436 1.954 3.2v8.976L.285 14.483a.805.805 0 00-.088.156 2.442 2.442 0 00.186 2.275A2.323 2.323 0 002.344 18h15.312c.793 0 1.526-.406 1.96-1.086.435-.68.505-1.53.187-2.275zm-1.494 1.399a.764.764 0 01-.654.362h-4.92a.79.79 0 00-.782-.8H8.047a.79.79 0 00-.781.8H2.344a.764.764 0 01-.653-.362.801.801 0 01-.089-.688l1.527-2.11H16.87l1.527 2.11a.801.801 0 01-.089.688zM6.308 8.81a.814.814 0 00.03 1.131.769.769 0 001.105-.031 3.396 3.396 0 012.519-1.112H10c.962 0 1.856.395 2.518 1.112a.77.77 0 001.104.031.814.814 0 00.031-1.13 5.033 5.033 0 00-1.509-1.118c.393-.496.63-1.127.63-1.813C12.773 4.292 11.511 3 9.96 3 8.41 3 7.149 4.292 7.149 5.88c0 .693.24 1.33.64 1.827-.552.27-1.056.642-1.481 1.103zM9.96 4.6c.69 0 1.25.574 1.25 1.28 0 .706-.56 1.28-1.25 1.28s-1.25-.574-1.25-1.28c0-.706.56-1.28 1.25-1.28z" fill="#494949"></path></svg><a target="_blank" rel="noreferrer" href="https://darkreading.tradepub.com/c/pubRD.mpl?secure=1&sr=pp&_t=pp:&qf=w_palo190&ch=sbx&cid=smartbox_techweb_upcoming_webinars_8.500001271&_mc=smartbox_techweb_upcoming_webinars_8.500001271">Building Out the Best Response Playbook for Ransomware Attacks</a></li><li class="feed-item"><svg width="20" height="18" fill="none" xmlns="http://www.w3.org/2000/svg" class="feed-item-icon"><path d="M19.803 14.639a.807.807 0 00-.088-.156l-1.822-2.52a.775.775 0 00-.628-.323H3.516V3.2c0-.882.701-1.6 1.563-1.6h9.842c.862 0 1.563.718 1.563 1.6v5.2c0 .442.35.8.781.8a.79.79 0 00.781-.8V3.2c0-1.764-1.402-3.2-3.125-3.2H5.08C3.356 0 1.954 1.436 1.954 3.2v8.976L.285 14.483a.805.805 0 00-.088.156 2.442 2.442 0 00.186 2.275A2.323 2.323 0 002.344 18h15.312c.793 0 1.526-.406 1.96-1.086.435-.68.505-1.53.187-2.275zm-1.494 1.399a.764.764 0 01-.654.362h-4.92a.79.79 0 00-.782-.8H8.047a.79.79 0 00-.781.8H2.344a.764.764 0 01-.653-.362.801.801 0 01-.089-.688l1.527-2.11H16.87l1.527 2.11a.801.801 0 01-.089.688zM6.308 8.81a.814.814 0 00.03 1.131.769.769 0 001.105-.031 3.396 3.396 0 012.519-1.112H10c.962 0 1.856.395 2.518 1.112a.77.77 0 001.104.031.814.814 0 00.031-1.13 5.033 5.033 0 00-1.509-1.118c.393-.496.63-1.127.63-1.813C12.773 4.292 11.511 3 9.96 3 8.41 3 7.149 4.292 7.149 5.88c0 .693.24 1.33.64 1.827-.552.27-1.056.642-1.481 1.103zM9.96 4.6c.69 0 1.25.574 1.25 1.28 0 .706-.56 1.28-1.25 1.28s-1.25-.574-1.25-1.28c0-.706.56-1.28 1.25-1.28z" fill="#494949"></path></svg><a target="_blank" rel="noreferrer" href="https://darkreading.tradepub.com/c/pubRD.mpl?secure=1&sr=pp&_t=pp:&qf=w_defa3936&ch=sbx&cid=smartbox_techweb_upcoming_webinars_8.500001275&_mc=smartbox_techweb_upcoming_webinars_8.500001275">ChatGPT: Defending Your Business Against AI-Supercharged Ransomware</a></li><li class="feed-item"><svg width="20" height="18" fill="none" xmlns="http://www.w3.org/2000/svg" class="feed-item-icon"><path d="M19.803 14.639a.807.807 0 00-.088-.156l-1.822-2.52a.775.775 0 00-.628-.323H3.516V3.2c0-.882.701-1.6 1.563-1.6h9.842c.862 0 1.563.718 1.563 1.6v5.2c0 .442.35.8.781.8a.79.79 0 00.781-.8V3.2c0-1.764-1.402-3.2-3.125-3.2H5.08C3.356 0 1.954 1.436 1.954 3.2v8.976L.285 14.483a.805.805 0 00-.088.156 2.442 2.442 0 00.186 2.275A2.323 2.323 0 002.344 18h15.312c.793 0 1.526-.406 1.96-1.086.435-.68.505-1.53.187-2.275zm-1.494 1.399a.764.764 0 01-.654.362h-4.92a.79.79 0 00-.782-.8H8.047a.79.79 0 00-.781.8H2.344a.764.764 0 01-.653-.362.801.801 0 01-.089-.688l1.527-2.11H16.87l1.527 2.11a.801.801 0 01-.089.688zM6.308 8.81a.814.814 0 00.03 1.131.769.769 0 001.105-.031 3.396 3.396 0 012.519-1.112H10c.962 0 1.856.395 2.518 1.112a.77.77 0 001.104.031.814.814 0 00.031-1.13 5.033 5.033 0 00-1.509-1.118c.393-.496.63-1.127.63-1.813C12.773 4.292 11.511 3 9.96 3 8.41 3 7.149 4.292 7.149 5.88c0 .693.24 1.33.64 1.827-.552.27-1.056.642-1.481 1.103zM9.96 4.6c.69 0 1.25.574 1.25 1.28 0 .706-.56 1.28-1.25 1.28s-1.25-.574-1.25-1.28c0-.706.56-1.28 1.25-1.28z" fill="#494949"></path></svg><a target="_blank" rel="noreferrer" href="https://darkreading.tradepub.com/c/pubRD.mpl?secure=1&sr=pp&_t=pp:&qf=w_defa3791&ch=sbx&cid=smartbox_techweb_upcoming_webinars_8.500001265&_mc=smartbox_techweb_upcoming_webinars_8.500001265">Ten Emerging Vulnerabilities Every Enterprise Should Know</a></li><li class="feed-item"><svg width="20" height="18" fill="none" xmlns="http://www.w3.org/2000/svg" class="feed-item-icon"><path d="M19.803 14.639a.807.807 0 00-.088-.156l-1.822-2.52a.775.775 0 00-.628-.323H3.516V3.2c0-.882.701-1.6 1.563-1.6h9.842c.862 0 1.563.718 1.563 1.6v5.2c0 .442.35.8.781.8a.79.79 0 00.781-.8V3.2c0-1.764-1.402-3.2-3.125-3.2H5.08C3.356 0 1.954 1.436 1.954 3.2v8.976L.285 14.483a.805.805 0 00-.088.156 2.442 2.442 0 00.186 2.275A2.323 2.323 0 002.344 18h15.312c.793 0 1.526-.406 1.96-1.086.435-.68.505-1.53.187-2.275zm-1.494 1.399a.764.764 0 01-.654.362h-4.92a.79.79 0 00-.782-.8H8.047a.79.79 0 00-.781.8H2.344a.764.764 0 01-.653-.362.801.801 0 01-.089-.688l1.527-2.11H16.87l1.527 2.11a.801.801 0 01-.089.688zM6.308 8.81a.814.814 0 00.03 1.131.769.769 0 001.105-.031 3.396 3.396 0 012.519-1.112H10c.962 0 1.856.395 2.518 1.112a.77.77 0 001.104.031.814.814 0 00.031-1.13 5.033 5.033 0 00-1.509-1.118c.393-.496.63-1.127.63-1.813C12.773 4.292 11.511 3 9.96 3 8.41 3 7.149 4.292 7.149 5.88c0 .693.24 1.33.64 1.827-.552.27-1.056.642-1.481 1.103zM9.96 4.6c.69 0 1.25.574 1.25 1.28 0 .706-.56 1.28-1.25 1.28s-1.25-.574-1.25-1.28c0-.706.56-1.28 1.25-1.28z" fill="#494949"></path></svg><a target="_blank" rel="noreferrer" href="https://darkreading.tradepub.com/c/pubRD.mpl?secure=1&sr=pp&_t=pp:&qf=w_clow15&ch=sbx&cid=smartbox_techweb_upcoming_webinars_8.500001276&_mc=smartbox_techweb_upcoming_webinars_8.500001276">How Applications Are Attacked: A Year in Application Security</a></li><li class="feed-item"><svg width="20" height="18" fill="none" xmlns="http://www.w3.org/2000/svg" class="feed-item-icon"><path d="M19.803 14.639a.807.807 0 00-.088-.156l-1.822-2.52a.775.775 0 00-.628-.323H3.516V3.2c0-.882.701-1.6 1.563-1.6h9.842c.862 0 1.563.718 1.563 1.6v5.2c0 .442.35.8.781.8a.79.79 0 00.781-.8V3.2c0-1.764-1.402-3.2-3.125-3.2H5.08C3.356 0 1.954 1.436 1.954 3.2v8.976L.285 14.483a.805.805 0 00-.088.156 2.442 2.442 0 00.186 2.275A2.323 2.323 0 002.344 18h15.312c.793 0 1.526-.406 1.96-1.086.435-.68.505-1.53.187-2.275zm-1.494 1.399a.764.764 0 01-.654.362h-4.92a.79.79 0 00-.782-.8H8.047a.79.79 0 00-.781.8H2.344a.764.764 0 01-.653-.362.801.801 0 01-.089-.688l1.527-2.11H16.87l1.527 2.11a.801.801 0 01-.089.688zM6.308 8.81a.814.814 0 00.03 1.131.769.769 0 001.105-.031 3.396 3.396 0 012.519-1.112H10c.962 0 1.856.395 2.518 1.112a.77.77 0 001.104.031.814.814 0 00.031-1.13 5.033 5.033 0 00-1.509-1.118c.393-.496.63-1.127.63-1.813C12.773 4.292 11.511 3 9.96 3 8.41 3 7.149 4.292 7.149 5.88c0 .693.24 1.33.64 1.827-.552.27-1.056.642-1.481 1.103zM9.96 4.6c.69 0 1.25.574 1.25 1.28 0 .706-.56 1.28-1.25 1.28s-1.25-.574-1.25-1.28c0-.706.56-1.28 1.25-1.28z" fill="#494949"></path></svg><a target="_blank" rel="noreferrer" href="https://darkreading.tradepub.com/c/pubRD.mpl?secure=1&sr=pp&_t=pp:&qf=w_defa3923&ch=sbx&cid=smartbox_techweb_upcoming_webinars_8.500001274&_mc=smartbox_techweb_upcoming_webinars_8.500001274">Managing Identity in the Cloud</a></li></ul><div class="readmore-link"><a target="_blank" rel="noreferrer" href="https://www.darkreading.com/upcoming-webinars">More Webinars</a></div></div><div id="rhc-reports" class="smartbox " type="Reports"><div class="smartbox-title">Reports</div><ul class="feed"><li class="feed-item"><svg width="24" height="24" fill="none" xmlns="http://www.w3.org/2000/svg" class="feed-item-icon"><path d="M21.33 2H2.662a.667.667 0 100 1.333h.666v.666a.666.666 0 001.334 0v-.666h14.666v10.662H4.663v-7.33a.666.666 0 00-1.334 0v7.996a.666.666 0 00.667.667h7.333v2.788a2 2 0 101.334 0v-2.788h7.333a.667.667 0 00.667-.667V3.333h.666a.667.667 0 100-1.333zm-9.334 18.659a.666.666 0 110-1.332.666.666 0 010 1.332z" fill="#494949"></path><path d="M7.8 11.134l2.862-2.86 2.196 2.194a.667.667 0 00.942 0l3.334-3.332a.665.665 0 10-.943-.942l-2.862 2.86-2.195-2.194a.667.667 0 00-.943 0l-3.333 3.332a.667.667 0 10.942.942z" fill="#494949"></path></svg><a target="_blank" rel="noreferrer" href="https://darkreading.tradepub.com/c/pubRD.mpl?secure=1&sr=pp&_t=pp:&pc=w_defa3977&ch=sbx&cid=smartbox_techweb_analytics_7.300005981&_mc=smartbox_techweb_analytics_7.300005981">The 10 Most Impactful Types of Vulnerabilities for Enterprises Today</a></li><li class="feed-item"><svg width="24" height="24" fill="none" xmlns="http://www.w3.org/2000/svg" class="feed-item-icon"><path d="M21.33 2H2.662a.667.667 0 100 1.333h.666v.666a.666.666 0 001.334 0v-.666h14.666v10.662H4.663v-7.33a.666.666 0 00-1.334 0v7.996a.666.666 0 00.667.667h7.333v2.788a2 2 0 101.334 0v-2.788h7.333a.667.667 0 00.667-.667V3.333h.666a.667.667 0 100-1.333zm-9.334 18.659a.666.666 0 110-1.332.666.666 0 010 1.332z" fill="#494949"></path><path d="M7.8 11.134l2.862-2.86 2.196 2.194a.667.667 0 00.942 0l3.334-3.332a.665.665 0 10-.943-.942l-2.862 2.86-2.195-2.194a.667.667 0 00-.943 0l-3.333 3.332a.667.667 0 10.942.942z" fill="#494949"></path></svg><a target="_blank" rel="noreferrer" href="https://darkreading.tradepub.com/c/pubRD.mpl?secure=1&sr=pp&_t=pp:&pc=w_defa3940&ch=sbx&cid=smartbox_techweb_analytics_7.300005980&_mc=smartbox_techweb_analytics_7.300005980">Shoring Up the Software Supply Chain Across Enterprise Applications</a></li><li class="feed-item"><svg width="24" height="24" fill="none" xmlns="http://www.w3.org/2000/svg" class="feed-item-icon"><path d="M21.33 2H2.662a.667.667 0 100 1.333h.666v.666a.666.666 0 001.334 0v-.666h14.666v10.662H4.663v-7.33a.666.666 0 00-1.334 0v7.996a.666.666 0 00.667.667h7.333v2.788a2 2 0 101.334 0v-2.788h7.333a.667.667 0 00.667-.667V3.333h.666a.667.667 0 100-1.333zm-9.334 18.659a.666.666 0 110-1.332.666.666 0 010 1.332z" fill="#494949"></path><path d="M7.8 11.134l2.862-2.86 2.196 2.194a.667.667 0 00.942 0l3.334-3.332a.665.665 0 10-.943-.942l-2.862 2.86-2.195-2.194a.667.667 0 00-.943 0l-3.333 3.332a.667.667 0 10.942.942z" fill="#494949"></path></svg><a target="_blank" rel="noreferrer" href="https://darkreading.tradepub.com/c/pubRD.mpl?secure=1&sr=pp&_t=pp:&pc=w_darl08&ch=sbx&cid=smartbox_techweb_analytics_7.300005973&_mc=smartbox_techweb_analytics_7.300005973">The Promise and Reality of Cloud Security</a></li><li class="feed-item"><svg width="24" height="24" fill="none" xmlns="http://www.w3.org/2000/svg" class="feed-item-icon"><path d="M21.33 2H2.662a.667.667 0 100 1.333h.666v.666a.666.666 0 001.334 0v-.666h14.666v10.662H4.663v-7.33a.666.666 0 00-1.334 0v7.996a.666.666 0 00.667.667h7.333v2.788a2 2 0 101.334 0v-2.788h7.333a.667.667 0 00.667-.667V3.333h.666a.667.667 0 100-1.333zm-9.334 18.659a.666.666 0 110-1.332.666.666 0 010 1.332z" fill="#494949"></path><path d="M7.8 11.134l2.862-2.86 2.196 2.194a.667.667 0 00.942 0l3.334-3.332a.665.665 0 10-.943-.942l-2.862 2.86-2.195-2.194a.667.667 0 00-.943 0l-3.333 3.332a.667.667 0 10.942.942z" fill="#494949"></path></svg><a target="_blank" rel="noreferrer" href="https://darkreading.tradepub.com/c/pubRD.mpl?secure=1&sr=pp&_t=pp:&pc=w_defa3521&ch=sbx&cid=smartbox_techweb_analytics_7.300005970&_mc=smartbox_techweb_analytics_7.300005970">10 Hot Talks From Black Hat USA 2022</a></li><li class="feed-item"><svg width="24" height="24" fill="none" xmlns="http://www.w3.org/2000/svg" class="feed-item-icon"><path d="M21.33 2H2.662a.667.667 0 100 1.333h.666v.666a.666.666 0 001.334 0v-.666h14.666v10.662H4.663v-7.33a.666.666 0 00-1.334 0v7.996a.666.666 0 00.667.667h7.333v2.788a2 2 0 101.334 0v-2.788h7.333a.667.667 0 00.667-.667V3.333h.666a.667.667 0 100-1.333zm-9.334 18.659a.666.666 0 110-1.332.666.666 0 010 1.332z" fill="#494949"></path><path d="M7.8 11.134l2.862-2.86 2.196 2.194a.667.667 0 00.942 0l3.334-3.332a.665.665 0 10-.943-.942l-2.862 2.86-2.195-2.194a.667.667 0 00-.943 0l-3.333 3.332a.667.667 0 10.942.942z" fill="#494949"></path></svg><a target="_blank" rel="noreferrer" href="https://www.informationweek.com/whitepaper/cybersecurity/cloud-security/how-machine-learning,-ai-and-deep-learning-improve-cybersecurity/442433?keycode=sbx&cid=smartbox_techweb_analytics_7.300005958&_mc=smartbox_techweb_analytics_7.300005958">How Machine Learning, AI & Deep Learning Improve Cybersecurity</a></li></ul><div class="readmore-link"><a target="_blank" rel="noreferrer" href="https://www.darkreading.com/must-reads">More Reports</a></div></div><div class="native-right-ads"><div class="informa-dfp-ads" data-name="Native_right_1v" data-size="fluid" data-targeting="pos=native_right_1v"></div></div><div id="rhc-whitePapers" class="smartbox " type="Whitepapers"><div class="smartbox-title">White Papers</div><ul class="feed"><li class="feed-item"><svg width="24" height="24" fill="none" xmlns="http://www.w3.org/2000/svg" class="feed-item-icon"><g clip-path="url(#whitepaper_svg__clip0)" fill="#494949"><path d="M19.997 18H6.666a.669.669 0 00-.67.669V20a.669.669 0 11-1.33 0V4a.669.669 0 01.662-.669h11.338a.669.669 0 01.662.669v12a.669.669 0 001.331 0V4a2 2 0 00-1.993-2H5.328a2 2 0 00-2 2v16a2 2 0 004 0v-.669h12V20a.669.669 0 01-.669.669h-10a.668.668 0 100 1.331h10a2 2 0 002-2v-1.331a.669.669 0 00-.662-.669z"></path><path d="M13.996 7H10.67a.668.668 0 110-1.331h3.325a.67.67 0 110 1.33zM13.996 11.375H10.67a.669.669 0 010-1.331h3.325a.67.67 0 010 1.331zM13.996 15.681H10.67a.67.67 0 110-1.331h3.325a.668.668 0 110 1.331zM8.003 7a.669.669 0 11.251-.049.669.669 0 01-.258.05h.007zM8.003 11.375a.669.669 0 11.251-.049.67.67 0 01-.258.05h.007zM8.003 15.681a.669.669 0 11.251-.049.666.666 0 01-.258.05h.007z"></path></g><defs><clipPath id="whitepaper_svg__clip0"><path fill="#fff" transform="translate(1.996 2)" d="M0 0h20v20H0z"></path></clipPath></defs></svg><a target="_blank" rel="noreferrer" href="https://www.informationweek.com/whitepaper/security-management-and-analytics/risk-management-security/enable-and-protect-your-remote-workforce/423573?cid=smartbox_techweb_whitepaper_14.500005324&_mc=smartbox_techweb_whitepaper_14.500005324">Enable and Protect Your Remote Workforce</a></li><li class="feed-item"><svg width="24" height="24" fill="none" xmlns="http://www.w3.org/2000/svg" class="feed-item-icon"><g clip-path="url(#whitepaper_svg__clip0)" fill="#494949"><path d="M19.997 18H6.666a.669.669 0 00-.67.669V20a.669.669 0 11-1.33 0V4a.669.669 0 01.662-.669h11.338a.669.669 0 01.662.669v12a.669.669 0 001.331 0V4a2 2 0 00-1.993-2H5.328a2 2 0 00-2 2v16a2 2 0 004 0v-.669h12V20a.669.669 0 01-.669.669h-10a.668.668 0 100 1.331h10a2 2 0 002-2v-1.331a.669.669 0 00-.662-.669z"></path><path d="M13.996 7H10.67a.668.668 0 110-1.331h3.325a.67.67 0 110 1.33zM13.996 11.375H10.67a.669.669 0 010-1.331h3.325a.67.67 0 010 1.331zM13.996 15.681H10.67a.67.67 0 110-1.331h3.325a.668.668 0 110 1.331zM8.003 7a.669.669 0 11.251-.049.669.669 0 01-.258.05h.007zM8.003 11.375a.669.669 0 11.251-.049.67.67 0 01-.258.05h.007zM8.003 15.681a.669.669 0 11.251-.049.666.666 0 01-.258.05h.007z"></path></g><defs><clipPath id="whitepaper_svg__clip0"><path fill="#fff" transform="translate(1.996 2)" d="M0 0h20v20H0z"></path></clipPath></defs></svg><a target="_blank" rel="noreferrer" href="https://www.informationweek.com/whitepaper/cybersecurity/security/cloud-journey-adoption-stage-securing-hybrid-and-multi-cloud-environments/443422?cid=smartbox_techweb_whitepaper_14.500005311&_mc=smartbox_techweb_whitepaper_14.500005311">Cloud Journey Adoption Stage: Securing Hybrid and Multi-cloud Environments</a></li><li class="feed-item"><svg width="24" height="24" fill="none" xmlns="http://www.w3.org/2000/svg" class="feed-item-icon"><g clip-path="url(#whitepaper_svg__clip0)" fill="#494949"><path d="M19.997 18H6.666a.669.669 0 00-.67.669V20a.669.669 0 11-1.33 0V4a.669.669 0 01.662-.669h11.338a.669.669 0 01.662.669v12a.669.669 0 001.331 0V4a2 2 0 00-1.993-2H5.328a2 2 0 00-2 2v16a2 2 0 004 0v-.669h12V20a.669.669 0 01-.669.669h-10a.668.668 0 100 1.331h10a2 2 0 002-2v-1.331a.669.669 0 00-.662-.669z"></path><path d="M13.996 7H10.67a.668.668 0 110-1.331h3.325a.67.67 0 110 1.33zM13.996 11.375H10.67a.669.669 0 010-1.331h3.325a.67.67 0 010 1.331zM13.996 15.681H10.67a.67.67 0 110-1.331h3.325a.668.668 0 110 1.331zM8.003 7a.669.669 0 11.251-.049.669.669 0 01-.258.05h.007zM8.003 11.375a.669.669 0 11.251-.049.67.67 0 01-.258.05h.007zM8.003 15.681a.669.669 0 11.251-.049.666.666 0 01-.258.05h.007z"></path></g><defs><clipPath id="whitepaper_svg__clip0"><path fill="#fff" transform="translate(1.996 2)" d="M0 0h20v20H0z"></path></clipPath></defs></svg><a target="_blank" rel="noreferrer" href="https://www.informationweek.com/whitepaper/cybersecurity/security/cloud-journey-migration-stage-adaptive-cloud-security/443421?cid=smartbox_techweb_whitepaper_14.500005310&_mc=smartbox_techweb_whitepaper_14.500005310">Cloud Journey Migration Stage: Adaptive Cloud Security</a></li><li class="feed-item"><svg width="24" height="24" fill="none" xmlns="http://www.w3.org/2000/svg" class="feed-item-icon"><g clip-path="url(#whitepaper_svg__clip0)" fill="#494949"><path d="M19.997 18H6.666a.669.669 0 00-.67.669V20a.669.669 0 11-1.33 0V4a.669.669 0 01.662-.669h11.338a.669.669 0 01.662.669v12a.669.669 0 001.331 0V4a2 2 0 00-1.993-2H5.328a2 2 0 00-2 2v16a2 2 0 004 0v-.669h12V20a.669.669 0 01-.669.669h-10a.668.668 0 100 1.331h10a2 2 0 002-2v-1.331a.669.669 0 00-.662-.669z"></path><path d="M13.996 7H10.67a.668.668 0 110-1.331h3.325a.67.67 0 110 1.33zM13.996 11.375H10.67a.669.669 0 010-1.331h3.325a.67.67 0 010 1.331zM13.996 15.681H10.67a.67.67 0 110-1.331h3.325a.668.668 0 110 1.331zM8.003 7a.669.669 0 11.251-.049.669.669 0 01-.258.05h.007zM8.003 11.375a.669.669 0 11.251-.049.67.67 0 01-.258.05h.007zM8.003 15.681a.669.669 0 11.251-.049.666.666 0 01-.258.05h.007z"></path></g><defs><clipPath id="whitepaper_svg__clip0"><path fill="#fff" transform="translate(1.996 2)" d="M0 0h20v20H0z"></path></clipPath></defs></svg><a target="_blank" rel="noreferrer" href="https://www.informationweek.com/whitepaper/cybersecurity/security/developer-focused-security-from-code-to-cloud-and-back-to-code/440613?cid=smartbox_techweb_whitepaper_14.500005298&_mc=smartbox_techweb_whitepaper_14.500005298">Developer-Focused Security from Code to Cloud and Back to Code</a></li><li class="feed-item"><svg width="24" height="24" fill="none" xmlns="http://www.w3.org/2000/svg" class="feed-item-icon"><g clip-path="url(#whitepaper_svg__clip0)" fill="#494949"><path d="M19.997 18H6.666a.669.669 0 00-.67.669V20a.669.669 0 11-1.33 0V4a.669.669 0 01.662-.669h11.338a.669.669 0 01.662.669v12a.669.669 0 001.331 0V4a2 2 0 00-1.993-2H5.328a2 2 0 00-2 2v16a2 2 0 004 0v-.669h12V20a.669.669 0 01-.669.669h-10a.668.668 0 100 1.331h10a2 2 0 002-2v-1.331a.669.669 0 00-.662-.669z"></path><path d="M13.996 7H10.67a.668.668 0 110-1.331h3.325a.67.67 0 110 1.33zM13.996 11.375H10.67a.669.669 0 010-1.331h3.325a.67.67 0 010 1.331zM13.996 15.681H10.67a.67.67 0 110-1.331h3.325a.668.668 0 110 1.331zM8.003 7a.669.669 0 11.251-.049.669.669 0 01-.258.05h.007zM8.003 11.375a.669.669 0 11.251-.049.67.67 0 01-.258.05h.007zM8.003 15.681a.669.669 0 11.251-.049.666.666 0 01-.258.05h.007z"></path></g><defs><clipPath id="whitepaper_svg__clip0"><path fill="#fff" transform="translate(1.996 2)" d="M0 0h20v20H0z"></path></clipPath></defs></svg><a target="_blank" rel="noreferrer" href="https://www.informationweek.com/whitepaper/cybersecurity/security-monitoring/building-the-soc-of-the-future-/443083?cid=smartbox_techweb_whitepaper_14.500005292&_mc=smartbox_techweb_whitepaper_14.500005292">Building the SOC of the Future</a></li></ul><div class="readmore-link"><a target="_blank" rel="noreferrer" href="https://www.informationweek.com/whitepaper/Security">More White Papers</a></div></div><div id="rhc-events" class="smartbox " type="Live Events"><div class="smartbox-title">Events</div><ul class="feed"><li class="feed-item"><svg width="20" height="20" fill="none" xmlns="http://www.w3.org/2000/svg" class="feed-item-icon"><path d="M7.376.79c0-.436.354-.79.79-.79h8.312a2.354 2.354 0 012.351 2.351v6.82h.38a.791.791 0 010 1.58h-7.765a.791.791 0 010-1.58h5.805V2.35a.772.772 0 00-.771-.77H8.166a.791.791 0 01-.79-.79zM.79 12.117c.436 0 .79-.354.79-.79V7.776c0-.425.346-.771.771-.771h3.067c.247 0 .477.117.622.315l1.582 3.009a.785.785 0 00.466.387.785.785 0 00.603-.056.793.793 0 00.33-1.067L7.416 6.541a.785.785 0 00-.041-.07 2.357 2.357 0 00-1.902-1.047H2.351a2.354 2.354 0 00-2.35 2.352v3.55c0 .437.354.791.79.791zm.771-9.766A2.354 2.354 0 013.912 0a2.354 2.354 0 012.351 2.351 2.354 2.354 0 01-2.35 2.351 2.354 2.354 0 01-2.352-2.35zm1.58 0a.772.772 0 001.542 0 .772.772 0 00-1.542 0zm16.83 16.073A1.306 1.306 0 0118.696 20H1.305a1.306 1.306 0 01-1.277-1.574 3.848 3.848 0 011.809-2.522 2.337 2.337 0 01-.393-1.3 2.354 2.354 0 012.351-2.35 2.354 2.354 0 012.351 2.35c0 .481-.145.928-.393 1.3a3.824 3.824 0 011.145 1.034 3.847 3.847 0 011.144-1.034 2.338 2.338 0 01-.393-1.3A2.354 2.354 0 0110 12.255a2.354 2.354 0 012.351 2.35c0 .481-.145.928-.393 1.3a3.805 3.805 0 011.144 1.034 3.841 3.841 0 011.144-1.034 2.337 2.337 0 01-.392-1.3 2.354 2.354 0 012.35-2.35 2.354 2.354 0 012.352 2.35 2.353 2.353 0 01-2.31 2.351l-.02.001h-.042c-.944 0-1.78.599-2.104 1.464h4.346a.792.792 0 01.604-.606.083.083 0 01.007-.001h.001a.794.794 0 01.934.61zm-4.537-3.82a.772.772 0 001.542 0 .772.772 0 00-1.542 0zm-12.41 0a.772.772 0 001.542 0 .772.772 0 00-1.542 0zm2.897 3.815a2.258 2.258 0 00-2.105-1.463h-.041c-.944 0-1.782.599-2.105 1.463h4.25zm3.308-3.814a.772.772 0 001.542 0 .772.772 0 00-1.542 0zm2.896 3.814a2.258 2.258 0 00-2.105-1.463h-.04c-.944 0-1.781.599-2.105 1.463h4.25z" fill="#494949"></path></svg><a target="_blank" rel="noreferrer" href="https://www.blackhat.com?cid=smartbox_techweb_session_16.500287&_mc=smartbox_techweb_session_16.500287">Black Hat USA - August 5-10 - Learn More</a></li><li class="feed-item"><svg width="20" height="20" fill="none" xmlns="http://www.w3.org/2000/svg" class="feed-item-icon"><path d="M7.376.79c0-.436.354-.79.79-.79h8.312a2.354 2.354 0 012.351 2.351v6.82h.38a.791.791 0 010 1.58h-7.765a.791.791 0 010-1.58h5.805V2.35a.772.772 0 00-.771-.77H8.166a.791.791 0 01-.79-.79zM.79 12.117c.436 0 .79-.354.79-.79V7.776c0-.425.346-.771.771-.771h3.067c.247 0 .477.117.622.315l1.582 3.009a.785.785 0 00.466.387.785.785 0 00.603-.056.793.793 0 00.33-1.067L7.416 6.541a.785.785 0 00-.041-.07 2.357 2.357 0 00-1.902-1.047H2.351a2.354 2.354 0 00-2.35 2.352v3.55c0 .437.354.791.79.791zm.771-9.766A2.354 2.354 0 013.912 0a2.354 2.354 0 012.351 2.351 2.354 2.354 0 01-2.35 2.351 2.354 2.354 0 01-2.352-2.35zm1.58 0a.772.772 0 001.542 0 .772.772 0 00-1.542 0zm16.83 16.073A1.306 1.306 0 0118.696 20H1.305a1.306 1.306 0 01-1.277-1.574 3.848 3.848 0 011.809-2.522 2.337 2.337 0 01-.393-1.3 2.354 2.354 0 012.351-2.35 2.354 2.354 0 012.351 2.35c0 .481-.145.928-.393 1.3a3.824 3.824 0 011.145 1.034 3.847 3.847 0 011.144-1.034 2.338 2.338 0 01-.393-1.3A2.354 2.354 0 0110 12.255a2.354 2.354 0 012.351 2.35c0 .481-.145.928-.393 1.3a3.805 3.805 0 011.144 1.034 3.841 3.841 0 011.144-1.034 2.337 2.337 0 01-.392-1.3 2.354 2.354 0 012.35-2.35 2.354 2.354 0 012.352 2.35 2.353 2.353 0 01-2.31 2.351l-.02.001h-.042c-.944 0-1.78.599-2.104 1.464h4.346a.792.792 0 01.604-.606.083.083 0 01.007-.001h.001a.794.794 0 01.934.61zm-4.537-3.82a.772.772 0 001.542 0 .772.772 0 00-1.542 0zm-12.41 0a.772.772 0 001.542 0 .772.772 0 00-1.542 0zm2.897 3.815a2.258 2.258 0 00-2.105-1.463h-.041c-.944 0-1.782.599-2.105 1.463h4.25zm3.308-3.814a.772.772 0 001.542 0 .772.772 0 00-1.542 0zm2.896 3.814a2.258 2.258 0 00-2.105-1.463h-.04c-.944 0-1.781.599-2.105 1.463h4.25z" fill="#494949"></path></svg><a target="_blank" rel="noreferrer" href="https://www.blackhat.com?cid=smartbox_techweb_session_16.500286&_mc=smartbox_techweb_session_16.500286">Black Hat Asia - May 9-12 - Learn More</a></li></ul><div class="readmore-link"><a target="_blank" rel="noreferrer" href="https://www.darkreading.com/upcoming-events">More Events</a></div></div></div><div class="w-100 d-lg-none mt-4"><div class="more-insights mt-2"><div class="title">More Insights</div><div class="container"><div class="row"><div id="articleFooter-moreInsights-" class="smartbox col-md-4"><div class="smartbox-title">White Papers</div><ul class="feed"><li class="feed-item"><div class="bullet-container square"><svg width="8" height="8" fill="none" xmlns="http://www.w3.org/2000/svg" alt="White Papers" class="icon-bullet square"><path fill="#181C21" d="M0 0h8v8H0z"></path></svg><svg width="8" height="8" fill="none" xmlns="http://www.w3.org/2000/svg" alt="White Papers" class="icon-bullet-on-hover square"><path fill="#9F110D" d="M0 0h8v8H0z"></path></svg></div><a target="_blank" rel="noreferrer" href="https://www.informationweek.com/whitepaper/security-management-and-analytics/risk-management-security/enable-and-protect-your-remote-workforce/423573?cid=smartbox_techweb_whitepaper_14.500005324&_mc=smartbox_techweb_whitepaper_14.500005324">Enable and Protect Your Remote Workforce</a></li><li class="feed-item"><div class="bullet-container square"><svg width="8" height="8" fill="none" xmlns="http://www.w3.org/2000/svg" alt="White Papers" class="icon-bullet square"><path fill="#181C21" d="M0 0h8v8H0z"></path></svg><svg width="8" height="8" fill="none" xmlns="http://www.w3.org/2000/svg" alt="White Papers" class="icon-bullet-on-hover square"><path fill="#9F110D" d="M0 0h8v8H0z"></path></svg></div><a target="_blank" rel="noreferrer" href="https://www.informationweek.com/whitepaper/cybersecurity/security/cloud-journey-adoption-stage-securing-hybrid-and-multi-cloud-environments/443422?cid=smartbox_techweb_whitepaper_14.500005311&_mc=smartbox_techweb_whitepaper_14.500005311">Cloud Journey Adoption Stage: Securing Hybrid and Multi-cloud Environments</a></li></ul><div class="readmore-link"><a target="_blank" rel="noreferrer" href="https://www.informationweek.com/whitepaper/Security">More White Papers</a></div></div><div id="articleFooter-moreInsights-" class="smartbox col-md-4"><div class="smartbox-title">Webinars</div><ul class="feed"><li class="feed-item"><div class="bullet-container square"><svg width="8" height="8" fill="none" xmlns="http://www.w3.org/2000/svg" alt="Webinars" class="icon-bullet square"><path fill="#181C21" d="M0 0h8v8H0z"></path></svg><svg width="8" height="8" fill="none" xmlns="http://www.w3.org/2000/svg" alt="Webinars" class="icon-bullet-on-hover square"><path fill="#9F110D" d="M0 0h8v8H0z"></path></svg></div><a target="_blank" rel="noreferrer" href="https://darkreading.tradepub.com/c/pubRD.mpl?secure=1&sr=pp&_t=pp:&qf=w_palo190&ch=sbx&cid=smartbox_techweb_upcoming_webinars_8.500001271&_mc=smartbox_techweb_upcoming_webinars_8.500001271">Building Out the Best Response Playbook for Ransomware Attacks</a></li><li class="feed-item"><div class="bullet-container square"><svg width="8" height="8" fill="none" xmlns="http://www.w3.org/2000/svg" alt="Webinars" class="icon-bullet square"><path fill="#181C21" d="M0 0h8v8H0z"></path></svg><svg width="8" height="8" fill="none" xmlns="http://www.w3.org/2000/svg" alt="Webinars" class="icon-bullet-on-hover square"><path fill="#9F110D" d="M0 0h8v8H0z"></path></svg></div><a target="_blank" rel="noreferrer" href="https://darkreading.tradepub.com/c/pubRD.mpl?secure=1&sr=pp&_t=pp:&qf=w_defa3936&ch=sbx&cid=smartbox_techweb_upcoming_webinars_8.500001275&_mc=smartbox_techweb_upcoming_webinars_8.500001275">ChatGPT: Defending Your Business Against AI-Supercharged Ransomware</a></li></ul><div class="readmore-link"><a target="_blank" rel="noreferrer" href="https://www.darkreading.com/upcoming-webinars">More Webinars</a></div></div><div id="articleFooter-moreInsights-" class="smartbox col-md-4"><div class="smartbox-title">Reports</div><ul class="feed"><li class="feed-item"><div class="bullet-container square"><svg width="8" height="8" fill="none" xmlns="http://www.w3.org/2000/svg" alt="Reports" class="icon-bullet square"><path fill="#181C21" d="M0 0h8v8H0z"></path></svg><svg width="8" height="8" fill="none" xmlns="http://www.w3.org/2000/svg" alt="Reports" class="icon-bullet-on-hover square"><path fill="#9F110D" d="M0 0h8v8H0z"></path></svg></div><a target="_blank" rel="noreferrer" href="https://darkreading.tradepub.com/c/pubRD.mpl?secure=1&sr=pp&_t=pp:&pc=w_defa3977&ch=sbx&cid=smartbox_techweb_analytics_7.300005981&_mc=smartbox_techweb_analytics_7.300005981">The 10 Most Impactful Types of Vulnerabilities for Enterprises Today</a></li><li class="feed-item"><div class="bullet-container square"><svg width="8" height="8" fill="none" xmlns="http://www.w3.org/2000/svg" alt="Reports" class="icon-bullet square"><path fill="#181C21" d="M0 0h8v8H0z"></path></svg><svg width="8" height="8" fill="none" xmlns="http://www.w3.org/2000/svg" alt="Reports" class="icon-bullet-on-hover square"><path fill="#9F110D" d="M0 0h8v8H0z"></path></svg></div><a target="_blank" rel="noreferrer" href="https://darkreading.tradepub.com/c/pubRD.mpl?secure=1&sr=pp&_t=pp:&pc=w_defa3940&ch=sbx&cid=smartbox_techweb_analytics_7.300005980&_mc=smartbox_techweb_analytics_7.300005980">Shoring Up the Software Supply Chain Across Enterprise Applications</a></li></ul><div class="readmore-link"><a target="_blank" rel="noreferrer" href="https://www.darkreading.com/must-reads">More Reports</a></div></div></div></div></div></div></div></div></div><script defer="" src="https://code.jquery.com/jquery-3.3.1.slim.min.js"></script><script defer="" src="https://cdnjs.cloudflare.com/ajax/libs/popper.js/1.14.0/umd/popper.min.js"></script><script defer="" src="https://stackpath.bootstrapcdn.com/bootstrap/4.1.0/js/bootstrap.min.js"></script></main><footer><div class="container"><div class="row"><div class="col-lg-5"><h4 class="f-nav-title">Discover More From Informa Tech</h4><div class="nav-2-col"><ul class="nav-2-col-ul-left"><li><a href="https://www.interop.com/" rel="noreferrer" target="_blank">Interop</a></li><li><a href="https://www.informationweek.com/" rel="noreferrer" target="_blank">InformationWeek</a></li><li><a href="https://www.networkcomputing.com/" rel="noreferrer" target="_blank">Network Computing</a></li><li><a href="https://www.itprotoday.com/" rel="noreferrer" target="_blank">ITPro Today</a></li></ul><ul class="nav-2-col-ul-right"><li><a href="https://www.datacenterknowledge.com/" rel="noreferrer" target="_blank">Data Center Knowledge</a></li><li><a href="https://www.blackhat.com/" rel="noreferrer" target="_blank">Black Hat</a></li><li><a href="http://www.omdia.com/" rel="noreferrer" target="_blank">Omdia</a></li></ul></div></div><div class="col-lg-3"><h4 class="f-nav-title">Working With Us</h4><ul class="nav-2-col-ul-left"><li><a href="https://www.darkreading.com/about-us" rel="noreferrer" target="_blank">About Us</a></li><li><a href="https://www.darkreading.com/advertise" rel="noreferrer" target="_blank">Advertise</a></li><li><a href="https://info.wrightsmedia.com/informa-licensing-reprints-request" rel="noreferrer" target="_blank">Reprints</a></li></ul></div><div class="col-lg-4"><h4 class="f-nav-title f-nav-social-networks text-lg-left">Follow Dark Reading On Social</h4><div class="f-social-networks"><ul class="d-flex justify-content-lg-start w-100"><li class="social-icon-wrap"><a href="https://www.darkreading.com/rss.xml" rel="noreferrer" target="_blank"><svg width="16" height="16" viewBox="0 0 1792 1792" xmlns="http://www.w3.org/2000/svg"><path d="M576 1344q0 80-56 136t-136 56-136-56-56-136 56-136 136-56 136 56 56 136zm512 123q2 28-17 48-18 21-47 21H889q-25 0-43-16.5t-20-41.5q-22-229-184.5-391.5T250 902q-25-2-41.5-20T192 839V704q0-29 21-47 17-17 43-17h5q160 13 306 80.5T826 902q114 113 181.5 259t80.5 306zm512 2q2 27-18 47-18 20-46 20h-143q-26 0-44.5-17.5T1329 1476q-12-215-101-408.5t-231.5-336-336-231.5T252 398q-25-1-42.5-19.5T192 335V192q0-28 20-46 18-18 44-18h3q262 13 501.5 120T1186 542q187 186 294 425.5t120 501.5z"></path></svg></a></li><li class="social-icon-wrap"><a href="https://twitter.com/DarkReading" rel="noreferrer" target="_blank"><svg width="16" height="16" viewBox="0 0 1792 1792" xmlns="http://www.w3.org/2000/svg"><path d="M1684 408q-67 98-162 167 1 14 1 42 0 130-38 259.5T1369.5 1125 1185 1335.5t-258 146-323 54.5q-271 0-496-145 35 4 78 4 225 0 401-138-105-2-188-64.5T285 1033q33 5 61 5 43 0 85-11-112-23-185.5-111.5T172 710v-4q68 38 146 41-66-44-105-115t-39-154q0-88 44-163 121 149 294.5 238.5T884 653q-8-38-8-74 0-134 94.5-228.5T1199 256q140 0 236 102 109-21 205-78-37 115-142 178 93-10 186-50z"></path></svg></a></li><li class="social-icon-wrap"><a href="https://www.linkedin.com/company/dark-reading/" rel="noreferrer" target="_blank"><svg width="16" height="16" viewBox="0 0 1792 1792" xmlns="http://www.w3.org/2000/svg"><path d="M477 625v991H147V625h330zm21-306q1 73-50.5 122T312 490h-2q-82 0-132-49t-50-122q0-74 51.5-122.5T314 148t133 48.5T498 319zm1166 729v568h-329v-530q0-105-40.5-164.5T1168 862q-63 0-105.5 34.5T999 982q-11 30-11 81v553H659q2-399 2-647t-1-296l-1-48h329v144h-2q20-32 41-56t56.5-52 87-43.5T1285 602q171 0 275 113.5t104 332.5z"></path></svg></a></li><li class="social-icon-wrap"><a href="https://www.facebook.com/darkreadingcom" rel="noreferrer" target="_blank"><svg width="16" height="16" viewBox="0 0 1792 1792" xmlns="http://www.w3.org/2000/svg"><path d="M1343 12v264h-157q-86 0-116 36t-30 108v189h293l-39 296h-254v759H734V905H479V609h255V391q0-186 104-288.5T1115 0q147 0 228 12z"></path></svg></a></li><li class="social-icon-wrap"><a href="https://www.youtube.com/@DarkReadingOfficialYT" rel="noreferrer" target="_blank"><svg width="16" height="16" xmlns="http://www.w3.org/2000/svg"><path d="M6.4 10.4V5.6L10.5 8l-4.1 2.4zm9.3-6.3c-.2-.7-.7-1.2-1.4-1.4C13 2.4 8 2.4 8 2.4s-5 0-6.3.3c-.6.2-1.2.7-1.4 1.4C0 5.4 0 8 0 8s0 2.6.3 3.9c.2.7.7 1.2 1.4 1.4 1.3.3 6.3.3 6.3.3s5 0 6.3-.3c.7-.2 1.2-.7 1.4-1.4.3-1.3.3-3.9.3-3.9s0-2.6-.3-3.9"></path></svg></a></li><li class="social-icon-wrap"><a href="https://news.google.com/publications/CAAqBwgKMKmknwswtq63Aw?ceid=US:en&oc=3" rel="noreferrer" target="_blank"><svg width="17" height="17" fill="none" xmlns="http://www.w3.org/2000/svg"><path d="M16.485 7.297c.1.535.155 1.095.155 1.68 0 4.57-3.06 7.82-7.68 7.82A7.998 7.998 0 013.304 3.139 7.997 7.997 0 018.961.797c2.16 0 3.965.795 5.35 2.085l-2.255 2.255v-.005c-.84-.8-1.905-1.21-3.095-1.21-2.64 0-4.785 2.23-4.785 4.87s2.145 4.874 4.785 4.874c2.395 0 4.025-1.369 4.36-3.25H8.96v-3.12h7.525z" fill="#fff"></path></svg></a></li></ul></div></div></div><div class="row"><div class="w-100"><div class="f-hr"></div></div></div><div class="row"><div class="col-md-12 b-f-wrap "><div class="f-logo-wrap d-flex justify-content-between align-items-center"><div class="f-logo"><div class="lazyload-wrapper " style="margin:auto"><div style="height:200px" class="lazyload-placeholder"></div></div></div><div class="f-h-nav"><ul class="nav-horizontal d-flex"><li><a href="https://tech.informa.com/" rel="noreferrer" target="_blank">Home</a></li><li><a href="https://tech.informa.com/cookie-policy" rel="noreferrer" target="_blank">Cookies</a></li><li><a href="https://tech.informa.com/privacy-policy" rel="noreferrer" target="_blank">Privacy</a></li><li><a href="https://tech.informa.com/terms-and-conditions" rel="noreferrer" target="_blank">Terms</a></li></ul></div></div></div></div><div class="row"><div class="w-100"><div class="f-hr"></div></div></div><div class="row"><div class="col-md-12 b-f-wrap"><div class="f-logo-wrap d-flex justify-content-between align-items-center"><div class="f-logo o-hidden d-none d-sm-block"><img src="https://eu-images.contentstack.com/v3/assets/blt66983808af36a8ef/blt3edeb23396a4b5dc/60b1ea7a9afdef577986633e/Whitelogo_1.png" alt="Logo"/></div><div class="copyright-wrap"><p>Copyright © <!-- -->2023<!-- --> <!-- -->Informa PLC Informa UK Limited is a company registered in England and Wales with company number 1072954 whose registered office is 5 Howick Place, London, SW1P 1WG.</p></div></div></div></div></div></footer></div></div></div><script id="__NEXT_DATA__" type="application/json">{"props":{"pageProps":{"data":{"typeOfSlug":"articlePost","result":{"_version":3,"locale":"en-us","uid":"bltb8b51aa64bdcf847","ACL":{},"_in_progress":false,"article_label":[{"_version":2,"locale":"en-us","uid":"blt610cb37ce61b4a29","ACL":{},"_in_progress":false,"article_label_page_description":"","created_at":"2021-05-29T07:27:37.247Z","created_by":"blt9a0fc67c46c47dd7","label":"Commentary","seo":{"canonical_url":"","meta_description":"","meta_keywords":"","meta_title":""},"tags":[],"title":"Commentary","updated_at":"2021-09-12T15:45:51.152Z","updated_by":"blt871c9fa65adba4f6","url":"/commentary","_content_type_uid":"dr_article_label","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-09-14T10:07:22.582Z","user":"blt986fc66e34c7b415"}}],"author_page":[{"_content_type_uid":"dr_author","_version":4,"locale":"en-us","uid":"blt4affc35d13fd5dcf","_in_progress":false,"author_description":"An award winning writer and journalist, for more than 20 years George Hulme has written about business, technology, and IT security topics. He currently freelances for a wide range of publications, and is security blogger at InformationWeek.com.","author_email":"george@georgehulme.com","author_name":"George V. Hulme","author_role":"Contributor","created_at":"2021-06-24T07:19:49.732Z","created_by":"blt5ee151557599d2cd","portrait":{"_version":1,"is_dir":false,"uid":"blt1294f16114f9d036","ACL":{},"content_type":"image/jpeg","created_at":"2021-06-24T07:19:49.286Z","created_by":"blt5ee151557599d2cd","file_size":"6449","filename":"Hulme-IWK-125x125.jpg","parent_uid":"blt60b58d3e4f06fc5f","tags":[],"title":"Hulme-IWK-125x125.jpg","updated_at":"2021-06-24T07:19:49.286Z","updated_by":"blt5ee151557599d2cd","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-09-22T04:14:19.227Z","user":"blt5ee151557599d2cd"},"url":"https://eu-images.contentstack.com/v3/assets/blt66983808af36a8ef/blt1294f16114f9d036/60d43215e1461d39eb814e70/Hulme-IWK-125x125.jpg"},"title":"George V. Hulme","updated_at":"2021-06-26T01:00:33.732Z","updated_by":"blt5ee151557599d2cd","url":"/author/george-v-hulme","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-09-22T04:14:17.230Z","user":"blt5ee151557599d2cd"},"ACL":{}}],"body":"Last week, Google released its shiny new Chrome browser. However, before the week finished, Google also had to issue a patch for one of security's most common -- and most well-known to developers -- application security issues: a buffer overflow vulnerability that would make it possible for an attacker to completely take over your system.According to this \u003ca href=\"http://security.bkis.vn/?p=119\"\u003eadvisory\u003c/a\u003e from security firm SVRT-Bkis, they found a critical buffer overflow in Google Chrome that would enable an attacker to take complete control of an unpatched system. \r\n\u003cP\u003e\r\nFrom the advisory:\r\n\u003cP\u003e\r\n\u003cblockquote\u003eType of Issue : Buffer Overflow.\r\n\u003cP\u003e\r\nAffected Software : Google Chrome 0.2.149.27.\r\n\u003cP\u003e\r\nExploitation Environment : Google Chrome on Windows XP SP2.\r\n\u003cP\u003e\r\nImpact: Remote code execution.\r\n\u003cP\u003e\r\nRating : Critical.\r\n\u003cP\u003e\r\nDescription :\r\nThe vulnerability is caused due to a boundary error when handling the \"SaveAs\" function. On saving a malicious page with an overly long title (\u003ctitle\u003e tag in HTML), the program causes a stack-based overflow and makes it possible for attackers to execute arbitrary code on users' systems.\r\n\u003cP\u003e\r\nHow an attacker could exploit the issue :\r\nTo exploit the Vulnerability, a hacker might construct a specially crafted Web page, which contains malicious code. He then tricks users into visiting his Web site and convinces them to save this Page. Right after that, the code would be executed, giving him the privilege to make use of the affected system.\r\n\u003c/blockquote\u003e\r\n\u003cP\u003e\r\nFortunately, Google promptly fixed the flaw. Just make sure you are running version 0.2.149.29 or higher. You can do that by selecting About, then Update within Chrome, or visiting \u003ca href=\"http://www.google.com/chrome/\"\u003ethis\u003c/a\u003e Google page.\r\n\u003cP\u003e\r\nI've a suspicion we've many more Google Chrome security-related updates on the way.\r\n","byline":null,"created_at":"2021-06-28T07:34:08.528Z","created_by":"blt5ee151557599d2cd","featured_image":null,"featured_image_caption":null,"featured_image_credit":null,"keywords":[],"old_url":"/risk-management/google-chrome-polishes-its-first-security-update/d/d-id/1071754","published_date":"2008-09-08T19:26:05-05:00","seo":{"meta_keywords":"","canonical_url":null,"meta_description":"Last week, Google released its shiny new Chrome browser. However, before the week finished, Google also had to issue a patch for one of security's most common -","meta_title":"Google Chrome Polishes Its First Security Update"},"summary":"Last week, Google released its shiny new Chrome browser. However, before the week finished, Google also had to issue a patch for one of security's most common -- and most well-known to developers -- application security issues: a buffer overflow vulnerability that would make it possible for an attacker to completely take over your system.","tags":[],"term_selector":{"primaryTerm":"risk","primaryTermInRealText":"Risk","primaryCategoryBelonged":"risk","actualUrl":"/risk/google-chrome-polishes-its-first-security-update"},"title":"Google Chrome Polishes Its First Security Update","updated_at":"2022-03-14T15:41:44.313Z","updated_by":"blt5ee151557599d2cd","url":"/google-chrome-polishes-its-first-security-update","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2022-03-14T15:41:45.285Z","user":"blt5ee151557599d2cd"},"pageType":"article","bodyText":"Last week, Google released its shiny new Chrome browser. However, before the week finished, Google also had to issue a patch for one of security's most common -- and most well-known to developers -- application security issues: a buffer overflow vulnerability that would make it possible for an attacker to completely take over your system.According to this advisory from security firm SVRT-Bkis, they found a critical buffer overflow in Google Chrome that would enable an attacker to take complete control of an unpatched system. \r \r From the advisory:\r \r Type of Issue : Buffer Overflow.\r \r Affected Software : Google Chrome 0.2.149.27.\r \r Exploitation Environment : Google Chrome on Windows XP SP2.\r \r Impact: Remote code execution.\r \r Rating : Critical.\r \r Description :\r The vulnerability is caused due to a boundary error when handling the \"SaveAs\" function. On saving a malicious page with an overly long title ( tag in HTML), the program causes a stack-based overflow and makes it possible for attackers to execute arbitrary code on users' systems.\r \r How an attacker could exploit the issue :\r To exploit the Vulnerability, a hacker might construct a specially crafted Web page, which contains malicious code. He then tricks users into visiting his Web site and convinces them to save this Page. Right after that, the code would be executed, giving him the privilege to make use of the affected system.\r \r \r Fortunately, Google promptly fixed the flaw. Just make sure you are running version 0.2.149.29 or higher. You can do that by selecting About, then Update within Chrome, or visiting this Google page.\r \r I've a suspicion we've many more Google Chrome security-related updates on the way."},"seo":{"meta_keywords":"","canonical_url":"https://www.darkreading.com/risk/google-chrome-polishes-its-first-security-update","meta_description":"Last week, Google released its shiny new Chrome browser. However, before the week finished, Google also had to issue a patch for one of security's most common -","meta_title":"Google Chrome Polishes Its First Security Update","meta_zephr-tags":"DR-pageType-article, DR-pagePrimaryCategory-risk, DR-contentLabel-commentary, DR-pageIsSponsored-false"},"slug":"google-chrome-polishes-its-first-security-update","term":{"slug":"risk","display_options":"Standard View","topic_page_description":"Breaking news, news analysis, and expert commentary on cybersecurity risk, and the tools, technologies, and practices for assessing risk.","title":"Risk","system":{"uid":"blt7095e7265cf0f380","__typename":"EntrySystemField"},"seo":{"canonical_url":"","meta_description":"Breaking news, news analysis, and expert commentary on cybersecurity risk, and the tools, technologies, and practices for assessing risk","meta_keywords":"","meta_title":"Risk","__typename":"Seo"},"secondary_categoriesConnection":{"totalCount":1,"edges":[{"node":{"title":"[Risk] Compliance","secondary_category_name":"Compliance","slug":"compliance","display_options":"Standard View","topic_page_description":"","system":{"uid":"blt9d07d0a4c0d8cb54","__typename":"EntrySystemField"},"shown_in_header":true,"seo":{"meta_description":"Compliance","canonical_url":"","meta_keywords":"","meta_title":"Compliance","__typename":"Seo"},"sponsor_text":"","sponsor_logoConnection":{"edges":[],"__typename":"SysAssetConnection"},"image_alt_text":null,"branding":{"hub_page_color":"","hub_page_description_with_hyperlink":null,"image_alt_text":null,"hub_page_logoConnection":{"edges":[],"totalCount":0,"__typename":"SysAssetConnection"},"__typename":"DrCategorySecondaryBranding"},"__typename":"DrCategorySecondary"},"__typename":"DrPrimaryCategorySecondaryCategoriesEdge"}],"__typename":"DrPrimaryCategorySecondaryCategoriesConnection"},"sponsor_logoConnection":{"edges":[],"__typename":"SysAssetConnection"},"sponsor_text":"","image_alt_text":"","branding":{"hub_page_color":"000000","hub_page_description_with_hyperlink":"","image_alt_text":"","hub_page_logoConnection":{"totalCount":0,"edges":[],"__typename":"SysAssetConnection"},"__typename":"DrPrimaryCategoryBranding","hub_page_logo":{}},"__typename":"DrPrimaryCategory","term_related":["compliance","risk"],"term_selector":{"primaryTerm":"risk","primaryCategoryBelonged":"risk","primaryTermInRealText":"Risk"},"pagePrimaryCategory":"risk","uid":"blt7095e7265cf0f380","fullSlug":"risk","secondary_categories":[],"sponsor_logo":{},"icon":{},"term_type":"primary","isFound":true,"all_terms":["partner-perspectives","intel","bitdefender","general-dynamics-fidelis","tenable","carbon-black","malwarebytes","evident-io","f5","juniper","iboss","gigamon","crowdstrike","darktrace","microsoft","zscaler","ics-ot","black-hat","black-hat-news","dr-tech","the-cyber-future","emerging-tech","tech-talks","tech-trends","vulnerabilities-threats","advanced-threats","insider-threats","vulnerability-management","threat-intelligence","security-now","risk","compliance","physical-security","perimeter","operations","identity-and-access-management","edge","edge-articles","edge-ask-the-experts","edge-slideshows","edge-threat-monitor","cloud","attacks-breaches","mobile","iot","endpoint","authentication","privacy","remote-workforce","careers-and-people","application-security","database-security","analytics","security-monitoring","omdia"]},"isEdge":true,"primaryCategory":"risk","smartbox":[{"title":"Webinars","ordinal":1,"type":"Webinars","hidden":false,"feed":{"title":"Webinars","href":"https://smartbox.techweb.com/smartbox/externalsmartbox?site_id=162801002\u0026taxonomy_ids=\u0026num_display=5\u0026article_type=upcoming_webinars\u0026output_type=xml","__typename":"Link"},"read_more_link":{"title":"More Webinars","href":"https://www.darkreading.com/upcoming-webinars","__typename":"Link"},"system":{"uid":"blt8f82585c522cc0f5","__typename":"EntrySystemField"},"__typename":"DrSmartbox","articles":[{"title":["Building Out the Best Response Playbook for Ransomware Attacks"],"link":["https://darkreading.tradepub.com/c/pubRD.mpl?secure=1\u0026sr=pp\u0026_t=pp:\u0026qf=w_palo190\u0026ch=sbx\u0026cid=smartbox_techweb_upcoming_webinars_8.500001271\u0026_mc=smartbox_techweb_upcoming_webinars_8.500001271"],"publishDate":["Feb 24, 2023"],"publishedSite":[""],"eventDate":["Mar 28, 2023"],"publishedSiteURL":[""],"description":["When ransomware locks up your business's critical data and essential gear, there is no time to panic. The organization needs answers fast: Is the infection going to spread to other endpoints? Will the attackers publicly dump the stolen information? How good are our backups? What does our insurance provider say? How well the organization weathers the attack will depend on how well the organization prepared the answers in advance. In this webinar, learn what processes and procedures should go into your ransomware response playbook, and learn about the tools and techniques that will help you bounce back from a ransomware infection.\r\nDuring this webinar you will:\r\n--Learn the basic building blocks of a ransomware response playbook.\r\n--Get real-world advice on managing critical communications during ransomware incident response.\r\n--Find out what experts have to say about the role of cyber insurance."]},{"title":["ChatGPT: Defending Your Business Against AI-Supercharged Ransomware"],"link":["https://darkreading.tradepub.com/c/pubRD.mpl?secure=1\u0026sr=pp\u0026_t=pp:\u0026qf=w_defa3936\u0026ch=sbx\u0026cid=smartbox_techweb_upcoming_webinars_8.500001275\u0026_mc=smartbox_techweb_upcoming_webinars_8.500001275"],"publishDate":["Mar 07, 2023"],"publishedSite":[""],"eventDate":["Mar 29, 2023"],"publishedSiteURL":[""],"description":["This webinar will dig into the ways criminals are projected to take advantage of ChatGPT and other AI tools to improve the reach and effectiveness of their ransomware attacks. The session will conclude with a review of a 12-step plan that businesses can use to improve their active defenses as well as their mitigation of and recovery from successful ransomware attacks - both conventional and AI-enabled."]},{"title":["Ten Emerging Vulnerabilities Every Enterprise Should Know"],"link":["https://darkreading.tradepub.com/c/pubRD.mpl?secure=1\u0026sr=pp\u0026_t=pp:\u0026qf=w_defa3791\u0026ch=sbx\u0026cid=smartbox_techweb_upcoming_webinars_8.500001265\u0026_mc=smartbox_techweb_upcoming_webinars_8.500001265"],"publishDate":["Feb 06, 2023"],"publishedSite":[""],"eventDate":["Mar 30, 2023"],"publishedSiteURL":[""],"description":["Every day, black hat attackers and white hat researchers are discovering new security vulnerabilities in widely-used systems and applications that might be exploited to compromise your data. Are you aware of the newest - and potentially most impactful - vulnerabilities that have been discovered/disclosed? In this webinar, top researchers and experts discuss some of the most dangerous emerging vulnerabilities, and what you can do to prevent them from being exploited in your organization."]},{"title":["How Applications Are Attacked: A Year in Application Security"],"link":["https://darkreading.tradepub.com/c/pubRD.mpl?secure=1\u0026sr=pp\u0026_t=pp:\u0026qf=w_clow15\u0026ch=sbx\u0026cid=smartbox_techweb_upcoming_webinars_8.500001276\u0026_mc=smartbox_techweb_upcoming_webinars_8.500001276"],"publishDate":["Mar 10, 2023"],"publishedSite":[""],"eventDate":["Apr 04, 2023"],"publishedSiteURL":[""],"description":["Cloudflare sees up to 61 million requests per second, meaning we have an unprecedented view into Internet trends like application attacks and API traffic, and automated bot activity. We have put that incredible visibility to use by profiling a year of attacks targeting the applications that run business.\r\n\r\nJoin Cloudflare Field CTO Trey Guinn and Product Marketing Director, Dan Gould, as they discusses key attacks that organizational security postures must account for in 2023"]},{"title":["Managing Identity in the Cloud"],"link":["https://darkreading.tradepub.com/c/pubRD.mpl?secure=1\u0026sr=pp\u0026_t=pp:\u0026qf=w_defa3923\u0026ch=sbx\u0026cid=smartbox_techweb_upcoming_webinars_8.500001274\u0026_mc=smartbox_techweb_upcoming_webinars_8.500001274"],"publishDate":["Mar 02, 2023"],"publishedSite":[""],"eventDate":["Apr 05, 2023"],"publishedSiteURL":[""],"description":["Shifting identity management and provisioning to the cloud helps streamline these operations. It also brings a new set of challenges, including integrating and managing user identities, privileges, and other attributes used in various on-premise and cloud systems, especially if your organization is operating in a hybrid model. In this webinar, experts will provide insights and recommendations for harnessing user and machine identities in the cloud and among hybrid environments to ensure more solid security identity for the enterprise."]}]},{"title":"Reports","ordinal":1,"type":"Reports","hidden":false,"feed":{"title":"Reports","href":"https://smartbox.techweb.com/smartbox/externalsmartbox?site_id=162801002\u0026taxonomy_ids=\u0026num_display=5\u0026article_type=analytics\u0026output_type=xml","__typename":"Link"},"read_more_link":{"title":"More Reports","href":"/must-reads","__typename":"Link"},"system":{"uid":"blt5145c70334f61d02","__typename":"EntrySystemField"},"__typename":"DrSmartbox","articles":[{"title":["The 10 Most Impactful Types of Vulnerabilities for Enterprises Today"],"link":["https://darkreading.tradepub.com/c/pubRD.mpl?secure=1\u0026sr=pp\u0026_t=pp:\u0026pc=w_defa3977\u0026ch=sbx\u0026cid=smartbox_techweb_analytics_7.300005981\u0026_mc=smartbox_techweb_analytics_7.300005981"],"publishedSite":[""],"publishedSiteURL":[""],"description":["The enterprise attack surface is constantly expanding. Enterprises have to think beyond zero day vulnerabilities. It's imperative security teams start looking at vulnerabilities in 5G, firmware, edge, and ICS/OT, among others.\r\n\r\nManaging system vulnerabilities is one of the old est - and most frustrating - security challenges that enterprise defenders face. Every software application and hardware device ships with intrinsic flaws - flaws that, if critical enough, attackers can exploit from anywhere in the world. It's crucial that defenders take stock of what areas of the tech stack have the most emerging, and critical, vulnerabilities they must manage. It's not just zero day vulnerabilities. Consider that CISA's Known Exploited Vulnerabilities (KEV) catalog lists vulnerabilitlies in widely used applications that are \"actively exploited,\" and most of them are flaws that were discovered several years ago and have been fixed. There are also emerging vulnerabilities in 5G networks, cloud infrastructure, Edge applications, and firmwares to consider. "]},{"title":["Shoring Up the Software Supply Chain Across Enterprise Applications"],"link":["https://darkreading.tradepub.com/c/pubRD.mpl?secure=1\u0026sr=pp\u0026_t=pp:\u0026pc=w_defa3940\u0026ch=sbx\u0026cid=smartbox_techweb_analytics_7.300005980\u0026_mc=smartbox_techweb_analytics_7.300005980"],"publishedSite":[""],"publishedSiteURL":[""],"description":["Supply chain security attacks are growing at an alarming pace, and things are going to keep getting worse until DevSecOps teams get on the same page. A little help from the feds could also be welcome\r\n\r\nModern-day software development depends heavily on third-party components, libraries, and frameworks. Many of these components have their own dependencies, and software owners and project developers may not even know all the different pieces of code that make up their application. With attackers increasingly targeting these software building blocks to compromise enterprise applications, managing and protecting the software supply chain is more important than ever. Software developers and owners have to have visibility in their application, identify the vulnerabilities, and address them in a timely manner.\r\n\r\nIn this report, experts discuss the ever-expanding software attack surface and how to secure the supply chain. "]},{"title":["The Promise and Reality of Cloud Security"],"link":["https://darkreading.tradepub.com/c/pubRD.mpl?secure=1\u0026sr=pp\u0026_t=pp:\u0026pc=w_darl08\u0026ch=sbx\u0026cid=smartbox_techweb_analytics_7.300005973\u0026_mc=smartbox_techweb_analytics_7.300005973"],"publishedSite":[""],"publishedSiteURL":[""],"description":["Cloud security has been part of the cybersecurity conversation for years but has been on the sidelines for most enterprises.\r\n\r\nThe shift to remote work during the COVID-19 pandemic and digital transformation projects have moved cloud infrastructure front-and-center as enterprises address the associated security risks. This report - a compilation of cutting-edge Black Hat research, in-depth Omdia analysis, and comprehensive Dark Reading reporting - explores how cloud security is rapidly evolving."]},{"title":["10 Hot Talks From Black Hat USA 2022"],"link":["https://darkreading.tradepub.com/c/pubRD.mpl?secure=1\u0026sr=pp\u0026_t=pp:\u0026pc=w_defa3521\u0026ch=sbx\u0026cid=smartbox_techweb_analytics_7.300005970\u0026_mc=smartbox_techweb_analytics_7.300005970"],"publishedSite":[""],"publishedSiteURL":[""],"description":["Black Hat USA brings together cutting-edge research, new security tools, and sophisticated defensive techniques over the course of two days.\r\n\r\nThere were some recurring themes across the sessions, and many of these topics are going to be important issues to watch in 2023. This report covers the following topics:\r\n\r\n--Identity and access management\r\n--Container security\r\n--Software supply chain security\r\n--Defensive techniques such as threat hunting\r\n--Workforce Challenges\r\n--Geopolitics\r\n--Role of AI and Machine Learning"]},{"title":["How Machine Learning, AI \u0026 Deep Learning Improve Cybersecurity"],"link":["https://www.informationweek.com/whitepaper/cybersecurity/cloud-security/how-machine-learning,-ai-and-deep-learning-improve-cybersecurity/442433?keycode=sbx\u0026cid=smartbox_techweb_analytics_7.300005958\u0026_mc=smartbox_techweb_analytics_7.300005958"],"publishedSite":[""],"publishedSiteURL":[""]}]},{"title":"Thao test smartbox","ordinal":1,"type":"Webinars","hidden":false,"feed":{"title":"Thao tests smartbox","href":"https://smartbox.techweb.com/smartbox/externalsmartbox?site_id=162801002\u0026taxonomy_ids=\u0026num_display=3\u0026article_type=session\u0026output_type=xml","__typename":"Link"},"read_more_link":{"title":"Read more","href":"https://finance.vietstock.vn/TDC-ctcp-kinh-doanh-va-phat-trien-binh-duong.htm","__typename":"Link"},"system":{"uid":"blt378d3b273bbe06e9","__typename":"EntrySystemField"},"__typename":"DrSmartbox","articles":[{"title":["Black Hat USA - August 5-10 - Learn More"],"link":["https://www.blackhat.com?cid=smartbox_techweb_session_16.500287\u0026_mc=smartbox_techweb_session_16.500287"],"publishDate":["Aug 05, 2023"],"publishedSite":[""],"publishedSiteURL":[""]},{"title":["Black Hat Asia - May 9-12 - Learn More"],"link":["https://www.blackhat.com?cid=smartbox_techweb_session_16.500286\u0026_mc=smartbox_techweb_session_16.500286"],"publishDate":["May 09, 2023"],"publishedSite":[""],"publishedSiteURL":[""]}]},{"title":"Events","ordinal":2,"type":"Live Events","hidden":false,"feed":{"title":"Events","href":"https://smartbox.techweb.com/smartbox/externalsmartbox?site_id=162801002\u0026taxonomy_ids=\u0026num_display=3\u0026article_type=session\u0026output_type=xml","__typename":"Link"},"read_more_link":{"title":"More Events","href":"https://www.darkreading.com/upcoming-events","__typename":"Link"},"system":{"uid":"blt8b6a33909c49602f","__typename":"EntrySystemField"},"__typename":"DrSmartbox","articles":[{"title":["Black Hat USA - August 5-10 - Learn More"],"link":["https://www.blackhat.com?cid=smartbox_techweb_session_16.500287\u0026_mc=smartbox_techweb_session_16.500287"],"publishDate":["Aug 05, 2023"],"publishedSite":[""],"publishedSiteURL":[""]},{"title":["Black Hat Asia - May 9-12 - Learn More"],"link":["https://www.blackhat.com?cid=smartbox_techweb_session_16.500286\u0026_mc=smartbox_techweb_session_16.500286"],"publishDate":["May 09, 2023"],"publishedSite":[""],"publishedSiteURL":[""]}]},{"title":"White Papers","ordinal":3,"type":"Whitepapers","hidden":false,"feed":{"title":"White Papers","href":"https://smartbox.techweb.com/smartbox/externalsmartbox?site_id=162801002\u0026taxonomy_ids=\u0026num_display=\u0026article_type=whitepaper\u0026output_type=xml","__typename":"Link"},"read_more_link":{"title":"More White Papers","href":"https://www.informationweek.com/whitepaper/Security","__typename":"Link"},"system":{"uid":"blt1192837947494c5f","__typename":"EntrySystemField"},"__typename":"DrSmartbox","articles":[{"title":["Enable and Protect Your Remote Workforce"],"link":["https://www.informationweek.com/whitepaper/security-management-and-analytics/risk-management-security/enable-and-protect-your-remote-workforce/423573?cid=smartbox_techweb_whitepaper_14.500005324\u0026_mc=smartbox_techweb_whitepaper_14.500005324"],"publishedSite":[""],"publishedSiteURL":[""]},{"title":["Cloud Journey Adoption Stage: Securing Hybrid and Multi-cloud Environments"],"link":["https://www.informationweek.com/whitepaper/cybersecurity/security/cloud-journey-adoption-stage-securing-hybrid-and-multi-cloud-environments/443422?cid=smartbox_techweb_whitepaper_14.500005311\u0026_mc=smartbox_techweb_whitepaper_14.500005311"],"publishedSite":[""],"publishedSiteURL":[""]},{"title":["Cloud Journey Migration Stage: Adaptive Cloud Security"],"link":["https://www.informationweek.com/whitepaper/cybersecurity/security/cloud-journey-migration-stage-adaptive-cloud-security/443421?cid=smartbox_techweb_whitepaper_14.500005310\u0026_mc=smartbox_techweb_whitepaper_14.500005310"],"publishedSite":[""],"publishedSiteURL":[""]},{"title":["Developer-Focused Security from Code to Cloud and Back to Code"],"link":["https://www.informationweek.com/whitepaper/cybersecurity/security/developer-focused-security-from-code-to-cloud-and-back-to-code/440613?cid=smartbox_techweb_whitepaper_14.500005298\u0026_mc=smartbox_techweb_whitepaper_14.500005298"],"publishedSite":[""],"publishedSiteURL":[""]},{"title":["Building the SOC of the Future"],"link":["https://www.informationweek.com/whitepaper/cybersecurity/security-monitoring/building-the-soc-of-the-future-/443083?cid=smartbox_techweb_whitepaper_14.500005292\u0026_mc=smartbox_techweb_whitepaper_14.500005292"],"publishedSite":[""],"publishedSiteURL":[""]}]}],"editorsChoice":{"_version":116,"locale":"en-us","uid":"blt9262b8fd3485b1dc","ACL":{},"_in_progress":false,"created_at":"2021-05-29T07:25:35.582Z","created_by":"blt9a0fc67c46c47dd7","selected_articles":[{"_version":7,"locale":"en-us","uid":"blt62c1959995ad76ec","ACL":{},"_in_progress":false,"article_label":[{"uid":"bltb75c0271fde42422","_content_type_uid":"dr_article_label"}],"author_page":[{"_version":4,"locale":"en-us","uid":"blt46fdf3ec3893f4ce","_in_progress":false,"author_description":"Nathan Eddy is a freelance journalist and award-winning documentary filmmaker specializing in IT security, autonomous vehicle technology, customer experience technology, and architecture and urban planning. A graduate of Northwestern University’s Medill School of Journalism, Nathan currently lives in Berlin, Germany. ","author_email":"nathaneddy@gmail.com","author_label":{"display_author_label":false,"author_label_text":"","author_label_background_color":"ffffff","author_label_text_color":"000000"},"author_name":"Nathan Eddy","author_page_tagline":"","author_role":"Contributing Writer, Dark Reading","created_at":"2022-05-25T13:53:39.805Z","created_by":"blt13546d7f135b3d6e","hidden_email":true,"image_alt_text":"Dark Reading Logo","member_since":"2022-05-25","portrait":{"_version":1,"is_dir":false,"uid":"bltf8b5a94afa71c53a","ACL":{},"content_type":"image/png","created_at":"2022-05-25T14:05:13.833Z","created_by":"blt13546d7f135b3d6e","file_size":"219304","filename":"NathanEddyHeadshot.PNG","parent_uid":null,"tags":[],"title":"NathanEddyHeadshot.PNG","updated_at":"2022-05-25T14:05:13.833Z","updated_by":"blt13546d7f135b3d6e","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2022-05-25T14:05:36.342Z","user":"blt13546d7f135b3d6e"},"url":"https://eu-images.contentstack.com/v3/assets/blt66983808af36a8ef/bltf8b5a94afa71c53a/628e3799daa31875dc0c9fc0/NathanEddyHeadshot.PNG"},"seo":{"meta_title":"","meta_description":"","meta_keywords":"","canonical_url":""},"social_links":{"twitter_link":{"title":"","href":""},"linkedin_link":{"title":"Nathan Eddy on LinkedIn","href":"https://www.linkedin.com/in/nathan-eddy-3b31722/"}},"specialisms":[],"tags":[],"title":"Nathan Eddy","updated_at":"2022-05-25T14:22:18.760Z","updated_by":"blt13546d7f135b3d6e","url":"/author/nathan-eddy","_content_type_uid":"dr_author","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2022-05-25T14:22:31.447Z","user":"blt13546d7f135b3d6e"}}],"body":"\u003cp\u003eMicrosoft recently patched a zero-day vulnerability under active exploit in Microsoft Outlook, identified as CVE-2023-23397, which could enable an attacker to perform a privilege escalation, accessing the victim's Net-NTLMv2 challenge-response authentication hash and impersonating the user.\u003c/p\u003e\n\u003cp\u003eNow it's becoming clear that\u0026nbsp;\u003ca href=\"https://www.darkreading.com/vulnerabilities-threats/microsoft-zero-day-bugs-security-feature-bypass\" target=\"_blank\"\u003eCVE-2023-23397\u003c/a\u003e\u0026nbsp;is dangerous enough to become the most far-reaching bug of the year, security researchers are warning. Since disclosure just three days ago, \u003ca href=\"https://www.mdsec.co.uk/2023/03/exploiting-cve-2023-23397-microsoft-outlook-elevation-of-privilege-vulnerability/\" target=\"_blank\"\u003emore proof-of-concept (PoC) exploits\u003c/a\u003e have sprung onto the scene, which are sure to translate into snowballing criminal interest — helped along by the fact that no user interaction is required for exploitation.\u003c/p\u003e\n\u003cp\u003eIf\u0026nbsp;patching isn't possible quickly, there are some options for addressing the issue, noted below.\u003c/p\u003e\u003ch2 class=\"regular-text\"\u003eEasy Exploit: No User Interaction Necessary\u003c/h2\u003e\n\u003cp\u003eThe vulnerability allows the attackers to steal NTLM authentication hashes by sending malicious Outlook notes or tasks to the victim. These\u0026nbsp;trigger the exploit automatically when they're retrieved and processed by the Outlook client, which could lead to exploitation before the email is viewed in the Preview Pane. In other words,\u0026nbsp;a target doesn’t actually have to open the email to fall victim to an attack.\u003c/p\u003e\n\u003cp\u003eDiscovered by researchers from Ukraine's Computer Emergency Response\u0026nbsp;Team (CERT) and by one of Microsoft’s own researchers — and patched earlier this week as part of Microsoft's Patch Tuesday update\u0026nbsp;— the bug affects those running an Exchange server and the Outlook for Windows desktop client. Outlook for Android, iOS, Mac, and Outlook for Web (OWA) are unaffected.\u003c/p\u003e\n\u003cp\u003e\"External attackers could send specially crafted emails that will cause a connection from the victim to an external UNC location of attackers' control,\" says Mark Stamford, founder and CEO of OccamSec. This will leak the Net-NTLMv2 hash of the victim to the attacker, who can then relay this to another service and authenticate as the victim, he explains.\u003c/p\u003e\u003ch2 class=\"regular-text\"\u003eA Range of Potential Exploit Impacts\u003c/h2\u003e\n\u003cp\u003eNick Ascoli, founder and CEO of Foretrace, points out while Microsoft didn't mention how the criminals were using it within their attacks, it allows the reuse of the stolen authentication to connect to other computers over the network for lateral movement.\u003c/p\u003e\n\u003cp\u003e\"The range of possible attacks could go from data exfiltration to potentially installing malware, depending on the permissions of the victim,\" he says.\u003c/p\u003e\n\u003cp\u003eBud Broomhead, CEO at Viakoo, notes that \"the likely victims are ones most susceptible to business email compromise (BEC) and to having their identity used for other forms of exploits.\" He points out there are a few areas that this potentially impacts, the most serious being identity management and trust of internal email communications.\u003c/p\u003e\n\u003cp\u003e\"The risks also include breaching of core IT systems, distribution of malware, business email compromise for financial gain, and disruption of business operations and business continuity,\" Broomhead cautions.\u003c/p\u003e\u003ch2 class=\"regular-text\"\u003eIs This the \"It\" Bug of 2023?\u003c/h2\u003e\n\u003cp\u003eViakoo's Broomhead says that while at this point in 2023 there could be many possible \"It\" bugs coming from Microsoft, this is certainly a contender.\u003c/p\u003e\n\u003cp\u003e\"Because it impacts organizations of all types and sizes, has disruptive methods of mitigation, and training employees on it won’t stop it, this could be a vulnerability that requires more significant effort to mitigate and remediate,\" he explains.\u003c/p\u003e\n\u003cp\u003eHe notes the attack surface is at least as big as the user base of desktop Outlook (massive), and potentially core IT systems connected to Windows 365 (very massive), and even any recipients of emails sent through Outlook (pretty much everyone).\u003c/p\u003e\n\u003cp\u003eThen as mentioned, the PoCs that are circulating makes the situation even more attractive to cybercriminals.\u003c/p\u003e\n\u003cp\u003e\"Since the vulnerability is public and instructions for a proof-of-concept are well documented now, other threat actors may adopt the vulnerability in malware campaigns and target a more widespread audience,\" adds Daniel Hofmann, CEO of Hornetsecurity. \"Overall, exploiting the vulnerability is simple, and public proofs-of-concept can already be found on GitHub and other open forums.\"\u003c/p\u003e\n\u003cp\u003eWhat should businesses do? They may have to look beyond patching, Broomhead warns: \"Mitigation in this case is difficult, as it causes disruption in how emails systems and users within it are configured.\"\u003c/p\u003e\n\u003cp\u003e\u003c/p\u003e\u003ch2 class=\"regular-text\"\u003eHow to Protect Against CVE-2023-23397\u003c/h2\u003e\n\u003cp\u003e\u003c/p\u003e\n\u003cp\u003eFor those unable to patch right away, Hornetsecurity's Hofmann says that to better protect the organization, administrators should block TCP 445/SMB outbound traffic to the Internet from the network using perimeter firewalls, local firewalls, and VPN settings.\u003c/p\u003e\n\u003cp\u003e\"This action prevents the transmission of NTLM authentication messages to remote file shares, helping to address CVE-2023-23397,\" he explains.\u003c/p\u003e\n\u003cp\u003eOrganizations should also add users to the \"Protected Users Security Group\" in \u003ca href=\"https://www.darkreading.com/risk/access-control-gap-microsoft-active-directory-enterprise-attack-surface\" target=\"_blank\"\u003eActive Directory\u003c/a\u003e to prevent NTLM as an authentication mechanism.\u003c/p\u003e\n\u003cp\u003e\"This approach simplifies troubleshooting compared to other methods of disabling NTLM,\" Broomhead says. \"It is particularly useful for high-value accounts, such as domain administrators.\"\u003c/p\u003e\n\u003cp\u003eHe points out \u003ca href=\"https://microsoft.github.io/CSS-Exchange/Security/CVE-2023-23397/\" target=\"_blank\"\u003eMicrosoft has provided a script\u003c/a\u003e to identify and clean up or remove Exchange messages with UNC paths in message properties, and it advises administrators to apply the script to determine if they have been affected by the vulnerability and to remediate it.\u003c/p\u003e","byline":"","created_at":"2023-03-17T18:39:54.179Z","created_by":"blt13546d7f135b3d6e","featured_image":{"_version":1,"is_dir":false,"uid":"blt4fdfa380d8796235","ACL":{},"content_type":"image/jpeg","created_at":"2023-03-17T18:39:20.654Z","created_by":"blt13546d7f135b3d6e","file_size":"3802591","filename":"outlook-imageBROKER-Alamy.jpg","parent_uid":null,"tags":[],"title":"outlook-imageBROKER-Alamy.jpg","updated_at":"2023-03-17T18:39:20.654Z","updated_by":"blt13546d7f135b3d6e","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2023-03-17T19:08:22.811Z","user":"blt603b94c5f23c042e"},"url":"https://eu-images.contentstack.com/v3/assets/blt66983808af36a8ef/blt4fdfa380d8796235/6414b3d864d6120f0ea8641e/outlook-imageBROKER-Alamy.jpg"},"featured_image_caption":"","featured_image_credit":"Source: imageBROKER via Alamy Stock Photo","image_alt_text":"Home office with laptop, Apple MacBook Pro with iPhone X at the desk, with open email program Microsoft Outlook","keywords":[],"old_url":"","published_date":"2023-03-17T18:23:11.000Z","seo":{"meta_title":"","meta_description":"","meta_keywords":"","canonical_url":""},"sponsored_content_settings":{"is_sponsor_article":false,"sponsor_name":""},"summary":"Snowballing PoC exploits for CVE-2023-23397 and a massive attack surface means that almost any business user could be a victim.","tags":[],"term_selector":{"historyOfPrimaryTerm":["application-security"],"primaryTerm":"application-security","primaryTermInRealText":"Application Security","primaryCategoryBelonged":"application-security","actualUrl":"/application-security/microsoft-outlook-vulnerability-2023-it-bug","secondaryTerm":["risk","threat-intelligence","vulnerabilities-threats","vulnerability-management"]},"title":"Microsoft Outlook Vulnerability Could Be 2023's 'It' Bug","updated_at":"2023-03-20T13:48:09.861Z","updated_by":"blt13546d7f135b3d6e","url":"/microsoft-outlook-vulnerability-2023-it-bug","_content_type_uid":"dr_article","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2023-03-20T13:48:17.007Z","user":"blt13546d7f135b3d6e"}},{"_version":9,"locale":"en-us","uid":"blt2b3631d3aa673b2f","ACL":{},"_in_progress":false,"article_label":[{"uid":"bltb75c0271fde42422","_content_type_uid":"dr_article_label"}],"author_page":[{"_version":9,"locale":"en-us","uid":"bltcf92f153b306d902","_in_progress":false,"author_description":"Elizabeth Montalbano is a freelance writer, journalist, and therapeutic writing mentor with more than 25 years of professional experience. Her areas of expertise include technology, business and culture. Elizabeth previously lived and worked as a full-time journalist in Phoenix, San Francisco and New York City; she currently resides in a village on the southwest coast of Portugal. In her free time she enjoys surfing, hiking with her dogs, traveling, playing music, yoga and cooking.\u003cbr\u003e","author_email":"elizabethjourno@gmail.com","author_label":{"author_label_background_color":"","author_label_text":"","author_label_text_color":"","display_author_label":false},"author_name":"Elizabeth Montalbano","author_page_tagline":"","author_role":"Contributor, Dark Reading","created_at":"2021-06-24T07:19:58.716Z","created_by":"blt5ee151557599d2cd","hidden_email":false,"image_alt_text":"headshot of Elizabeth Montalbano","member_since":null,"portrait":{"_version":1,"is_dir":false,"uid":"bltbfd004d139d42d70","ACL":{},"content_type":"image/jpeg","created_at":"2022-08-22T17:28:06.226Z","created_by":"blt31bd4bcd14669cc0","file_size":"98905","filename":"ElizabethMontalbano.jpg","parent_uid":null,"tags":[],"title":"ElizabethMontalbano.jpg","updated_at":"2022-08-22T17:28:06.226Z","updated_by":"blt31bd4bcd14669cc0","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2022-08-22T17:29:02.355Z","user":"blt31bd4bcd14669cc0"},"url":"https://eu-images.contentstack.com/v3/assets/blt66983808af36a8ef/bltbfd004d139d42d70/6303bca6236c2476a257760e/ElizabethMontalbano.jpg"},"seo":{"canonical_url":"","meta_description":"","meta_keywords":"","meta_title":""},"social_links":{"linkedin_link":{"title":"","href":""},"twitter_link":{"title":"","href":""}},"specialisms":[],"title":"Elizabeth Montalbano","updated_at":"2022-08-22T18:01:14.843Z","updated_by":"blt603b94c5f23c042e","url":"/author/elizabeth-montalbano","_content_type_uid":"dr_author","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2022-08-22T18:01:20.620Z","user":"blt603b94c5f23c042e"}}],"body":"\u003cp\u003eA post-exploitation attack method has been uncovered that allows adversaries to read cleartext user passwords for Okta, the identity access and management (IAM) provider — and gain far-ranging access into a corporate environment.\u003c/p\u003e\u003cp\u003e\u003ca href=\"https://www.mitiga.io/blog/how-okta-passwords-can-be-compromised-uncovering-a-risk-to-user-data\" target=\"_blank\"\u003eResearchers from Mitiga discovered\u003c/a\u003e\u0026nbsp;that the IAM system\u0026nbsp;saves \u003ca href=\"https://www.darkreading.com/dr-tech/okta-expands-no-code-offerings-for-identity-cloud\" target=\"_blank\"\u003eOkta\u0026nbsp;user passwords\u003c/a\u003e to audit logs if a user accidentally types them in the \"username\" field when logging in.\u0026nbsp;Threat actors who have gained access to a company's system can then easily harvest them,\u0026nbsp;elevate privileges, and gain access across multiple enterprise assets that use Okta, the researchers said.\u003c/p\u003e\u003cp\u003e\"In our research, we could easily use the logs to match the password with the valid user,\u0026nbsp;resulting in gaining credentials to the Okta user account,\" Okta senior security researcher Doron Karmi and principal security researcher and developer Or Aspir wrote in the post. When\u0026nbsp;adversaries login to Okta as those users, it \"expands the blast radius of the attack to the many platforms that Okta secures, and gaining further access to systems,\" they wrote.\u003c/p\u003e\u003cp\u003eThe vulnerability exists because Okta audit logs supply detailed information about user activity, including usernames, IP addresses, and login timestamps. The logs also provide insights into successful and unsuccessful login attempts and whether they were performed via Web browser or mobile app.\u003c/p\u003e\u003ch2 class=\"regular-text\"\u003eIn Defense of Okta Features\u003c/h2\u003e\u003cp\u003eOkta is a \u003ca href=\"https://www.darkreading.com/dr-tech/okta-launches-new-workforce-identity-cloud\" target=\"_blank\"\u003ecloud-based enterprise-grade IAM service\u003c/a\u003e that connects enterprise users across applications and devices and is used by more than 17,000 customers globally. While it was built for cloud-based systems, it also is compatible with many on-premises applications.\u003c/p\u003e\u003cp\u003eRepresentatives from Okta confirm that saving cleartext passwords in audit logs is \"expected behavior when users mistakenly enter their password in the username field,\" according to a statement by the company provided by Mitiga.\u0026nbsp;They also said that\u0026nbsp;only platform administrators — the most privileged users in the system — have access to audit logs that save cleartext passwords, and those users \"should be trusted not to engage in malicious activities.\"\u003c/p\u003e\u003cp\u003eIt's not the first time the company has had to defend a built-in feature of the platform's regarding how it handles user passwords. The company posted \u003ca href=\"https://www.okta.com/blog/2022/07/okta-response-to-security-report/\" target=\"_blank\"\u003ea blog post\u003c/a\u003e last July in response to a report by \u003ca href=\"https://www.authomize.com/blog/authomize-discovers-password-stealing-and-impersonation-risks-to-in-okta/\" target=\"_blank\"\u003eAuthomize researchers\u003c/a\u003e that Okta's architecture for password synching allows malicious actors signed on as an app administrator of a downstream app to access passwords in plaintext, including admin credentials, even over encrypted channels.\u003c/p\u003e\u003cp\u003eThat report came after threat group Lapsus$ claimed to have \u003ca href=\"https://www.darkreading.com/attacks-breaches/okta-says-366-customers-impacted-via-third-party-breach\" target=\"_blank\"\u003ebreached Okta\u003c/a\u003e with \"superuser\" account credentials, posting screenshots they claimed to have grabbed from internal systems. It was determined that 366 Okta customers were potentially impacted in that incident, though Okta later said it determined \u003ca href=\"https://www.okta.com/blog/2022/04/okta-concludes-its-investigation-into-the-january-2022-compromise/\" target=\"_blank\"\u003eonly two actual breaches\u003c/a\u003e.\u003c/p\u003e\u003ch2 class=\"regular-text\"\u003eWhat Happens if Untrusted Users Gain Access\u003c/h2\u003e\u003cp\u003eMitiga's research is relevant if someone other than a trusted administrator gains access to these logs and can access the data, which can happen in a number of ways, the researchers said.\u003c/p\u003e\u003cp\u003eOne way would be if an attacker has permission to read the logs in an organization's SIEM solution such as Splunk, as the logs are saved in this solution, they said. Moreover, in such a scenario, every user with read-only access to the SIEM solution potentially could have access the passwords, including Okta admins.\u003c/p\u003e\u003cp\u003eAttackers also could gain access to the logs and thus user passwords through third party-services that have permissions to read Okta configurations, such as cloud security posture management\u0026nbsp;(CSPM) products that request a \"read-only\" admin role, the researchers said. \"The role includes the ability to read the audit logs, which means those products/services could read users' credentials,\" they said.\u003c/p\u003e\u003cp\u003eOnce attackers have gained access to user credentials, they can try to log in as those users to any of the organization's different platforms that use Okta single sign-on. This data also could be used to escalate privileges in the case of exposed administrator' passwords, the researchers said.\u003c/p\u003e\u003ch2 class=\"regular-text\"\u003eAvoid Leaking Okta Passwords\u003c/h2\u003e\u003cp\u003eBoth Mitiga researchers and Okta provided recommendations for how enterprises can avoid inadvertently\u0026nbsp;\u003ca href=\"https://www.darkreading.com/remote-workforce/twilio-hackers-okta-credentials-sprawling-supply-chain-attack\" target=\"_blank\"\u003eexposing Okta credentials\u003c/a\u003e\u0026nbsp;to threat actors, with the latter also advising how platform users can avoid typing their password in the username field in the first place.\u003c/p\u003e\u003cp\u003eMitiga advised enterprises to use an SQL query, which can be found on Mitiga's GitHub, to detect potential users that enter their password by mistake, and also consider rotating user passwords. They also should train employees to avoid entering passwords in the username field on the Okta login page, and continuously monitor Okta audit logs for suspicious activities, including failed login attempts, following up with investigations if necessary.\u003c/p\u003e\u003cp\u003eImplementing multifactor authentication (MFA) also can prevent unauthorized access even if attackers obtain users' credentials, according to Mitiga, a feature that Okta said is enforced by default when accessing the Okta admin console.\u003c/p\u003e\u003cp\u003e\"Similarly, admins can set up an Authentication Policy that requires additional MFA when logging in to specific applications, which would further restrict what actions a bad actor can perform,\" according to Okta.\u003c/p\u003e\u003cp\u003eTo avoid inadvertently logging passwords in the username field, Okta users should implement field validation to check that the input in each field matches the expected format. They can also implement Okta's FastPass feature that uses biometric features or device activation to allow users to sign in with a single click or tap without even entering a username or password at all. Clearly labeling the \"username\" and \"password\" fields in Okta with placeholder text within each field, the company said, can also help users avoid this mistake.\u003c/p\u003e","byline":"","created_at":"2023-03-23T09:14:29.587Z","created_by":"blt8341579c76ea5460","featured_image":{"_version":1,"is_dir":false,"uid":"bltcf9384fe6e71b3ae","ACL":{},"content_type":"image/jpeg","created_at":"2022-10-21T13:13:15.163Z","created_by":"blt31bd4bcd14669cc0","file_size":"282983","filename":"password_brian_Jackson_AlamyStockPhoto.jpeg","parent_uid":null,"tags":[],"title":"password_brian_Jackson_AlamyStockPhoto.jpeg","updated_at":"2022-10-21T13:13:15.163Z","updated_by":"blt31bd4bcd14669cc0","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2022-10-21T13:50:21.049Z","user":"blt603b94c5f23c042e"},"url":"https://eu-images.contentstack.com/v3/assets/blt66983808af36a8ef/bltcf9384fe6e71b3ae/63529aeb37e4b1040fafef18/password_brian_Jackson_AlamyStockPhoto.jpeg"},"featured_image_caption":"","featured_image_credit":"Source: Brian Jackson via Alamy Stock Photo","image_alt_text":"Image shows the word password on a screen surrounded by lines of computer code and highlighted through a magnifying glass","keywords":[],"old_url":"","published_date":"2023-03-23T15:18:39.000Z","seo":{"meta_title":"","meta_description":"","meta_keywords":"","canonical_url":""},"sponsored_content_settings":{"is_sponsor_article":false,"sponsor_name":""},"summary":"Accidentally typing a password in the username field of the platform saves them to audit logs, to which threat actors can gain access and use to compromise enterprise services.","tags":[],"term_selector":{"historyOfPrimaryTerm":["endpoint"],"primaryTerm":"endpoint","primaryTermInRealText":"Endpoint","primaryCategoryBelonged":"endpoint","actualUrl":"/endpoint/okta-post-exploit-method-exposes-user-passwords","secondaryTerm":["attacks-breaches","identity-and-access-management","threat-intelligence","vulnerabilities-threats"]},"title":"Okta Post-Exploitation Method Exposes User Passwords","updated_at":"2023-03-23T15:30:32.614Z","updated_by":"blt603b94c5f23c042e","url":"/okta-post-exploit-method-exposes-user-passwords","_content_type_uid":"dr_article","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2023-03-23T15:30:38.080Z","user":"blt603b94c5f23c042e"}},{"_version":22,"locale":"en-us","uid":"bltbb099a5206a8b4c0","ACL":{},"_in_progress":false,"article_label":[{"uid":"bltb75c0271fde42422","_content_type_uid":"dr_article_label"}],"author_page":[{"_version":3,"locale":"en-us","uid":"blt94423ceefefe3e31","ACL":{},"_in_progress":false,"author_description":"Tara Seals has 20+ years of experience as a journalist, analyst and editor in the cybersecurity, communications and technology space. Prior to Dark Reading, Tara was Editor in Chief at Threatpost, and prior to that,\u0026nbsp;the North American news lead for Infosecurity Magazine. She also\u0026nbsp;spent 13 years working for Informa (formerly Virgo Publishing), as executive editor and editor-in-chief at publications focused on both the service provider and the enterprise arenas. A Texas native, she holds a B.A. from Columbia University, lives in Western Massachusetts with her family and is on a never-ending quest for good Mexican food in the Northeast.\u003cbr\u003e","author_email":"tara.seals@informa.com","author_label":{"display_author_label":false,"author_label_text":"","author_label_background_color":"ffffff","author_label_text_color":"000000"},"author_name":"Tara Seals","author_page_tagline":"News and Analysis","author_role":"Managing Editor, News, Dark Reading","created_at":"2022-04-28T14:10:53.091Z","created_by":"blt13546d7f135b3d6e","hidden_email":false,"image_alt_text":"Tara Seals Headshot 2022","member_since":null,"portrait":{"_version":1,"is_dir":false,"uid":"bltea67136f81f32eca","ACL":{},"content_type":"image/jpeg","created_at":"2022-04-28T14:03:32.184Z","created_by":"blt13546d7f135b3d6e","file_size":"12544","filename":"Tara-Seals-Headshot2.jpg","parent_uid":null,"tags":[],"title":"Tara-Seals-Headshot2.jpg","updated_at":"2022-04-28T14:03:32.184Z","updated_by":"blt13546d7f135b3d6e","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2022-04-28T14:20:04.633Z","user":"blt13546d7f135b3d6e"},"url":"https://eu-images.contentstack.com/v3/assets/blt66983808af36a8ef/bltea67136f81f32eca/626a9eb4726e3315b16b3c64/Tara-Seals-Headshot2.jpg"},"seo":{"meta_title":"Tara Seals Dark Reading News","meta_description":"Cybersecurity news articles from Tara Seals at Dark Reading.","meta_keywords":"","canonical_url":""},"social_links":{"twitter_link":{"title":"","href":"https://twitter.com/wirelesswench"},"linkedin_link":{"title":"","href":""}},"specialisms":[],"tags":[],"title":"Tara Seals","updated_at":"2022-05-17T19:08:20.876Z","updated_by":"blt36bec842c46f38f6","url":"/author/tara-seals","_content_type_uid":"dr_author","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2022-05-17T19:08:24.663Z","user":"blt36bec842c46f38f6"}}],"body":"\u003cp\u003eAustralia's Qantas Airways is warning pilots about ongoing signal interference on VHF communications channels from \"stations purporting to represent the Chinese military,\" on commercial flights over the western Pacific Ocean and South China Sea.\u003c/p\u003e\u003cp\u003eThe Australian flagship airline also \u003ca href=\"https://www.theregister.com/2023/03/20/vessels_claiming_to_be_chinese/\" target=\"_blank\"\u003ewarned that some flights are experiencing jamming of their GPS\u003c/a\u003e systems, causing denial of service (DoS),\u0026nbsp;in incidents \"suspected to originate from warships operating off the northwest shelf of Australia.\"\u003c/p\u003e\u003cp\u003eTo boot, this is not the only China-related activity in the world of aviation in the region; on March 2, the International Federation of Air Line Pilots' Associations (IFALPA) noted that military warships located in the South China Sea, Philippine Sea, and the Eastern Indian Ocean were placing VHF calls to some passenger flights and military aircraft.\u003c/p\u003e\u003cp\u003e\"In some cases, the flights were provided vectors to avoid the airspace over the warship,\" \u003ca href=\"https://www.ifalpa.org/media/3893/23sab03-communication-interference-by-military-warships-in-the-pacific-region.pdf\" target=\"_blank\"\u003eaccording to the alert\u003c/a\u003e. \"We have reason to believe there may be interferences to GNSS and RADALT as well.\"\u003c/p\u003e\u003cp\u003eGNSS, short for global navigation satellite system, can be used interchangeably with GPS; RADALT stands for \"radar altimeter,\" and refers to the instrumentation that pilots use to gauge how far above the ground an airplane is flying.\u003c/p\u003e\u003ch2 class=\"regular-text\"\u003eCalculating the Physical Safety Dangers\u003c/h2\u003e\u003cp\u003eThough the news seems alarming, Qantas is telling flight crews to carry on with their designated flight plan should they see the unusual activity but to report the interference to the controlling air traffic control (ATC) authority. Meanwhile, a spokesperson told Aviation International News that \u003ca href=\"https://www.ainonline.com/aviation-news/air-transport/2023-03-20/gps-jamming-qantas-jets-spotlights-long-standing-issues\" target=\"_blank\"\u003eQantas does not consider the activity to be a physical safety threat\u003c/a\u003e.\u003c/p\u003e\u003cp\u003eKen Munro, a co-founder at Pen Test Partners and a specialist in operational technology (OT) cybersecurity for aviation, says that while the incidents on their face \"shouldn’t be of immediate concern,\" that's not to say the activity couldn't become dangerous in the right situation.\u003c/p\u003e\u003cp\u003e\"GPS is only one of a number of methods for pilots to determine their position, though it is generally the most relied upon,\" he explains. \"Inertial reference and radio navigation aids can be used to cross-check position. Indeed, these were the primary methods used prior to the advent of GPS.\"\u003c/p\u003e\u003cp\u003eHe adds, \"GPS and RADALT jamming are less of a concern when in the cruise at high altitude. However, errors in position or altitude when on approach are another matter, though much harder to intentionally create when near an airport.\"\u003c/p\u003e\u003cp\u003eMunro notes that jamming can also be concerning if it's part of a chain of attack or coincides with other alert-worthy activity that might be going on.\u003c/p\u003e\u003cp\u003e\"Incidents in the airplane often start with cascade of issues, often with a simple problem starting a chain of events that leads to a more significant problem,\" he says.\u003c/p\u003e\u003ch2 class=\"regular-text\"\u003eMotivation: A New Cyber-Air Frontier?\u003c/h2\u003e\u003cp\u003eResearchers note that if the perpetrators are the Chinese military, the signal interference could have several motivations.\u003c/p\u003e\u003cp\u003e\"It's one thing for a warship to ask a commercial airliner to 'please go around us,' and something else entirely to directly interfere with their signals,\" says Mike Parkin, senior technical engineer at Vulcan Cyber. \"On many levels, this feels like an extension of the tactics we've seen from \u003ca href=\"https://www.darkreading.com/attacks-breaches/chinese-apt-group-mirrorface-interferes-japanese-elections\" target=\"_blank\"\u003ecybersecurity threats originating with Chinese state and state-sponsored groups\u003c/a\u003e. Though this presents more of a potential physical threat, and interfering with commercial air traffic is a much more blatant show of power than a typical cyberattack.\"\u003c/p\u003e\u003cp\u003eNetRise CEO Tom Pace, a firmware security expert specializing in aviation, cautions that the jamming might be unintentional and that no one should jump to conclusions. \"It is impossible to state the intention of the Chinese military or even if these actions are purposeful,\" he says. \"This could simply be commercial airlines flying through a region in which the Chinese military is operating, or it could be a more active engagement where the Chinese military is seeing what they can get away with.\"\u003c/p\u003e\u003cp\u003eMike Hamilton, CISO of Critical Insight, suspects that the activity was triggered by geopolitical events.\u003c/p\u003e\u003cp\u003e\"This is yet another example of how geopolitical tensions are showing up as cyber events that are directed at infrastructure,\" he says. \"I note that the Biden administration just announced a nuclear submarine deal with Britain and Australia, and this is likely the Chinese government expressing its feelings about that deal.\"\u003c/p\u003e\u003ch2 class=\"regular-text\"\u003eBetter Aviation Security Must Take Flight\u003c/h2\u003e\u003cp\u003eHamilton notes that the activity points to the need for better OT security in the aviation space.\u003c/p\u003e\u003cp\u003e\"The constellation of GPS satellites has been \u003ca href=\"https://www.darkreading.com/iot/unpatched-gps-tracker-security-bugs-disruption\" target=\"_blank\"\u003eknown to be vulnerable\u003c/a\u003e for some time because of our dependence for navigation and time synchronization,\" he says. \"This act should be a wake-up call for the administration to take swift action to deploy compensating security controls around GPS before this act becomes commonplace. Longer term, GPS signal integrity controls must be developed and deployed.\"\u003c/p\u003e\u003cp\u003eNetRises' Pace explains that commercial airliners don't have sophisticated anti-jamming technologies like military aircraft, and while planes can be flown manually if need be, a better failsafe for DoS events\u0026nbsp;might be putting resources into identifying weaknesses in communications systems and instrumentation.\u003c/p\u003e\u003cp\u003e\"The top airline safety concern/challenge regarding the \u003ca href=\"https://www.darkreading.com/vulnerabilities-threats/boeing-s-def-con-debut-a-sign-of-the-times\" target=\"_blank\"\u003ecybersecurity of that OT environment\u003c/a\u003e is that there is a significant lack of visibility which translates to an inability to identify risk in these environments,\" he says.\u003c/p\u003e","byline":"","created_at":"2023-03-22T18:58:43.740Z","created_by":"blt13546d7f135b3d6e","featured_image":{"_version":1,"is_dir":false,"uid":"blte5322f6f56b11228","ACL":{},"content_type":"image/jpeg","created_at":"2023-03-22T18:57:51.724Z","created_by":"blt13546d7f135b3d6e","file_size":"794791","filename":"qantas_airplane-Stonemeadow_Photography-Alamy.jpg","parent_uid":null,"tags":[],"title":"qantas_airplane-Stonemeadow_Photography-Alamy.jpg","updated_at":"2023-03-22T18:57:51.724Z","updated_by":"blt13546d7f135b3d6e","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2023-03-22T19:58:04.250Z","user":"blt603b94c5f23c042e"},"url":"https://eu-images.contentstack.com/v3/assets/blt66983808af36a8ef/blte5322f6f56b11228/641b4faffa84c110cf4c617f/qantas_airplane-Stonemeadow_Photography-Alamy.jpg"},"featured_image_caption":"","featured_image_credit":"Source: Stonemeadow Photography via Alamy Stock Photo","image_alt_text":"A Qantas 737 jet taking off in Sydney, Australia.","keywords":[],"old_url":"","published_date":"2023-03-22T19:20:34.000Z","seo":{"meta_title":"","meta_description":"","meta_keywords":"","canonical_url":""},"sponsored_content_settings":{"is_sponsor_article":false,"sponsor_name":""},"summary":"Attackers claiming to be part of the Chinese navy are making calls to commercial Qantas pilots midair, while GPS, comms systems, and altimeter instruments are all experiencing denial of service.","tags":[],"term_selector":{"historyOfPrimaryTerm":["ics-ot"],"primaryTerm":"ics-ot","primaryTermInRealText":"ICS/OT Security","primaryCategoryBelonged":"ics-ot","actualUrl":"/ics-ot/chinese-warships-suspected-signal-jamming-passenger-jets","secondaryTerm":["analytics","attacks-breaches","endpoint","operations","vulnerabilities-threats","advanced-threats"]},"title":"Chinese Warships Suspected of Signal-Jamming Passenger Jets","updated_at":"2023-03-22T19:48:09.136Z","updated_by":"blt603b94c5f23c042e","url":"/chinese-warships-suspected-signal-jamming-passenger-jets","_content_type_uid":"dr_article","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2023-03-22T19:58:04.280Z","user":"blt603b94c5f23c042e"}},{"_version":58,"locale":"en-us","uid":"bltaa90f286b870741a","ACL":{},"_in_progress":false,"article_label":[{"uid":"bltb75c0271fde42422","_content_type_uid":"dr_article_label"}],"author_page":[{"_version":2,"locale":"en-us","uid":"blt0d2f74f6aba99643","ACL":{},"_in_progress":false,"author_description":"","author_email":"Becky.Bracken@informa.com","author_label":{"display_author_label":false,"author_label_text":"","author_label_background_color":"ffffff","author_label_text_color":"000000"},"author_name":"Becky Bracken","author_page_tagline":"","author_role":"Editor, Dark Reading","created_at":"2022-05-04T12:31:55.878Z","created_by":"blt36bec842c46f38f6","hidden_email":true,"image_alt_text":"Photo of Becky Bracken, Editor, Dark Reading","member_since":null,"portrait":{"_version":1,"is_dir":false,"uid":"blt8e7bd143d726930b","ACL":{},"content_type":"image/jpeg","created_at":"2022-05-04T12:27:18.442Z","created_by":"blt36bec842c46f38f6","file_size":"89014","filename":"BeckyB.jpg","parent_uid":null,"tags":[],"title":"BeckyB.jpg","updated_at":"2022-05-04T12:27:18.442Z","updated_by":"blt36bec842c46f38f6","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2022-05-04T12:32:04.672Z","user":"blt36bec842c46f38f6"},"url":"https://eu-images.contentstack.com/v3/assets/blt66983808af36a8ef/blt8e7bd143d726930b/627271268681151716941064/BeckyB.jpg"},"seo":{"meta_title":"","meta_description":"","meta_keywords":"","canonical_url":""},"social_links":{"twitter_link":{"title":"","href":""},"linkedin_link":{"title":"","href":""}},"specialisms":[],"tags":[],"title":"Becky Bracken","updated_at":"2022-05-04T12:51:52.989Z","updated_by":"blt36bec842c46f38f6","url":"/author/becky-bracken","_content_type_uid":"dr_author","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2022-05-04T12:51:57.690Z","user":"blt36bec842c46f38f6"}}],"body":"\u003cp\u003eThe dizzying capacity for OpenAI to vacuum up vast amounts of data and spit out custom-tailored content has ushered in all sorts of worrying predictions about the technology's ability to overwhelm everything — including cybersecurity defenses.\u003c/p\u003e\u003cp\u003eIndeed, ChatGPT's latest iteration, \u003ca href=\"https://www.cnet.com/tech/computing/ai-gets-smarter-safer-more-visual-with-gpt-4-update-openai-says/\" target=\"_blank\"\u003eGPT-4\u003c/a\u003e, is smart enough to pass the bar exam, generate thousands of words of text, and write malicious code. And thanks to its stripped-down interface anyone can use, concerns that the OpenAI tools could turn any would-be petty thief into a technically savvy malicious coder in moments were, and still are, well-founded. \u003ca href=\"https://www.darkreading.com/attacks-breaches/attackers-are-already-exploiting-chatgpt-to-write-malicious-code\" target=\"_blank\"\u003eChatGPT-enabled cyberattacks\u003c/a\u003e started popping up just after its user-friendly interface premiered in November 2022.\u003c/p\u003e\u003cp\u003eOpenAI co-founder \u003ca href=\"https://www.dailymail.co.uk/sciencetech/article-11881693/ChatGPT-CEO-admits-scared-bot-used-large-scale-disinformation.html\" target=\"_blank\"\u003eGreg Brockman told a crowd gathered at SXSW this month\u003c/a\u003e that he is concerned about the technology's potential to do two specific things really well: spread disinformation and launch cyberattacks.\u003c/p\u003e\u003cp\u003e\"\u003cspan\u003eNow that they're getting better at writing computer code, [OpenAI] could be used for offensive cyberattacks,\" Brockman said.\u003c/span\u003e\u003c/p\u003e\u003cp\u003eNo word on what OpenAI intends to do to mitigate the chatbot's cybersecurity threat, however. For the time being, it appears to be up to the cybersecurity community to mount a defense.\u003c/p\u003e\u003cp\u003eThere are current safeguards put in place to keep users for using ChatGPT for unintended purposes, or for content deemed too violent or illegal, but users are quickly finding \u003ca href=\"https://www.darkreading.com/application-security/chatgpt-content-safeguards-busted-with-new-jailbreak-trick-\" target=\"_blank\"\u003ejailbreak workarounds\u003c/a\u003e for those content limitations.\u003c/p\u003e\u003cp\u003eThose threats warrant concern, but a growing chorus of experts, including a recent post by the UK's National Cyber Security Centre, are tempering concerns over the true dangers to enterprises with the rise of ChatGPT and large language models (LLMs).\u003c/p\u003e\u003ch2 class=\"regular-text\"\u003eChatGPT's Current Cyber Threat\u003c/h2\u003e\u003cp\u003eWork products of chatbots can save time taking care of less complex tasks, but when it comes to performing expert work like writing malicious code, OpenAI's ability to do that from scratch isn't really ready for prime time yet, the NCSC's blog post explained.\u003c/p\u003e\u003cp\u003e\"\u003cspan\u003eFor more complex tasks, it's currently easier for an expert to create the malware from scratch, rather than having to spend time correcting what the LLM has produced,\" the \u003ca href=\"https://www.ncsc.gov.uk/blog-post/chatgpt-and-large-language-models-whats-the-risk\" target=\"_blank\"\u003eChatGPT cyber-threat\u003c/a\u003e post said. \"\u003c/span\u003eHowever, an expert capable of creating highly capable malware is likely to be able to coax an LLM into writing capable malware.\"\u003cspan\u003e\u003c/span\u003e\u003c/p\u003e\u003cp\u003eThe problem with \u003ca href=\"https://www.darkreading.com/vulnerabilities-threats/chat-cybersecurity-ai-promises-a-lot-but-can-it-deliver-\" target=\"_blank\"\u003eChatGPT as a cyberattack tool\u003c/a\u003e on its own is that it lacks the ability to test whether the code it's creating actually works or not, says Nathan Hamiel, senior director of research with Kudelski Security.\u003c/p\u003e\u003cp\u003e\u003cspan style=\"color: rgb(33, 33, 33);\"\u003e\"I agree with the NCSC's assessment,\" Hamiel says. \"ChatGPT responds to every request with a high degree of confidence whether it's right or wrong, whether it's outputting functional or nonfunctional code.\"\u003c/span\u003e\u003c/p\u003e\u003cp\u003eMore r\u003cspan style=\"color: rgb(33, 33, 33);\"\u003eealistically, he says, cyberattackers could use ChatGPT the same way they\u003cstrong\u003e \u003c/strong\u003edo other tools,\u003cstrong\u003e \u003c/strong\u003elike pen testing.\u003c/span\u003e\u003cspan\u003e\u003c/span\u003e\u003c/p\u003e\u003ch2 class=\"regular-text\"\u003eChatGPT Threat \"Massively Overhyped\"\u003c/h2\u003e\u003cp\u003e\u003cspan style=\"color: rgb(33, 33, 33);\"\u003eThe harm to IT teams is that overblown cybersecurity risks being ascribed to \u003c/span\u003e\u003ca href=\"https://www.darkreading.com/omdia/chatgpt-artificial-intelligence-an-upcoming-cybersecurity-threat-\" target=\"_blank\"\u003e\u003cspan style=\"color: rgb(33, 33, 33);\"\u003eChatGPT and OpenAI\u003c/span\u003e\u003c/a\u003e\u003cspan style=\"color: rgb(33, 33, 33);\"\u003e are sucking already scarce resources away from more immediate threats, as Jeffrey Wells, partner at Sigma7, points out.\u003c/span\u003e\u003c/p\u003e\u003cp\u003e\u003cspan style=\"color: rgb(33, 33, 33);\"\u003e\"\u003c/span\u003eThe threats from ChatGPT are massively overhyped,\" Wells says. \"The technology is still in its infancy, and there is little to no reason why a threat actor would want to use ChatGPT to create malicious code when there is an abundance of existing malware or crime-as-a-service (CaaS) that can be used to exploit the list of known and growing vulnerabilities.\"\u003c/p\u003e\u003cp\u003eRather than worrying about ChatGPT, enterprise IT teams should focus their attention on cybersecurity fundamentals, risk management, and resource allocation strategies, Wells adds.\u003c/p\u003e\u003cp\u003eThe value of ChatGPT, as well as an array of other tools available to threat actors, come down to their ability to exploit human error, \u003cspan\u003esays Bugcrowd founder and CTO Casey Ellis. \u003c/span\u003eThe remedy is human problem-solving, he notes.\u003c/p\u003e\u003cp\u003e\"The entire reason our industry exists is because of human creativity, human failures, and human needs,\" Ellis says. \"Whenever automation 'solves' a swath of the cyber-defense problem, the attackers simply innovate past these defenses with newer techniques to serve their goals.\"\u003c/p\u003e\u003cp\u003eBut Patrick Harr, CEO of SlashNext, warns organizations not to underestimate the longer-term threat ChatGPT could pose. Security teams, meanwhile, should look to leverage similar LLMs in their defenses, he says.\u003c/p\u003e\u003cp\u003e\"Suggesting that ChatGPT is low risk is like putting your head in the sand and carrying on like it doesn’t exist,\" Harr says. \"ChatGTP is only the start of the generative AI revolution, and the industry needs to take it seriously and focus on developing AI technology to combat AI-borne threats.\"\u003cspan style=\"color: rgb(33, 33, 33);\"\u003e\u003c/span\u003e\u003c/p\u003e","byline":"","created_at":"2023-03-20T18:40:28.857Z","created_by":"blt83ecefcf0687561a","featured_image":{"_version":1,"is_dir":false,"uid":"blt4f6bcede4dcfb54b","ACL":{},"content_type":"image/jpeg","created_at":"2023-03-20T19:58:42.875Z","created_by":"blt83ecefcf0687561a","file_size":"1163001","filename":"chat_gpt_Skorzewiak_Alamy.jpg","parent_uid":null,"tags":[],"title":"chat_gpt_Skorzewiak_Alamy.jpg","updated_at":"2023-03-20T19:58:42.875Z","updated_by":"blt83ecefcf0687561a","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2023-03-20T22:00:34.558Z","user":"blt603b94c5f23c042e"},"url":"https://eu-images.contentstack.com/v3/assets/blt66983808af36a8ef/blt4f6bcede4dcfb54b/6418baf262868e1213b0ce10/chat_gpt_Skorzewiak_Alamy.jpg"},"featured_image_caption":"","featured_image_credit":"Source: Skorzewiak via Alamy","image_alt_text":"ChatGPT abstract image","keywords":[],"old_url":"","published_date":"2023-03-20T23:00:00.000Z","seo":{"meta_title":"","meta_description":"","meta_keywords":"","canonical_url":""},"sponsored_content_settings":{"is_sponsor_article":false,"sponsor_name":""},"summary":"UK cybersecurity authorities and researchers tamp down fears that ChatGPT will overwhelm current defenses, while the CEO of OpenAI worries about its use in cyberattacks.","tags":[],"term_selector":{"historyOfPrimaryTerm":["attacks-breaches"],"primaryTerm":"attacks-breaches","primaryTermInRealText":"Attacks/Breaches","primaryCategoryBelonged":"attacks-breaches","actualUrl":"/attacks-breaches/chatgpt-gut-check-openai-cybersecurity-threat-overhyped","secondaryTerm":["vulnerabilities-threats"]},"title":"ChatGPT Gut Check: Cybersecurity Threats Overhyped or Not?","updated_at":"2023-03-20T22:00:26.889Z","updated_by":"blt603b94c5f23c042e","url":"/chatgpt-gut-check-openai-cybersecurity-threat-overhyped","_content_type_uid":"dr_article","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2023-03-20T22:00:34.593Z","user":"blt603b94c5f23c042e"}}],"tags":["editors' choice"],"title":"Editors' Choice","updated_at":"2023-03-24T19:09:55.617Z","updated_by":"blt13546d7f135b3d6e","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2023-03-24T19:10:02.598Z","user":"blt13546d7f135b3d6e"}},"secondaryData":[],"newsletterSubscribe":{"message":"Keep up with the latest cybersecurity threats, newly-discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.","open_subscribe_link_on_new_tab":true,"subscribe_link":{"title":"Subscribe","href":"https://darkreading.tradepub.com/c/pubRD.mpl?secure=1\u0026sr=pp\u0026_t=pp:\u0026qf=w_defa3135\u0026ch=dr_eoa"}},"moreInsights":{"title":"More Insights","heading":"More Insights","system":{"uid":"blt5ee3e0ba340bf613","__typename":"EntrySystemField"},"smartboxConnection":{"edges":[{"node":{"title":"White Papers","ordinal":3,"hidden":false,"system":{"uid":"blt1192837947494c5f","__typename":"EntrySystemField"},"feed":{"title":"White Papers","href":"https://smartbox.techweb.com/smartbox/externalsmartbox?site_id=162801002\u0026taxonomy_ids=\u0026num_display=\u0026article_type=whitepaper\u0026output_type=xml","__typename":"Link"},"read_more_link":{"title":"More White Papers","href":"https://www.informationweek.com/whitepaper/Security","__typename":"Link"},"__typename":"DrSmartbox","articles":[{"title":["Enable and Protect Your Remote Workforce"],"link":["https://www.informationweek.com/whitepaper/security-management-and-analytics/risk-management-security/enable-and-protect-your-remote-workforce/423573?cid=smartbox_techweb_whitepaper_14.500005324\u0026_mc=smartbox_techweb_whitepaper_14.500005324"],"publishedSite":[""],"publishedSiteURL":[""]},{"title":["Cloud Journey Adoption Stage: Securing Hybrid and Multi-cloud Environments"],"link":["https://www.informationweek.com/whitepaper/cybersecurity/security/cloud-journey-adoption-stage-securing-hybrid-and-multi-cloud-environments/443422?cid=smartbox_techweb_whitepaper_14.500005311\u0026_mc=smartbox_techweb_whitepaper_14.500005311"],"publishedSite":[""],"publishedSiteURL":[""]},{"title":["Cloud Journey Migration Stage: Adaptive Cloud Security"],"link":["https://www.informationweek.com/whitepaper/cybersecurity/security/cloud-journey-migration-stage-adaptive-cloud-security/443421?cid=smartbox_techweb_whitepaper_14.500005310\u0026_mc=smartbox_techweb_whitepaper_14.500005310"],"publishedSite":[""],"publishedSiteURL":[""]},{"title":["Developer-Focused Security from Code to Cloud and Back to Code"],"link":["https://www.informationweek.com/whitepaper/cybersecurity/security/developer-focused-security-from-code-to-cloud-and-back-to-code/440613?cid=smartbox_techweb_whitepaper_14.500005298\u0026_mc=smartbox_techweb_whitepaper_14.500005298"],"publishedSite":[""],"publishedSiteURL":[""]},{"title":["Building the SOC of the Future"],"link":["https://www.informationweek.com/whitepaper/cybersecurity/security-monitoring/building-the-soc-of-the-future-/443083?cid=smartbox_techweb_whitepaper_14.500005292\u0026_mc=smartbox_techweb_whitepaper_14.500005292"],"publishedSite":[""],"publishedSiteURL":[""]}]},"__typename":"DrMoreInsightsSmartboxEdge"},{"node":{"title":"Webinars","ordinal":1,"hidden":false,"system":{"uid":"blt8f82585c522cc0f5","__typename":"EntrySystemField"},"feed":{"title":"Webinars","href":"https://smartbox.techweb.com/smartbox/externalsmartbox?site_id=162801002\u0026taxonomy_ids=\u0026num_display=5\u0026article_type=upcoming_webinars\u0026output_type=xml","__typename":"Link"},"read_more_link":{"title":"More Webinars","href":"https://www.darkreading.com/upcoming-webinars","__typename":"Link"},"__typename":"DrSmartbox","articles":[{"title":["Building Out the Best Response Playbook for Ransomware Attacks"],"link":["https://darkreading.tradepub.com/c/pubRD.mpl?secure=1\u0026sr=pp\u0026_t=pp:\u0026qf=w_palo190\u0026ch=sbx\u0026cid=smartbox_techweb_upcoming_webinars_8.500001271\u0026_mc=smartbox_techweb_upcoming_webinars_8.500001271"],"publishDate":["Feb 24, 2023"],"publishedSite":[""],"eventDate":["Mar 28, 2023"],"publishedSiteURL":[""],"description":["When ransomware locks up your business's critical data and essential gear, there is no time to panic. The organization needs answers fast: Is the infection going to spread to other endpoints? Will the attackers publicly dump the stolen information? How good are our backups? What does our insurance provider say? How well the organization weathers the attack will depend on how well the organization prepared the answers in advance. In this webinar, learn what processes and procedures should go into your ransomware response playbook, and learn about the tools and techniques that will help you bounce back from a ransomware infection.\r\nDuring this webinar you will:\r\n--Learn the basic building blocks of a ransomware response playbook.\r\n--Get real-world advice on managing critical communications during ransomware incident response.\r\n--Find out what experts have to say about the role of cyber insurance."]},{"title":["ChatGPT: Defending Your Business Against AI-Supercharged Ransomware"],"link":["https://darkreading.tradepub.com/c/pubRD.mpl?secure=1\u0026sr=pp\u0026_t=pp:\u0026qf=w_defa3936\u0026ch=sbx\u0026cid=smartbox_techweb_upcoming_webinars_8.500001275\u0026_mc=smartbox_techweb_upcoming_webinars_8.500001275"],"publishDate":["Mar 07, 2023"],"publishedSite":[""],"eventDate":["Mar 29, 2023"],"publishedSiteURL":[""],"description":["This webinar will dig into the ways criminals are projected to take advantage of ChatGPT and other AI tools to improve the reach and effectiveness of their ransomware attacks. The session will conclude with a review of a 12-step plan that businesses can use to improve their active defenses as well as their mitigation of and recovery from successful ransomware attacks - both conventional and AI-enabled."]},{"title":["Ten Emerging Vulnerabilities Every Enterprise Should Know"],"link":["https://darkreading.tradepub.com/c/pubRD.mpl?secure=1\u0026sr=pp\u0026_t=pp:\u0026qf=w_defa3791\u0026ch=sbx\u0026cid=smartbox_techweb_upcoming_webinars_8.500001265\u0026_mc=smartbox_techweb_upcoming_webinars_8.500001265"],"publishDate":["Feb 06, 2023"],"publishedSite":[""],"eventDate":["Mar 30, 2023"],"publishedSiteURL":[""],"description":["Every day, black hat attackers and white hat researchers are discovering new security vulnerabilities in widely-used systems and applications that might be exploited to compromise your data. Are you aware of the newest - and potentially most impactful - vulnerabilities that have been discovered/disclosed? In this webinar, top researchers and experts discuss some of the most dangerous emerging vulnerabilities, and what you can do to prevent them from being exploited in your organization."]},{"title":["How Applications Are Attacked: A Year in Application Security"],"link":["https://darkreading.tradepub.com/c/pubRD.mpl?secure=1\u0026sr=pp\u0026_t=pp:\u0026qf=w_clow15\u0026ch=sbx\u0026cid=smartbox_techweb_upcoming_webinars_8.500001276\u0026_mc=smartbox_techweb_upcoming_webinars_8.500001276"],"publishDate":["Mar 10, 2023"],"publishedSite":[""],"eventDate":["Apr 04, 2023"],"publishedSiteURL":[""],"description":["Cloudflare sees up to 61 million requests per second, meaning we have an unprecedented view into Internet trends like application attacks and API traffic, and automated bot activity. We have put that incredible visibility to use by profiling a year of attacks targeting the applications that run business.\r\n\r\nJoin Cloudflare Field CTO Trey Guinn and Product Marketing Director, Dan Gould, as they discusses key attacks that organizational security postures must account for in 2023"]},{"title":["Managing Identity in the Cloud"],"link":["https://darkreading.tradepub.com/c/pubRD.mpl?secure=1\u0026sr=pp\u0026_t=pp:\u0026qf=w_defa3923\u0026ch=sbx\u0026cid=smartbox_techweb_upcoming_webinars_8.500001274\u0026_mc=smartbox_techweb_upcoming_webinars_8.500001274"],"publishDate":["Mar 02, 2023"],"publishedSite":[""],"eventDate":["Apr 05, 2023"],"publishedSiteURL":[""],"description":["Shifting identity management and provisioning to the cloud helps streamline these operations. It also brings a new set of challenges, including integrating and managing user identities, privileges, and other attributes used in various on-premise and cloud systems, especially if your organization is operating in a hybrid model. In this webinar, experts will provide insights and recommendations for harnessing user and machine identities in the cloud and among hybrid environments to ensure more solid security identity for the enterprise."]}]},"__typename":"DrMoreInsightsSmartboxEdge"},{"node":{"title":"Reports","ordinal":1,"hidden":false,"system":{"uid":"blt5145c70334f61d02","__typename":"EntrySystemField"},"feed":{"title":"Reports","href":"https://smartbox.techweb.com/smartbox/externalsmartbox?site_id=162801002\u0026taxonomy_ids=\u0026num_display=5\u0026article_type=analytics\u0026output_type=xml","__typename":"Link"},"read_more_link":{"title":"More Reports","href":"/must-reads","__typename":"Link"},"__typename":"DrSmartbox","articles":[{"title":["The 10 Most Impactful Types of Vulnerabilities for Enterprises Today"],"link":["https://darkreading.tradepub.com/c/pubRD.mpl?secure=1\u0026sr=pp\u0026_t=pp:\u0026pc=w_defa3977\u0026ch=sbx\u0026cid=smartbox_techweb_analytics_7.300005981\u0026_mc=smartbox_techweb_analytics_7.300005981"],"publishedSite":[""],"publishedSiteURL":[""],"description":["The enterprise attack surface is constantly expanding. Enterprises have to think beyond zero day vulnerabilities. It's imperative security teams start looking at vulnerabilities in 5G, firmware, edge, and ICS/OT, among others.\r\n\r\nManaging system vulnerabilities is one of the old est - and most frustrating - security challenges that enterprise defenders face. Every software application and hardware device ships with intrinsic flaws - flaws that, if critical enough, attackers can exploit from anywhere in the world. It's crucial that defenders take stock of what areas of the tech stack have the most emerging, and critical, vulnerabilities they must manage. It's not just zero day vulnerabilities. Consider that CISA's Known Exploited Vulnerabilities (KEV) catalog lists vulnerabilitlies in widely used applications that are \"actively exploited,\" and most of them are flaws that were discovered several years ago and have been fixed. There are also emerging vulnerabilities in 5G networks, cloud infrastructure, Edge applications, and firmwares to consider. "]},{"title":["Shoring Up the Software Supply Chain Across Enterprise Applications"],"link":["https://darkreading.tradepub.com/c/pubRD.mpl?secure=1\u0026sr=pp\u0026_t=pp:\u0026pc=w_defa3940\u0026ch=sbx\u0026cid=smartbox_techweb_analytics_7.300005980\u0026_mc=smartbox_techweb_analytics_7.300005980"],"publishedSite":[""],"publishedSiteURL":[""],"description":["Supply chain security attacks are growing at an alarming pace, and things are going to keep getting worse until DevSecOps teams get on the same page. A little help from the feds could also be welcome\r\n\r\nModern-day software development depends heavily on third-party components, libraries, and frameworks. Many of these components have their own dependencies, and software owners and project developers may not even know all the different pieces of code that make up their application. With attackers increasingly targeting these software building blocks to compromise enterprise applications, managing and protecting the software supply chain is more important than ever. Software developers and owners have to have visibility in their application, identify the vulnerabilities, and address them in a timely manner.\r\n\r\nIn this report, experts discuss the ever-expanding software attack surface and how to secure the supply chain. "]},{"title":["The Promise and Reality of Cloud Security"],"link":["https://darkreading.tradepub.com/c/pubRD.mpl?secure=1\u0026sr=pp\u0026_t=pp:\u0026pc=w_darl08\u0026ch=sbx\u0026cid=smartbox_techweb_analytics_7.300005973\u0026_mc=smartbox_techweb_analytics_7.300005973"],"publishedSite":[""],"publishedSiteURL":[""],"description":["Cloud security has been part of the cybersecurity conversation for years but has been on the sidelines for most enterprises.\r\n\r\nThe shift to remote work during the COVID-19 pandemic and digital transformation projects have moved cloud infrastructure front-and-center as enterprises address the associated security risks. This report - a compilation of cutting-edge Black Hat research, in-depth Omdia analysis, and comprehensive Dark Reading reporting - explores how cloud security is rapidly evolving."]},{"title":["10 Hot Talks From Black Hat USA 2022"],"link":["https://darkreading.tradepub.com/c/pubRD.mpl?secure=1\u0026sr=pp\u0026_t=pp:\u0026pc=w_defa3521\u0026ch=sbx\u0026cid=smartbox_techweb_analytics_7.300005970\u0026_mc=smartbox_techweb_analytics_7.300005970"],"publishedSite":[""],"publishedSiteURL":[""],"description":["Black Hat USA brings together cutting-edge research, new security tools, and sophisticated defensive techniques over the course of two days.\r\n\r\nThere were some recurring themes across the sessions, and many of these topics are going to be important issues to watch in 2023. This report covers the following topics:\r\n\r\n--Identity and access management\r\n--Container security\r\n--Software supply chain security\r\n--Defensive techniques such as threat hunting\r\n--Workforce Challenges\r\n--Geopolitics\r\n--Role of AI and Machine Learning"]},{"title":["How Machine Learning, AI \u0026 Deep Learning Improve Cybersecurity"],"link":["https://www.informationweek.com/whitepaper/cybersecurity/cloud-security/how-machine-learning,-ai-and-deep-learning-improve-cybersecurity/442433?keycode=sbx\u0026cid=smartbox_techweb_analytics_7.300005958\u0026_mc=smartbox_techweb_analytics_7.300005958"],"publishedSite":[""],"publishedSiteURL":[""]}]},"__typename":"DrMoreInsightsSmartboxEdge"}],"__typename":"DrMoreInsightsSmartboxConnection"},"__typename":"DrMoreInsights","smartbox":[{"title":"White Papers","ordinal":3,"hidden":false,"system":{"uid":"blt1192837947494c5f","__typename":"EntrySystemField"},"feed":{"title":"White Papers","href":"https://smartbox.techweb.com/smartbox/externalsmartbox?site_id=162801002\u0026taxonomy_ids=\u0026num_display=\u0026article_type=whitepaper\u0026output_type=xml","__typename":"Link"},"read_more_link":{"title":"More White Papers","href":"https://www.informationweek.com/whitepaper/Security","__typename":"Link"},"__typename":"DrSmartbox","articles":[{"title":["Enable and Protect Your Remote Workforce"],"link":["https://www.informationweek.com/whitepaper/security-management-and-analytics/risk-management-security/enable-and-protect-your-remote-workforce/423573?cid=smartbox_techweb_whitepaper_14.500005324\u0026_mc=smartbox_techweb_whitepaper_14.500005324"],"publishedSite":[""],"publishedSiteURL":[""]},{"title":["Cloud Journey Adoption Stage: Securing Hybrid and Multi-cloud Environments"],"link":["https://www.informationweek.com/whitepaper/cybersecurity/security/cloud-journey-adoption-stage-securing-hybrid-and-multi-cloud-environments/443422?cid=smartbox_techweb_whitepaper_14.500005311\u0026_mc=smartbox_techweb_whitepaper_14.500005311"],"publishedSite":[""],"publishedSiteURL":[""]},{"title":["Cloud Journey Migration Stage: Adaptive Cloud Security"],"link":["https://www.informationweek.com/whitepaper/cybersecurity/security/cloud-journey-migration-stage-adaptive-cloud-security/443421?cid=smartbox_techweb_whitepaper_14.500005310\u0026_mc=smartbox_techweb_whitepaper_14.500005310"],"publishedSite":[""],"publishedSiteURL":[""]},{"title":["Developer-Focused Security from Code to Cloud and Back to Code"],"link":["https://www.informationweek.com/whitepaper/cybersecurity/security/developer-focused-security-from-code-to-cloud-and-back-to-code/440613?cid=smartbox_techweb_whitepaper_14.500005298\u0026_mc=smartbox_techweb_whitepaper_14.500005298"],"publishedSite":[""],"publishedSiteURL":[""]},{"title":["Building the SOC of the Future"],"link":["https://www.informationweek.com/whitepaper/cybersecurity/security-monitoring/building-the-soc-of-the-future-/443083?cid=smartbox_techweb_whitepaper_14.500005292\u0026_mc=smartbox_techweb_whitepaper_14.500005292"],"publishedSite":[""],"publishedSiteURL":[""]}]},{"title":"Webinars","ordinal":1,"hidden":false,"system":{"uid":"blt8f82585c522cc0f5","__typename":"EntrySystemField"},"feed":{"title":"Webinars","href":"https://smartbox.techweb.com/smartbox/externalsmartbox?site_id=162801002\u0026taxonomy_ids=\u0026num_display=5\u0026article_type=upcoming_webinars\u0026output_type=xml","__typename":"Link"},"read_more_link":{"title":"More Webinars","href":"https://www.darkreading.com/upcoming-webinars","__typename":"Link"},"__typename":"DrSmartbox","articles":[{"title":["Building Out the Best Response Playbook for Ransomware Attacks"],"link":["https://darkreading.tradepub.com/c/pubRD.mpl?secure=1\u0026sr=pp\u0026_t=pp:\u0026qf=w_palo190\u0026ch=sbx\u0026cid=smartbox_techweb_upcoming_webinars_8.500001271\u0026_mc=smartbox_techweb_upcoming_webinars_8.500001271"],"publishDate":["Feb 24, 2023"],"publishedSite":[""],"eventDate":["Mar 28, 2023"],"publishedSiteURL":[""],"description":["When ransomware locks up your business's critical data and essential gear, there is no time to panic. The organization needs answers fast: Is the infection going to spread to other endpoints? Will the attackers publicly dump the stolen information? How good are our backups? What does our insurance provider say? How well the organization weathers the attack will depend on how well the organization prepared the answers in advance. In this webinar, learn what processes and procedures should go into your ransomware response playbook, and learn about the tools and techniques that will help you bounce back from a ransomware infection.\r\nDuring this webinar you will:\r\n--Learn the basic building blocks of a ransomware response playbook.\r\n--Get real-world advice on managing critical communications during ransomware incident response.\r\n--Find out what experts have to say about the role of cyber insurance."]},{"title":["ChatGPT: Defending Your Business Against AI-Supercharged Ransomware"],"link":["https://darkreading.tradepub.com/c/pubRD.mpl?secure=1\u0026sr=pp\u0026_t=pp:\u0026qf=w_defa3936\u0026ch=sbx\u0026cid=smartbox_techweb_upcoming_webinars_8.500001275\u0026_mc=smartbox_techweb_upcoming_webinars_8.500001275"],"publishDate":["Mar 07, 2023"],"publishedSite":[""],"eventDate":["Mar 29, 2023"],"publishedSiteURL":[""],"description":["This webinar will dig into the ways criminals are projected to take advantage of ChatGPT and other AI tools to improve the reach and effectiveness of their ransomware attacks. The session will conclude with a review of a 12-step plan that businesses can use to improve their active defenses as well as their mitigation of and recovery from successful ransomware attacks - both conventional and AI-enabled."]},{"title":["Ten Emerging Vulnerabilities Every Enterprise Should Know"],"link":["https://darkreading.tradepub.com/c/pubRD.mpl?secure=1\u0026sr=pp\u0026_t=pp:\u0026qf=w_defa3791\u0026ch=sbx\u0026cid=smartbox_techweb_upcoming_webinars_8.500001265\u0026_mc=smartbox_techweb_upcoming_webinars_8.500001265"],"publishDate":["Feb 06, 2023"],"publishedSite":[""],"eventDate":["Mar 30, 2023"],"publishedSiteURL":[""],"description":["Every day, black hat attackers and white hat researchers are discovering new security vulnerabilities in widely-used systems and applications that might be exploited to compromise your data. Are you aware of the newest - and potentially most impactful - vulnerabilities that have been discovered/disclosed? In this webinar, top researchers and experts discuss some of the most dangerous emerging vulnerabilities, and what you can do to prevent them from being exploited in your organization."]},{"title":["How Applications Are Attacked: A Year in Application Security"],"link":["https://darkreading.tradepub.com/c/pubRD.mpl?secure=1\u0026sr=pp\u0026_t=pp:\u0026qf=w_clow15\u0026ch=sbx\u0026cid=smartbox_techweb_upcoming_webinars_8.500001276\u0026_mc=smartbox_techweb_upcoming_webinars_8.500001276"],"publishDate":["Mar 10, 2023"],"publishedSite":[""],"eventDate":["Apr 04, 2023"],"publishedSiteURL":[""],"description":["Cloudflare sees up to 61 million requests per second, meaning we have an unprecedented view into Internet trends like application attacks and API traffic, and automated bot activity. We have put that incredible visibility to use by profiling a year of attacks targeting the applications that run business.\r\n\r\nJoin Cloudflare Field CTO Trey Guinn and Product Marketing Director, Dan Gould, as they discusses key attacks that organizational security postures must account for in 2023"]},{"title":["Managing Identity in the Cloud"],"link":["https://darkreading.tradepub.com/c/pubRD.mpl?secure=1\u0026sr=pp\u0026_t=pp:\u0026qf=w_defa3923\u0026ch=sbx\u0026cid=smartbox_techweb_upcoming_webinars_8.500001274\u0026_mc=smartbox_techweb_upcoming_webinars_8.500001274"],"publishDate":["Mar 02, 2023"],"publishedSite":[""],"eventDate":["Apr 05, 2023"],"publishedSiteURL":[""],"description":["Shifting identity management and provisioning to the cloud helps streamline these operations. It also brings a new set of challenges, including integrating and managing user identities, privileges, and other attributes used in various on-premise and cloud systems, especially if your organization is operating in a hybrid model. In this webinar, experts will provide insights and recommendations for harnessing user and machine identities in the cloud and among hybrid environments to ensure more solid security identity for the enterprise."]}]},{"title":"Reports","ordinal":1,"hidden":false,"system":{"uid":"blt5145c70334f61d02","__typename":"EntrySystemField"},"feed":{"title":"Reports","href":"https://smartbox.techweb.com/smartbox/externalsmartbox?site_id=162801002\u0026taxonomy_ids=\u0026num_display=5\u0026article_type=analytics\u0026output_type=xml","__typename":"Link"},"read_more_link":{"title":"More Reports","href":"/must-reads","__typename":"Link"},"__typename":"DrSmartbox","articles":[{"title":["The 10 Most Impactful Types of Vulnerabilities for Enterprises Today"],"link":["https://darkreading.tradepub.com/c/pubRD.mpl?secure=1\u0026sr=pp\u0026_t=pp:\u0026pc=w_defa3977\u0026ch=sbx\u0026cid=smartbox_techweb_analytics_7.300005981\u0026_mc=smartbox_techweb_analytics_7.300005981"],"publishedSite":[""],"publishedSiteURL":[""],"description":["The enterprise attack surface is constantly expanding. Enterprises have to think beyond zero day vulnerabilities. It's imperative security teams start looking at vulnerabilities in 5G, firmware, edge, and ICS/OT, among others.\r\n\r\nManaging system vulnerabilities is one of the old est - and most frustrating - security challenges that enterprise defenders face. Every software application and hardware device ships with intrinsic flaws - flaws that, if critical enough, attackers can exploit from anywhere in the world. It's crucial that defenders take stock of what areas of the tech stack have the most emerging, and critical, vulnerabilities they must manage. It's not just zero day vulnerabilities. Consider that CISA's Known Exploited Vulnerabilities (KEV) catalog lists vulnerabilitlies in widely used applications that are \"actively exploited,\" and most of them are flaws that were discovered several years ago and have been fixed. There are also emerging vulnerabilities in 5G networks, cloud infrastructure, Edge applications, and firmwares to consider. "]},{"title":["Shoring Up the Software Supply Chain Across Enterprise Applications"],"link":["https://darkreading.tradepub.com/c/pubRD.mpl?secure=1\u0026sr=pp\u0026_t=pp:\u0026pc=w_defa3940\u0026ch=sbx\u0026cid=smartbox_techweb_analytics_7.300005980\u0026_mc=smartbox_techweb_analytics_7.300005980"],"publishedSite":[""],"publishedSiteURL":[""],"description":["Supply chain security attacks are growing at an alarming pace, and things are going to keep getting worse until DevSecOps teams get on the same page. A little help from the feds could also be welcome\r\n\r\nModern-day software development depends heavily on third-party components, libraries, and frameworks. Many of these components have their own dependencies, and software owners and project developers may not even know all the different pieces of code that make up their application. With attackers increasingly targeting these software building blocks to compromise enterprise applications, managing and protecting the software supply chain is more important than ever. Software developers and owners have to have visibility in their application, identify the vulnerabilities, and address them in a timely manner.\r\n\r\nIn this report, experts discuss the ever-expanding software attack surface and how to secure the supply chain. "]},{"title":["The Promise and Reality of Cloud Security"],"link":["https://darkreading.tradepub.com/c/pubRD.mpl?secure=1\u0026sr=pp\u0026_t=pp:\u0026pc=w_darl08\u0026ch=sbx\u0026cid=smartbox_techweb_analytics_7.300005973\u0026_mc=smartbox_techweb_analytics_7.300005973"],"publishedSite":[""],"publishedSiteURL":[""],"description":["Cloud security has been part of the cybersecurity conversation for years but has been on the sidelines for most enterprises.\r\n\r\nThe shift to remote work during the COVID-19 pandemic and digital transformation projects have moved cloud infrastructure front-and-center as enterprises address the associated security risks. This report - a compilation of cutting-edge Black Hat research, in-depth Omdia analysis, and comprehensive Dark Reading reporting - explores how cloud security is rapidly evolving."]},{"title":["10 Hot Talks From Black Hat USA 2022"],"link":["https://darkreading.tradepub.com/c/pubRD.mpl?secure=1\u0026sr=pp\u0026_t=pp:\u0026pc=w_defa3521\u0026ch=sbx\u0026cid=smartbox_techweb_analytics_7.300005970\u0026_mc=smartbox_techweb_analytics_7.300005970"],"publishedSite":[""],"publishedSiteURL":[""],"description":["Black Hat USA brings together cutting-edge research, new security tools, and sophisticated defensive techniques over the course of two days.\r\n\r\nThere were some recurring themes across the sessions, and many of these topics are going to be important issues to watch in 2023. This report covers the following topics:\r\n\r\n--Identity and access management\r\n--Container security\r\n--Software supply chain security\r\n--Defensive techniques such as threat hunting\r\n--Workforce Challenges\r\n--Geopolitics\r\n--Role of AI and Machine Learning"]},{"title":["How Machine Learning, AI \u0026 Deep Learning Improve Cybersecurity"],"link":["https://www.informationweek.com/whitepaper/cybersecurity/cloud-security/how-machine-learning,-ai-and-deep-learning-improve-cybersecurity/442433?keycode=sbx\u0026cid=smartbox_techweb_analytics_7.300005958\u0026_mc=smartbox_techweb_analytics_7.300005958"],"publishedSite":[""],"publishedSiteURL":[""]}]}]},"tagManagerArgs":{"dataLayer":{"pageTitle":"Google Chrome Polishes Its First Security Update","pageID":"bltb8b51aa64bdcf847","pageType":"article","pagePrimaryCategory":"risk","termSelector":{"primaryTerm":"risk","primaryTermInRealText":"Risk","primaryCategoryBelonged":"risk","actualUrl":"/risk/google-chrome-polishes-its-first-security-update"},"contentLabel":"Commentary","adUnit":"3834/darkreading.home/article/risk","canonicalUrl":"","canonicalPath":"","hostname":"","contentAuthor":"George V. Hulme","contentPubDate":"Sep 09, 2008","event":"pageLoad","pageIsSponsored":false,"pageSponsor":"","byline":"","keyword":[],"pageReadTime":"1"},"dataLayerName":"dataLayer"},"globalData":{"footer":{"_version":23,"locale":"en-us","uid":"blt2f72369f0f41c8be","ACL":{},"_in_progress":false,"copyright":{"text":"Informa PLC Informa UK Limited is a company registered in England and Wales with company number 1072954 whose registered office is 5 Howick Place, London, SW1P 1WG."},"created_at":"2021-05-29T07:25:34.562Z","created_by":"blt9a0fc67c46c47dd7","horizontal_navigation":{"link":[{"title":"Home","href":"https://tech.informa.com/"},{"title":"Cookies","href":"https://tech.informa.com/cookie-policy"},{"title":"Privacy","href":"https://tech.informa.com/privacy-policy"},{"title":"Terms","href":"https://tech.informa.com/terms-and-conditions"}]},"logo":{"image":{"_version":1,"is_dir":false,"uid":"blt3edeb23396a4b5dc","ACL":{},"content_type":"image/png","created_at":"2021-05-29T07:17:14.517Z","created_by":"blt9a0fc67c46c47dd7","file_size":"7774","filename":"Whitelogo_1.png","tags":[],"title":"Whitelogo_1.png","updated_at":"2021-05-29T07:17:14.517Z","updated_by":"blt9a0fc67c46c47dd7","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-05-29T07:17:15.797Z","user":"blt9a0fc67c46c47dd7"},"url":"https://eu-images.contentstack.com/v3/assets/blt66983808af36a8ef/blt3edeb23396a4b5dc/60b1ea7a9afdef577986633e/Whitelogo_1.png"},"image_alt_text":"Informatech Logo"},"nav_links":{"link":[{"title":"Home","href":"/"},{"title":"About","href":"/about"},{"title":"Contact","href":"/contact"},{"title":"Blog","href":"/blog"}]},"one_column_navigation":{"link":[{"title":"About Us","href":"https://www.darkreading.com/about-us"},{"title":"Advertise","href":"https://www.darkreading.com/advertise"},{"title":"Reprints","href":"https://info.wrightsmedia.com/informa-licensing-reprints-request"}],"title":"Working With Us"},"social_networks":{"social_network":[{"link":{"title":"Rss","href":"https://www.darkreading.com/rss.xml"},"_metadata":{"uid":"csc2779b70d6e03c3a"},"icon_class":"fas fa-rss","active":true},{"link":{"title":"Twitter","href":"https://twitter.com/DarkReading"},"_metadata":{"uid":"csd24262af0f251c9b"},"icon_class":"fab fa-twitter","active":true},{"link":{"title":"Linkedin","href":"https://www.linkedin.com/company/dark-reading/"},"_metadata":{"uid":"cse75c5c0ea8c72705"},"icon_class":"fab fa-linkedin-in","active":true},{"link":{"title":"Facebook","href":"https://www.facebook.com/darkreadingcom"},"_metadata":{"uid":"csdbb1b7d09b01bb09"},"icon_class":"fab fa-facebook-f","active":true},{"link":{"title":"YouTube","href":"https://www.youtube.com/@DarkReadingOfficialYT"},"icon_class":"youtube","active":true,"_metadata":{"uid":"cs88baa851caf5cee3"}},{"link":{"title":"Google News","href":"https://news.google.com/publications/CAAqBwgKMKmknwswtq63Aw?ceid=US:en\u0026oc=3"},"_metadata":{"uid":"cs8df94cf6003ddf3f"},"icon_class":"google","active":true}],"title":"Follow Dark Reading On Social"},"tags":[],"title":"Footer","two_columns_navigation":{"link":[{"title":"Interop","href":"https://www.interop.com/"},{"title":"InformationWeek","href":"https://www.informationweek.com/"},{"title":"Network Computing","href":"https://www.networkcomputing.com/"},{"title":"ITPro Today","href":"https://www.itprotoday.com/"},{"title":"Data Center Knowledge","href":"https://www.datacenterknowledge.com/"},{"title":"Black Hat","href":"https://www.blackhat.com/"},{"title":"Omdia","href":"http://www.omdia.com/"}],"title":"Discover More From Informa Tech"},"updated_at":"2023-02-28T08:04:59.750Z","updated_by":"blt5d243c8c38d0f240","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2023-03-06T08:40:41.100Z","user":"blt5d243c8c38d0f240"}},"siteSettings":{"_version":87,"locale":"en-us","uid":"blt03ce54293658c8bc","ACL":{},"_in_progress":false,"content_type_icons":[{"content_type":"Article","icon":{"uid":"blt27dca7fd9a7ec07d","created_by":"blt871c9fa65adba4f6","updated_by":"blt871c9fa65adba4f6","created_at":"2021-06-29T03:51:02.199Z","updated_at":"2021-06-29T03:51:02.199Z","content_type":"image/svg+xml","file_size":"3327","filename":"Article.svg","title":"Article.svg","ACL":{},"_version":1,"is_dir":false,"tags":[],"publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-06-29T03:51:31.680Z","user":"blt871c9fa65adba4f6"},"url":"https://eu-images.contentstack.com/v3/assets/blt66983808af36a8ef/blt27dca7fd9a7ec07d/60da98a6537dbc26a0e2a2d3/Article.svg"},"_metadata":{"uid":"cs6bc72e5d7fe8d645"}},{"content_type":"Slideshow","icon":{"_version":1,"is_dir":false,"uid":"bltc31af506fe1f1ef3","ACL":{},"content_type":"image/svg+xml","created_at":"2021-06-23T03:08:44.113Z","created_by":"blt986fc66e34c7b415","file_size":"3960","filename":"Vector.svg","tags":[],"title":"Vector.svg","updated_at":"2021-06-23T03:08:44.113Z","updated_by":"blt986fc66e34c7b415","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-07-15T11:44:06.452Z","user":"blt986fc66e34c7b415"},"url":"https://eu-images.contentstack.com/v3/assets/blt66983808af36a8ef/bltc31af506fe1f1ef3/60d2a5bcdd40a179d073b802/Vector.svg"},"_metadata":{"uid":"cs9b26d7221b48f0e9"}},{"content_type":"Video","icon":{"uid":"blt73d712bb4508bdd2","created_by":"bltb064b71641a544b9","updated_by":"bltb064b71641a544b9","created_at":"2021-07-06T07:22:25.803Z","updated_at":"2021-07-06T07:22:25.803Z","content_type":"image/svg+xml","file_size":"3593","filename":"Vector.svg","title":"Vector.svg","ACL":{},"_version":1,"is_dir":false,"tags":[],"publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-08-09T19:11:32.637Z","user":"blt9488f204761710b3"},"url":"https://eu-images.contentstack.com/v3/assets/blt66983808af36a8ef/blt73d712bb4508bdd2/60e404b17625b62c25ba2a74/Vector.svg"},"_metadata":{"uid":"csee3d099c523785a7"}}],"cookie_banner":"\u003cp data-children-count=\"0\"\u003eThis site uses cookies to provide you with the best user experience possible. By using \u003cstrong\u003eDark Reading\u003c/strong\u003e, you accept \u003ca href=\"https://tech.informa.com/cookie-policy\" target=\"_blank\"\u003eour use of cookies.\u003c/a\u003e\u003c/p\u003e","created_at":"2021-05-29T07:25:08.958Z","created_by":"blt9a0fc67c46c47dd7","homepage_seo_settings":{"meta_description":"Cyber security's comprehensive news site is now an online community for security professionals, outlining cyber threats and the technologies for defending against them.","meta_title":"Dark Reading | Security | Protect The Business"},"open_subscribe_link_on_new_tab":true,"placeholder_image":{"article":{"uid":"bltc1378ee892fc2b03","created_by":"blt986fc66e34c7b415","updated_by":"blt986fc66e34c7b415","created_at":"2021-10-22T09:00:01.060Z","updated_at":"2021-10-22T09:00:01.060Z","content_type":"image/jpeg","file_size":"19176","filename":"dr-logo.jpg","title":"dr-logo.jpg","ACL":{},"_version":1,"is_dir":false,"tags":[],"publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-10-22T09:00:16.437Z","user":"blt986fc66e34c7b415"},"url":"https://eu-images.contentstack.com/v3/assets/blt66983808af36a8ef/bltc1378ee892fc2b03/61727d918e52444950791daf/dr-logo.jpg"},"author":{"uid":"bltc1378ee892fc2b03","created_by":"blt986fc66e34c7b415","updated_by":"blt986fc66e34c7b415","created_at":"2021-10-22T09:00:01.060Z","updated_at":"2021-10-22T09:00:01.060Z","content_type":"image/jpeg","file_size":"19176","filename":"dr-logo.jpg","title":"dr-logo.jpg","ACL":{},"_version":1,"is_dir":false,"tags":[],"publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-10-22T09:00:16.437Z","user":"blt986fc66e34c7b415"},"url":"https://eu-images.contentstack.com/v3/assets/blt66983808af36a8ef/bltc1378ee892fc2b03/61727d918e52444950791daf/dr-logo.jpg"}},"site_wide_style":{"font":null,"module_style":{"heading_color":""},"navigation_style":{"color_1":"","color_2":"","gradient":true}},"social_networks":{"social_network":[{"link":{"title":"Rss","href":"https://www.darkreading.com/rss.xml"},"_metadata":{"uid":"cs1b60c654a4c98515"},"icon_class":"fas fa-rss","open_new_tab":true,"active":true},{"link":{"title":"Twitter","href":"https://twitter.com/DarkReading"},"_metadata":{"uid":"csb40560d5b45c67c0"},"icon_class":"fab fa-twitter","open_new_tab":true,"active":true},{"link":{"title":"Linkedin","href":"https://www.linkedin.com/company/dark-reading/"},"_metadata":{"uid":"csb7b068ffddb2508a"},"icon_class":"fab fa-linkedin-in","open_new_tab":true,"active":true},{"link":{"title":"Facebook","href":"https://www.facebook.com/darkreadingcom/"},"_metadata":{"uid":"cs1c83b83e0ac18d5d"},"icon_class":"fab fa-facebook-f","open_new_tab":true,"active":true},{"link":{"title":"YouTube","href":"https://www.youtube.com/@DarkReadingOfficialYT"},"icon_class":"youtube","open_new_tab":true,"active":true,"_metadata":{"uid":"csfc2e862117dd6c9a"}}],"title":"Follow DR:"},"subscribe_link":{"title":"Newsletter","href":"https://darkreading.tradepub.com/c/pubRD.mpl?secure=1\u0026sr=pp\u0026_t=pp:\u0026qf=w_defa3135\u0026ch=dr_header"},"switch_board":{"iris_recommendation":true},"tags":[],"title":"Dark Reading | Security | Protect The Business","updated_at":"2023-02-24T19:02:38.158Z","updated_by":"blt5d243c8c38d0f240","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2023-03-04T04:01:46.369Z","user":"blt7795f92568dc098d"}},"announcements":[[{"_version":1,"locale":"en-us","uid":"blt057be8454dc239ee","ACL":{},"_in_progress":false,"active":true,"content":"Emerging Cybersecurity Technologies: What You Need to Know - A Dark Reading March 23 Virtual Event | \u003cGET YOUR PASS\u003e","created_at":"2023-01-13T19:46:38.763Z","created_by":"blt86eeaee2e17f91dc","link":{"title":"Get Your Pass","href":"https://vts.informaengage.com/dark-reading-emerging-cybersecurity-technologies-what-you-need-to-know/?kcode=drsitebell"},"open_in_new_tab":true,"tags":["cybersecurity","dark reading"],"title":"3/23/23 DR VE","type_of_announcement":"Event","updated_at":"2023-01-13T19:46:38.763Z","updated_by":"blt86eeaee2e17f91dc","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2023-01-13T19:46:43.400Z","user":"blt86eeaee2e17f91dc"}},{"_version":2,"locale":"en-us","uid":"blte6050299fda43495","ACL":{},"_in_progress":false,"active":true,"content":"Black Hat USA 2022 Attendee Report | Supply Chain \u0026 Cloud Security Risks Are Top of Mind | \u003cREAD IT NOW\u003e","created_at":"2022-08-04T15:41:11.629Z","created_by":"blt86eeaee2e17f91dc","link":{"title":"\u003c\u003cGet The Report\u003e\u003e","href":"https://messages.blackhat.com/2022-attendee-report-2022?kcode=drsite"},"open_in_new_tab":true,"tags":["black hat"],"title":"BHUSA 2022 Report","type_of_announcement":"Report","updated_at":"2022-08-04T15:43:27.796Z","updated_by":"blt86eeaee2e17f91dc","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2022-08-04T15:43:32.876Z","user":"blt86eeaee2e17f91dc"}}]],"navigation":{"site_information":{"left_column":{"description":"Dark Reading is part of the Informa Tech Division of Informa PLC","links":[{"link":{"href":"https://informa.com/About-Us/","title":"About Us","__typename":"Link"},"open_new_tab":true,"__typename":"DrNavigationV2SiteInformationLeftColumnLinks"},{"link":{"href":"https://informa.com/","title":"Informa PLC","__typename":"Link"},"open_new_tab":true,"__typename":"DrNavigationV2SiteInformationLeftColumnLinks"},{"link":{"href":"https://informa.com/Investors/","title":"Investor Relations","__typename":"Link"},"open_new_tab":true,"__typename":"DrNavigationV2SiteInformationLeftColumnLinks"},{"link":{"href":"https://informa.com/Talent/","title":"Talent","__typename":"Link"},"open_new_tab":true,"__typename":"DrNavigationV2SiteInformationLeftColumnLinks"}],"__typename":"DrNavigationV2SiteInformationLeftColumn"},"right_column":{"description":"This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.","__typename":"DrNavigationV2SiteInformationRightColumn"},"__typename":"DrNavigationV2SiteInformation"},"search":{"link":{"href":"https://www.darkreading.com/about-us/d/d-id/1113937","title":"Search","__typename":"Link"},"open_new_tab":true,"__typename":"DrNavigationV2Search"},"reports":{"enabled":true,"navigation_link_title":"Resources","links":[{"link":"https://www.darkreading.com/resources","link_text":"Dark Reading Library \u003e","open_in_new_tab":true,"__typename":"DrNavigationV2ReportsLinks"},{"link":"/upcoming-webinars","link_text":"Webinars \u003e","open_in_new_tab":true,"__typename":"DrNavigationV2ReportsLinks"},{"link":"/must-reads","link_text":"Reports \u003e","open_in_new_tab":true,"__typename":"DrNavigationV2ReportsLinks"},{"link":"/latest/slideshow","link_text":"Slideshows \u003e","open_in_new_tab":true,"__typename":"DrNavigationV2ReportsLinks"},{"link":"https://www.informationweek.com/whitepaper/Security","link_text":"White Papers \u003e","open_in_new_tab":true,"__typename":"DrNavigationV2ReportsLinks"},{"link":"https://www.darkreading.com/microsoft","link_text":"Partner Perspectives: Microsoft","open_in_new_tab":true,"__typename":"DrNavigationV2ReportsLinks"},{"link":"https://www.informationweek.com/whitepaper","link_text":"Tech Library \u003e","open_in_new_tab":true,"__typename":"DrNavigationV2ReportsLinks"}],"__typename":"DrNavigationV2Reports"},"logo":{"logo_title":"DR Logo New","image_alt_text":"Dark Reading Logo","site_mobile_logoConnection":{"edges":[{"node":{"url":"https://eu-images.contentstack.com/v3/assets/blt66983808af36a8ef/blt69e42f380169c938/620378c0a75f1e5f7d5bce80/DR_Logo_-_White.svg","__typename":"SysAsset"},"__typename":"SysAssetEdge"}],"__typename":"SysAssetConnection"},"logo_imageConnection":{"edges":[{"node":{"url":"https://eu-images.contentstack.com/v3/assets/blt66983808af36a8ef/blt4ff4a7f9bc8e31f7/619f4fb0a0cb8076d613e3ba/Dark_Reading_Logo.svg","__typename":"SysAsset"},"__typename":"SysAssetEdge"}],"__typename":"SysAssetConnection"},"__typename":"DrNavigationV2Logo"},"feature_links":[{"enabled":true,"display_as_link":true,"navigation_link_title":"Featured","navigation_links":[{"navigation_link_title":"The Edge","text_link":"/edge","navigation_link_background_color":"#9f110d","__typename":"DrNavigationV2FeatureLinksNavigationLinks"},{"navigation_link_title":"DR Tech","text_link":"/dr-tech","navigation_link_background_color":"#9f110d","__typename":"DrNavigationV2FeatureLinksNavigationLinks"}],"links":[{"brand_logoConnection":{"edges":[{"node":{"url":"https://eu-images.contentstack.com/v3/assets/blt66983808af36a8ef/blt0242302270d4c8c5/616053aef0756e7ad17a2766/TheEdge-Logo-K.png","__typename":"SysAsset"},"__typename":"SysAssetEdge"}],"__typename":"SysAssetConnection"},"image_alt_text":"The Edge Logo","link_text":"The Edge","link":"/edge","open_in_new_tab":true,"__typename":"DrNavigationV2FeatureLinksLinks"},{"brand_logoConnection":{"edges":[{"node":{"url":"https://eu-images.contentstack.com/v3/assets/blt66983808af36a8ef/blt13a7bb63bbc84ea1/615573a9486c9a5b53694fea/DR_Technology_Logo_Black.png","__typename":"SysAsset"},"__typename":"SysAssetEdge"}],"__typename":"SysAssetConnection"},"image_alt_text":"DR Technology Logo","link_text":"DR Technology","link":"/dr-tech","open_in_new_tab":true,"__typename":"DrNavigationV2FeatureLinksLinks"}],"__typename":"DrNavigationV2FeatureLinks"}],"events":{"enabled":true,"navigation_link_title":"Events","smartbox":[{"smartbox_entryConnection":{"edges":[{"node":{"type":"Live Events","title":"Events","system":{"uid":"blt8b6a33909c49602f","__typename":"EntrySystemField"},"__typename":"DrSmartbox"},"__typename":"DrNavigationV2EventsSmartboxSmartboxEntryEdge"}],"__typename":"DrNavigationV2EventsSmartboxSmartboxEntryConnection"},"__typename":"DrNavigationV2EventsSmartbox"},{"smartbox_entryConnection":{"edges":[{"node":{"type":"Webinars","title":"Webinars","system":{"uid":"blt8f82585c522cc0f5","__typename":"EntrySystemField"},"__typename":"DrSmartbox"},"__typename":"DrNavigationV2EventsSmartboxSmartboxEntryEdge"}],"__typename":"DrNavigationV2EventsSmartboxSmartboxEntryConnection"},"__typename":"DrNavigationV2EventsSmartbox"}],"__typename":"DrNavigationV2Events"},"topics":{"enabled":true,"navigation_link_title":"Sections","casual_links":{"topic_linkConnection":{"edges":[{"node":{"title":"Breaches","expanded_title":"Attacks / Breaches","url":"/attacks-breaches","system":{"uid":"blt785557489e965a0e","__typename":"EntrySystemField"},"__typename":"DrTopicPrimary"},"__typename":"DrNavigationV2TopicsCasualLinksTopicLinkEdge"},{"node":{"title":"Cloud","expanded_title":"Cloud","url":"/cloud","system":{"uid":"blte0b20eea18da92ac","__typename":"EntrySystemField"},"__typename":"DrTopicPrimary"},"__typename":"DrNavigationV2TopicsCasualLinksTopicLinkEdge"},{"node":{"title":"ICS/OT","expanded_title":"ICS/OT","url":"https://www.darkreading.com/ics-ot","system":{"uid":"blt1e229aa9a0bad170","__typename":"EntrySystemField"},"__typename":"DrTopicPrimary"},"__typename":"DrNavigationV2TopicsCasualLinksTopicLinkEdge"},{"node":{"title":"Remote Workforce","expanded_title":"Remote Workforce","url":"/remote-workforce","system":{"uid":"blt66841a34e87f9b7d","__typename":"EntrySystemField"},"__typename":"DrTopicPrimary"},"__typename":"DrNavigationV2TopicsCasualLinksTopicLinkEdge"},{"node":{"title":"Perimeter","expanded_title":"Perimeter","url":"/perimeter","system":{"uid":"bltdad7410202520cf3","__typename":"EntrySystemField"},"__typename":"DrTopicPrimary"},"__typename":"DrNavigationV2TopicsCasualLinksTopicLinkEdge"},{"node":{"title":"Analytics","expanded_title":"Analytics","url":"/analytics","system":{"uid":"blt77fe1b1ed6a4cb2b","__typename":"EntrySystemField"},"__typename":"DrTopicPrimary"},"__typename":"DrNavigationV2TopicsCasualLinksTopicLinkEdge"},{"node":{"title":"App Sec","expanded_title":"App Sec","url":"/application-security","system":{"uid":"blt5becbd3781fc8e16","__typename":"EntrySystemField"},"__typename":"DrTopicPrimary"},"__typename":"DrNavigationV2TopicsCasualLinksTopicLinkEdge"},{"node":{"title":"Risk","expanded_title":"Risk","url":"/risk","system":{"uid":"bltb4fa098465367813","__typename":"EntrySystemField"},"__typename":"DrTopicPrimary"},"__typename":"DrNavigationV2TopicsCasualLinksTopicLinkEdge"},{"node":{"title":"Threat Intel","expanded_title":"Threat Intelligence","url":"/threat-intelligence","system":{"uid":"blta3feccd65c5cd514","__typename":"EntrySystemField"},"__typename":"DrTopicPrimary"},"__typename":"DrNavigationV2TopicsCasualLinksTopicLinkEdge"},{"node":{"title":"Endpoint","expanded_title":"Endpoint","url":"/endpoint","system":{"uid":"bltca5b5d25e0e89c28","__typename":"EntrySystemField"},"__typename":"DrTopicPrimary"},"__typename":"DrNavigationV2TopicsCasualLinksTopicLinkEdge"},{"node":{"title":"Vulns / Threats","expanded_title":"Vulnerabilities / Threats","url":"/vulnerabilities-threats","system":{"uid":"blt7299bec9b19d3040","__typename":"EntrySystemField"},"__typename":"DrTopicPrimary"},"__typename":"DrNavigationV2TopicsCasualLinksTopicLinkEdge"},{"node":{"title":"Ops","expanded_title":"Operations","url":"/operations","system":{"uid":"blt30a5d434863af8a0","__typename":"EntrySystemField"},"__typename":"DrTopicPrimary"},"__typename":"DrNavigationV2TopicsCasualLinksTopicLinkEdge"},{"node":{"title":"Physical","expanded_title":"Physical Security","url":"/physical-security","system":{"uid":"blt67964a3f25e5e5bc","__typename":"EntrySystemField"},"__typename":"DrTopicPrimary"},"__typename":"DrNavigationV2TopicsCasualLinksTopicLinkEdge"},{"node":{"title":"IoT","expanded_title":"IoT","url":"/iot","system":{"uid":"blt015364f303d8cd5c","__typename":"EntrySystemField"},"__typename":"DrTopicPrimary"},"__typename":"DrNavigationV2TopicsCasualLinksTopicLinkEdge"}],"__typename":"DrNavigationV2TopicsCasualLinksTopicLinkConnection"},"__typename":"DrNavigationV2TopicsCasualLinks"},"__typename":"DrNavigationV2Topics"},"connect":{"brand_engagement_section":{"brand_engagement_moduleConnection":{"edges":[{"node":{"system":{"uid":"bltfd75a966494c9e3c","__typename":"EntrySystemField"},"section_1":{"cta_button_link":"https://www.darkreading.com/upcoming-webinars","cta_button_text":"SCHEDULE","link_target":"Open in new window","section_description":"\u003cp\u003eLearn about New Cybersecurity Threats, Vulnerabilities and Technology Trends.\u003c/p\u003e","section_eyebrow":"Register for a","section_title":"Dark Reading Webinar","__typename":"DrBrandEngagementSection1"},"section_2":{"cta_button_link":"https://darkreading.tradepub.com/c/pubRD.mpl?secure=1\u0026sr=pp\u0026_t=pp:\u0026qf=w_defa3135\u0026ch=dr_header","cta_button_text":"SUBSCRIBE","link_target":"Open in new window","section_description":"\u003cp\u003eGet daily or weekly Dark Reading top stories delivered straight into your inbox.\u003c/p\u003e","section_eyebrow":"Subscribe to the","section_title":"Dark Reading Newsletter","__typename":"DrBrandEngagementSection2"},"section_3":{"cta_button_link":"","cta_button_text":"","link_target":"Open in new window","section_description":"\u003cp\u003eFollow us @darkreading to stay up-to-date with the latest news \u0026 insider information about events \u0026 more.\u003c/p\u003e","section_eyebrow":"Follow us","section_title":"@DarkReading","__typename":"DrBrandEngagementSection3"},"include_social_links_in_section_3":"Yes","__typename":"DrBrandEngagement"},"__typename":"DrNavigationV2ConnectBrandEngagementSectionBrandEngagementModuleEdge"}],"__typename":"DrNavigationV2ConnectBrandEngagementSectionBrandEngagementModuleConnection"},"__typename":"DrNavigationV2ConnectBrandEngagementSection"},"enabled":false,"navigation_link_title":"Connect","our_network_section":{"enabled":true,"label":"Our Network:","links":[{"brand_logoConnection":{"edges":[{"node":{"url":"https://eu-images.contentstack.com/v3/assets/blt66983808af36a8ef/blt365fc6c2647d15e5/60b1e96052bd6156414f3422/bh_logo_black_1.png","__typename":"SysAsset"},"__typename":"SysAssetEdge"}],"__typename":"SysAssetConnection"},"link":"https://www.blackhat.com/","link_text":"Black Hat","open_new_tab":false,"image_alt_text":"","__typename":"DrNavigationV2ConnectOurNetworkSectionLinks"},{"brand_logoConnection":{"edges":[{"node":{"url":"https://eu-images.contentstack.com/v3/assets/blt66983808af36a8ef/blt5e638427fb7992eb/60b9b81d1ffed8575f140e47/OMDIA_LOGO_BLACK_2_with_extra_height.png","__typename":"SysAsset"},"__typename":"SysAssetEdge"}],"__typename":"SysAssetConnection"},"link":"https://omdia.tech.informa.com/topic-pages/cybersecurity?promo=OmdiaDR","link_text":"OMDIA","open_new_tab":true,"image_alt_text":"","__typename":"DrNavigationV2ConnectOurNetworkSectionLinks"},{"brand_logoConnection":{"edges":[{"node":{"url":"https://eu-images.contentstack.com/v3/assets/blt66983808af36a8ef/blt621a6404bafa0c4d/60b1e8c8d64f195504537b9a/IWK-Color_heigh_adjusted.png","__typename":"SysAsset"},"__typename":"SysAssetEdge"}],"__typename":"SysAssetConnection"},"link":"https://www.informationweek.com","link_text":"InformationWeek","open_new_tab":true,"image_alt_text":"","__typename":"DrNavigationV2ConnectOurNetworkSectionLinks"}],"__typename":"DrNavigationV2ConnectOurNetworkSection"},"links":[{"link":"/about-us","link_text":"About us","open_in_new_tab":true,"__typename":"DrNavigationV2ConnectLinks"},{"link":"https://www.darkreading.com/advertise","link_text":"Advertise with us","open_in_new_tab":true,"__typename":"DrNavigationV2ConnectLinks"},{"link":"https://info.wrightsmedia.com/informa-licensing-reprints-request","link_text":"Reprints","open_in_new_tab":true,"__typename":"DrNavigationV2ConnectLinks"}],"__typename":"DrNavigationV2Connect"},"__typename":"DrNavigationV2"},"navPromotedTopics":{"topics":{"promoted_links":{"topic_linkConnection":{"edges":[{"node":{"title":"Black Hat news","url":"https://www.darkreading.com/black-hat","system":{"uid":"blt58877ad235079f24","__typename":"EntrySystemField"},"__typename":"DrTopicOthers"},"__typename":"DrNavigationV2TopicsPromotedLinksTopicLinkEdge"},{"node":{"title":"Omdia Research","url":"https://www.darkreading.com/omdia","system":{"uid":"blt7757a7dced09e4cc","__typename":"EntrySystemField"},"__typename":"DrTopicOthers"},"__typename":"DrNavigationV2TopicsPromotedLinksTopicLinkEdge"},{"node":{"title":"Security Now","url":"https://www.darkreading.com/security-now.asp","system":{"uid":"blt62de504b94f13f55","__typename":"EntrySystemField"},"__typename":"DrTopicOthers"},"__typename":"DrNavigationV2TopicsPromotedLinksTopicLinkEdge"}],"__typename":"DrNavigationV2TopicsPromotedLinksTopicLinkConnection"},"__typename":"DrNavigationV2TopicsPromotedLinks"},"__typename":"DrNavigationV2Topics"},"__typename":"DrNavigationV2"},"navFeaturedTopics":{"topics":{"featured_sections":{"enabled":true,"topic_linkConnection":{"edges":[{"node":{"title":"The Edge","name":"The Edge","url":"/edge","system":{"uid":"blt1ac900de55b45e3b","__typename":"EntrySystemField"},"__typename":"DrTopicSecondary"},"__typename":"DrNavigationV2TopicsFeaturedSectionsTopicLinkEdge"},{"node":{"title":"Dr Tech","name":"Dark Reading Technology","url":"/dr-tech","system":{"uid":"blta9155e90e5f8030b","__typename":"EntrySystemField"},"__typename":"DrTopicSecondary"},"__typename":"DrNavigationV2TopicsFeaturedSectionsTopicLinkEdge"}],"__typename":"DrNavigationV2TopicsFeaturedSectionsTopicLinkConnection"},"__typename":"DrNavigationV2TopicsFeaturedSections"},"__typename":"DrNavigationV2Topics"},"__typename":"DrNavigationV2"},"topicsWithChild":[{"_version":1,"locale":"en-us","uid":"blt1e229aa9a0bad170","ACL":{},"_in_progress":false,"created_at":"2022-10-25T14:53:40.743Z","created_by":"blt86eeaee2e17f91dc","expanded_title":"ICS/OT","seo":{"meta_title":"ICS/OT","meta_description":"ICS, OT, Industrial Control Systems, Operational technology","meta_keywords":"ICS, OT, Industrial Control Systems, Operational technology","canonical_url":""},"tags":["ics","ot","industrial control systems","operational technology"],"title":"ICS/OT","topics_secondary":[],"updated_at":"2022-10-25T14:53:40.743Z","updated_by":"blt86eeaee2e17f91dc","url":"https://www.darkreading.com/ics-ot","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2022-10-25T14:54:24.903Z","user":"blt86eeaee2e17f91dc"},"_owner":{"uid":"blt86eeaee2e17f91dc","created_at":"2021-06-01T09:36:27.887Z","updated_at":"2023-02-27T17:09:52.127Z","email":"someone@example.com","username":"-","first_name":"-","last_name":"-","company":"-","org_uid":[],"shared_org_uid":["blt5948195ac13977b0"],"mobile_number":"0000000000","country_code":"00","tfa_status":"-","authy_id":null,"active":true,"metadata":{},"profile_type":"business","failed_attempts":0,"settings":{"preferences":{},"global":[]},"last_login_at":"1900-01-01T00:00:00.000Z"}},{"_version":2,"locale":"en-us","uid":"blt66841a34e87f9b7d","ACL":{},"_in_progress":false,"created_at":"2022-03-03T19:13:38.062Z","created_by":"bltfcb3d125bf8c49ee","expanded_title":"Remote Workforce","seo":{"meta_title":"Remote Workforce","meta_description":"Remote Workforce","meta_keywords":"","canonical_url":""},"tags":[],"title":"Remote Workforce","topics_secondary":[],"updated_at":"2022-10-25T14:49:09.260Z","updated_by":"blt86eeaee2e17f91dc","url":"/remote-workforce","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2022-10-25T14:49:13.542Z","user":"blt86eeaee2e17f91dc"},"_owner":{"uid":"bltfcb3d125bf8c49ee","created_at":"2021-05-21T10:05:50.071Z","updated_at":"2023-02-01T11:16:58.861Z","email":"someone@example.com","username":"-","first_name":"-","last_name":"-","company":"-","org_uid":[],"shared_org_uid":["blt5948195ac13977b0"],"mobile_number":"0000000000","country_code":"00","tfa_status":"-","authy_id":null,"active":true,"metadata":{},"profile_type":"business","failed_attempts":0,"settings":{"preferences":{},"global":[]},"last_login_at":"1900-01-01T00:00:00.000Z"}},{"title":"Omdia","url":"/omdia","expanded_title":"Omdia","topics_secondary":[],"seo":{"meta_title":"","meta_description":"","meta_keywords":"","canonical_url":""},"tags":[],"locale":"en-us","uid":"bltcbdbf86a0551d8bb","created_by":"blta3dd47a38c602549","updated_by":"blta3dd47a38c602549","created_at":"2021-09-29T10:56:10.231Z","updated_at":"2021-09-29T10:56:10.231Z","ACL":{},"_version":1,"_in_progress":false,"publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-09-29T10:57:01.003Z","user":"blta3dd47a38c602549"},"_owner":{"uid":"blta3dd47a38c602549","created_at":"2021-05-21T10:05:50.070Z","updated_at":"2023-03-06T11:25:30.882Z","email":"someone@example.com","username":"-","first_name":"-","last_name":"-","company":"-","org_uid":[],"shared_org_uid":["blt5948195ac13977b0"],"mobile_number":"0000000000","country_code":"00","tfa_status":"-","authy_id":null,"active":true,"metadata":{},"profile_type":"business","failed_attempts":0,"settings":{"preferences":{},"global":[]},"last_login_at":"1900-01-01T00:00:00.000Z"}},{"title":"Vulns / Threats","url":"/vulnerabilities-threats","topics_secondary":[{"_version":6,"locale":"en-us","uid":"bltc0595d7ad0a824f9","ACL":{},"_in_progress":false,"created_at":"2021-05-29T07:24:46.154Z","created_by":"blt9a0fc67c46c47dd7","name":"Advanced Threats","seo":{"meta_title":"Advanced Threats","meta_description":"Advanced Threats","meta_keywords":"","canonical_url":""},"tags":[],"title":"[Vulnerabilities / Threats] Advanced Threats","updated_at":"2021-07-20T13:53:43.004Z","updated_by":"blta3dd47a38c602549","url":"/advanced-threats","_content_type_uid":"dr_topic_secondary","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-07-20T13:53:45.886Z","user":"blta3dd47a38c602549"}},{"_version":2,"locale":"en-us","uid":"blt48c537ccb149ce69","ACL":{},"_in_progress":false,"created_at":"2021-05-29T07:24:36.088Z","created_by":"blt9a0fc67c46c47dd7","name":"Insider Threats","seo":{"meta_title":"Insider Threats","meta_description":"Insider Threats","meta_keywords":"","canonical_url":""},"tags":[],"title":"[Vulnerabilities / Threats] Insider Threats","updated_at":"2021-07-20T13:50:08.841Z","updated_by":"blta3dd47a38c602549","url":"/insider-threats","_content_type_uid":"dr_topic_secondary","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-07-20T13:52:54.877Z","user":"blta3dd47a38c602549"}},{"_version":2,"locale":"en-us","uid":"blt841a890c83604b92","ACL":{},"_in_progress":false,"created_at":"2021-05-29T07:24:37.215Z","created_by":"blt9a0fc67c46c47dd7","name":"Vulnerability Management","seo":{"meta_title":"Vulnerability Management","meta_description":"Vulnerability Management","meta_keywords":"","canonical_url":""},"tags":[],"title":"[Vulnerabilities / Threats] Vulnerability Management","updated_at":"2021-07-20T13:49:38.788Z","updated_by":"blta3dd47a38c602549","url":"/vulnerability-management","_content_type_uid":"dr_topic_secondary","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-07-20T13:49:41.689Z","user":"blta3dd47a38c602549"}}],"seo":{"meta_title":"Vulnerabilities / Threats","meta_description":"Vulnerabilities / Threats","meta_keywords":"","canonical_url":""},"tags":[],"locale":"en-us","ACL":{},"expanded_title":"Vulnerabilities / Threats","uid":"blt7299bec9b19d3040","created_by":"blt9a0fc67c46c47dd7","updated_by":"blt441f3cf9519ce96f","created_at":"2021-05-29T07:24:52.174Z","updated_at":"2021-09-28T06:59:11.602Z","_version":8,"_in_progress":false,"publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-09-28T10:32:40.219Z","user":"blta3dd47a38c602549"}},{"_version":6,"locale":"en-us","uid":"blt30a5d434863af8a0","ACL":{},"_in_progress":false,"created_at":"2021-05-29T07:24:50.221Z","created_by":"blt9a0fc67c46c47dd7","expanded_title":"Operations","seo":{"meta_title":"Operations","meta_description":"Operations","meta_keywords":"","canonical_url":""},"tags":[],"title":"Ops","topics_secondary":[{"_version":2,"locale":"en-us","uid":"bltc66bc15dc564597f","ACL":{},"_in_progress":false,"created_at":"2021-05-29T07:24:45.214Z","created_by":"blt9a0fc67c46c47dd7","name":"Identity \u0026 Access Management","seo":{"meta_title":"Identity \u0026 Access Management","meta_description":"Identity \u0026 Access Management","meta_keywords":"","canonical_url":""},"tags":[],"title":"[Operations] Identity \u0026 Access Management","updated_at":"2021-07-20T13:49:05.230Z","updated_by":"blta3dd47a38c602549","url":"/identity-and-access-management","_content_type_uid":"dr_topic_secondary","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-07-20T13:49:08.073Z","user":"blta3dd47a38c602549"}},{"_version":11,"locale":"en-us","uid":"blte7df9c155852d974","ACL":{},"_in_progress":false,"created_at":"2021-05-29T07:24:47.100Z","created_by":"blt9a0fc67c46c47dd7","name":"Careers \u0026 People","seo":{"meta_title":"Careers \u0026 People","meta_description":"Careers \u0026 People","meta_keywords":"","canonical_url":""},"tags":[],"title":"[Operations] Careers \u0026 People","updated_at":"2021-07-20T12:08:28.689Z","updated_by":"blt986fc66e34c7b415","url":"/careers-and-people","_content_type_uid":"dr_topic_secondary","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-07-20T12:09:57.002Z","user":"blt986fc66e34c7b415"}}],"updated_at":"2021-07-21T15:26:00.567Z","updated_by":"blta3dd47a38c602549","url":"/operations","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-07-21T15:26:04.309Z","user":"blta3dd47a38c602549"}},{"_version":4,"locale":"en-us","uid":"blt015364f303d8cd5c","ACL":{},"_in_progress":false,"created_at":"2021-05-29T07:24:48.288Z","created_by":"blt9a0fc67c46c47dd7","expanded_title":"IoT","seo":{"meta_title":"IoT","meta_description":"IoT","meta_keywords":"","canonical_url":""},"tags":[],"title":"IoT","topics_secondary":[],"updated_at":"2021-07-20T13:40:09.253Z","updated_by":"blta3dd47a38c602549","url":"/iot","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-07-20T13:40:13.450Z","user":"blta3dd47a38c602549"}},{"_version":3,"locale":"en-us","uid":"blt5becbd3781fc8e16","ACL":{},"_in_progress":false,"created_at":"2021-05-29T07:24:49.312Z","created_by":"blt9a0fc67c46c47dd7","expanded_title":"App Sec","seo":{"meta_title":"Application Security","meta_description":"Application Security","meta_keywords":"","canonical_url":""},"tags":[],"title":"App Sec","topics_secondary":[{"_version":2,"locale":"en-us","uid":"blte50120ff0518141d","ACL":{},"_in_progress":false,"created_at":"2021-05-29T07:24:40.692Z","created_by":"blt9a0fc67c46c47dd7","name":"Database Security","seo":{"meta_title":"Database Security","meta_description":"Database Security","meta_keywords":"","canonical_url":""},"tags":[],"title":"[App Sec] Database Security","updated_at":"2021-07-20T13:57:36.610Z","updated_by":"blta3dd47a38c602549","url":"/database-security","_content_type_uid":"dr_topic_secondary","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-07-20T13:57:39.438Z","user":"blta3dd47a38c602549"}}],"updated_at":"2021-07-20T13:39:48.018Z","updated_by":"blta3dd47a38c602549","url":"/application-security","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-07-20T13:39:51.054Z","user":"blta3dd47a38c602549"}},{"_version":3,"locale":"en-us","uid":"blt8edc1edf78525eb9","ACL":{},"_in_progress":false,"created_at":"2021-05-29T07:25:00.989Z","created_by":"blt9a0fc67c46c47dd7","expanded_title":"The Edge","seo":{"meta_title":"The Edge","meta_description":"The Edge","meta_keywords":"","canonical_url":""},"tags":[],"title":"The Edge","topics_secondary":[],"updated_at":"2021-07-20T13:38:58.206Z","updated_by":"blta3dd47a38c602549","url":"/edge","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-07-20T13:39:02.803Z","user":"blta3dd47a38c602549"}},{"_version":3,"locale":"en-us","uid":"blt77fe1b1ed6a4cb2b","ACL":{},"_in_progress":false,"created_at":"2021-05-29T07:24:59.745Z","created_by":"blt9a0fc67c46c47dd7","expanded_title":"Analytics","seo":{"meta_title":"Security Analytics","meta_description":"Security Analytics","meta_keywords":"","canonical_url":""},"tags":[],"title":"Analytics","topics_secondary":[{"_version":2,"locale":"en-us","uid":"blta62ac100505a8b0e","ACL":{},"_in_progress":false,"created_at":"2021-05-29T07:24:38.443Z","created_by":"blt9a0fc67c46c47dd7","name":"Security Monitoring","seo":{"meta_title":"Security Monitoring","meta_description":"Security Monitoring","meta_keywords":"","canonical_url":""},"tags":[],"title":"[Analytics] Security Monitoring","updated_at":"2021-07-20T13:56:52.288Z","updated_by":"blta3dd47a38c602549","url":"/security-monitoring","_content_type_uid":"dr_topic_secondary","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-07-20T13:56:55.022Z","user":"blta3dd47a38c602549"}}],"updated_at":"2021-07-20T13:33:48.424Z","updated_by":"blta3dd47a38c602549","url":"/analytics","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-07-20T13:33:51.625Z","user":"blta3dd47a38c602549"}},{"_version":3,"locale":"en-us","uid":"bltdad7410202520cf3","ACL":{},"_in_progress":false,"created_at":"2021-05-29T07:24:56.377Z","created_by":"blt9a0fc67c46c47dd7","expanded_title":"Perimeter","seo":{"meta_title":"Network Perimeter Security","meta_description":"Network Perimeter Security","meta_keywords":"","canonical_url":""},"tags":[],"title":"Perimeter","topics_secondary":[],"updated_at":"2021-07-20T13:33:14.890Z","updated_by":"blta3dd47a38c602549","url":"/perimeter","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-07-20T13:33:17.858Z","user":"blta3dd47a38c602549"}},{"_version":3,"locale":"en-us","uid":"bltb4fa098465367813","ACL":{},"_in_progress":false,"created_at":"2021-05-29T07:24:54.324Z","created_by":"blt9a0fc67c46c47dd7","expanded_title":"Risk","seo":{"meta_title":"Risk Management","meta_description":"Risk Management","meta_keywords":"","canonical_url":""},"tags":[],"title":"Risk","topics_secondary":[{"_version":2,"locale":"en-us","uid":"bltb0f5be1fbdfcb41a","ACL":{},"_in_progress":false,"created_at":"2021-05-29T07:24:44.181Z","created_by":"blt9a0fc67c46c47dd7","name":"Compliance","seo":{"meta_title":"Compliance","meta_description":"Compliance","meta_keywords":"","canonical_url":""},"tags":[],"title":"[Risk] Compliance","updated_at":"2021-07-20T13:55:48.317Z","updated_by":"blta3dd47a38c602549","url":"/compliance","_content_type_uid":"dr_topic_secondary","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-07-20T13:55:51.514Z","user":"blta3dd47a38c602549"}}],"updated_at":"2021-07-20T13:32:29.960Z","updated_by":"blta3dd47a38c602549","url":"/risk","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-07-20T13:32:33.370Z","user":"blta3dd47a38c602549"}},{"_version":3,"locale":"en-us","uid":"bltca5b5d25e0e89c28","ACL":{},"_in_progress":false,"created_at":"2021-05-29T07:24:55.338Z","created_by":"blt9a0fc67c46c47dd7","expanded_title":"Endpoint","seo":{"meta_title":"Endpoint Security","meta_description":"Endpoint Security","meta_keywords":"","canonical_url":""},"tags":[],"title":"Endpoint","topics_secondary":[{"_version":2,"locale":"en-us","uid":"bltfe4d91925f7db0e1","ACL":{},"_in_progress":false,"created_at":"2021-05-29T07:24:39.671Z","created_by":"blt9a0fc67c46c47dd7","name":"Authentication","seo":{"meta_title":"Authentication","meta_description":"Authentication","meta_keywords":"","canonical_url":""},"tags":[],"title":"[Endpoint] Authentication","updated_at":"2021-07-20T13:54:16.648Z","updated_by":"blta3dd47a38c602549","url":"/authentication","_content_type_uid":"dr_topic_secondary","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-07-20T13:54:19.302Z","user":"blta3dd47a38c602549"}},{"_version":2,"locale":"en-us","uid":"bltbce9bffab0b743c9","ACL":{},"_in_progress":false,"created_at":"2021-05-29T07:24:42.861Z","created_by":"blt9a0fc67c46c47dd7","name":"Mobile Security","seo":{"meta_title":"Mobile Security","meta_description":"Mobile Security","meta_keywords":"","canonical_url":""},"tags":[],"title":"[Endpoint] Mobile","updated_at":"2021-07-20T13:55:17.618Z","updated_by":"blta3dd47a38c602549","url":"/mobile","_content_type_uid":"dr_topic_secondary","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-07-20T13:55:20.835Z","user":"blta3dd47a38c602549"}},{"_version":2,"locale":"en-us","uid":"bltd4b54e4cff686e47","ACL":{},"_in_progress":false,"created_at":"2021-05-29T07:24:41.940Z","created_by":"blt9a0fc67c46c47dd7","name":"Privacy","seo":{"meta_title":"Privacy","meta_description":"Privacy","meta_keywords":"","canonical_url":""},"tags":[],"title":"[Endpoint] Privacy","updated_at":"2021-07-20T13:54:46.246Z","updated_by":"blta3dd47a38c602549","url":"/privacy","_content_type_uid":"dr_topic_secondary","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-07-20T13:54:49.414Z","user":"blta3dd47a38c602549"}}],"updated_at":"2021-07-20T13:32:03.273Z","updated_by":"blta3dd47a38c602549","url":"/endpoint","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-07-20T13:32:06.396Z","user":"blta3dd47a38c602549"}},{"_version":3,"locale":"en-us","uid":"blt67964a3f25e5e5bc","ACL":{},"_in_progress":false,"created_at":"2021-05-29T07:24:53.196Z","created_by":"blt9a0fc67c46c47dd7","expanded_title":"Physical Security","seo":{"meta_title":"Physical Security","meta_description":"Physical Security","meta_keywords":"","canonical_url":""},"tags":[],"title":"Physical","topics_secondary":[],"updated_at":"2021-07-20T13:30:47.664Z","updated_by":"blta3dd47a38c602549","url":"/physical-security","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-07-20T13:30:50.834Z","user":"blta3dd47a38c602549"}},{"_version":6,"locale":"en-us","uid":"blta3feccd65c5cd514","ACL":{},"_in_progress":false,"created_at":"2021-05-29T07:24:51.151Z","created_by":"blt9a0fc67c46c47dd7","expanded_title":"Threat Intelligence","seo":{"meta_title":"Threat Intel","meta_description":"Threat Intel","meta_keywords":"","canonical_url":""},"tags":[],"title":"Threat Intel","topics_secondary":[],"updated_at":"2021-07-20T13:26:19.607Z","updated_by":"blta3dd47a38c602549","url":"/threat-intelligence","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-07-20T13:26:22.770Z","user":"blta3dd47a38c602549"}},{"_version":3,"locale":"en-us","uid":"blte0b20eea18da92ac","ACL":{},"_in_progress":false,"created_at":"2021-05-29T07:24:58.718Z","created_by":"blt9a0fc67c46c47dd7","expanded_title":"Cloud","seo":{"meta_title":"Cloud","meta_description":"Cloud","meta_keywords":"","canonical_url":""},"tags":[],"title":"Cloud","topics_secondary":[],"updated_at":"2021-07-20T12:12:46.726Z","updated_by":"blta3dd47a38c602549","url":"/cloud","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-07-20T12:12:50.045Z","user":"blta3dd47a38c602549"}},{"_version":3,"locale":"en-us","uid":"blt785557489e965a0e","ACL":{},"_in_progress":false,"created_at":"2021-05-29T07:24:57.504Z","created_by":"blt9a0fc67c46c47dd7","expanded_title":"Attacks / Breaches","seo":{"meta_title":"Attacks / Breaches","meta_description":"Attacks / Breaches","meta_keywords":"","canonical_url":""},"tags":[],"title":"Breaches","topics_secondary":[],"updated_at":"2021-07-20T12:11:31.270Z","updated_by":"blta3dd47a38c602549","url":"/attacks-breaches","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-07-20T12:11:34.853Z","user":"blta3dd47a38c602549"}},{"title":"Topic primary 1","url":"/topic-primary-1","expanded_title":"topic primary 1","topics_secondary":[{"_version":11,"locale":"en-us","uid":"blte7df9c155852d974","ACL":{},"_in_progress":false,"created_at":"2021-05-29T07:24:47.100Z","created_by":"blt9a0fc67c46c47dd7","name":"Careers \u0026 People","seo":{"meta_title":"Careers \u0026 People","meta_description":"Careers \u0026 People","meta_keywords":"","canonical_url":""},"tags":[],"title":"[Operations] Careers \u0026 People","updated_at":"2021-07-20T12:08:28.689Z","updated_by":"blt986fc66e34c7b415","url":"/careers-and-people","_content_type_uid":"dr_topic_secondary","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-07-20T12:09:57.002Z","user":"blt986fc66e34c7b415"}},{"_version":6,"locale":"en-us","uid":"bltc0595d7ad0a824f9","ACL":{},"_in_progress":false,"created_at":"2021-05-29T07:24:46.154Z","created_by":"blt9a0fc67c46c47dd7","name":"Advanced Threats","seo":{"meta_title":"Advanced Threats","meta_description":"Advanced Threats","meta_keywords":"","canonical_url":""},"tags":[],"title":"[Vulnerabilities / Threats] Advanced Threats","updated_at":"2021-07-20T13:53:43.004Z","updated_by":"blta3dd47a38c602549","url":"/advanced-threats","_content_type_uid":"dr_topic_secondary","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-07-20T13:53:45.886Z","user":"blta3dd47a38c602549"}},{"_version":2,"locale":"en-us","uid":"bltc66bc15dc564597f","ACL":{},"_in_progress":false,"created_at":"2021-05-29T07:24:45.214Z","created_by":"blt9a0fc67c46c47dd7","name":"Identity \u0026 Access Management","seo":{"meta_title":"Identity \u0026 Access Management","meta_description":"Identity \u0026 Access Management","meta_keywords":"","canonical_url":""},"tags":[],"title":"[Operations] Identity \u0026 Access Management","updated_at":"2021-07-20T13:49:05.230Z","updated_by":"blta3dd47a38c602549","url":"/identity-and-access-management","_content_type_uid":"dr_topic_secondary","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-07-20T13:49:08.073Z","user":"blta3dd47a38c602549"}},{"_version":2,"locale":"en-us","uid":"bltb0f5be1fbdfcb41a","ACL":{},"_in_progress":false,"created_at":"2021-05-29T07:24:44.181Z","created_by":"blt9a0fc67c46c47dd7","name":"Compliance","seo":{"meta_title":"Compliance","meta_description":"Compliance","meta_keywords":"","canonical_url":""},"tags":[],"title":"[Risk] Compliance","updated_at":"2021-07-20T13:55:48.317Z","updated_by":"blta3dd47a38c602549","url":"/compliance","_content_type_uid":"dr_topic_secondary","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-07-20T13:55:51.514Z","user":"blta3dd47a38c602549"}},{"_version":2,"locale":"en-us","uid":"bltbce9bffab0b743c9","ACL":{},"_in_progress":false,"created_at":"2021-05-29T07:24:42.861Z","created_by":"blt9a0fc67c46c47dd7","name":"Mobile Security","seo":{"meta_title":"Mobile Security","meta_description":"Mobile Security","meta_keywords":"","canonical_url":""},"tags":[],"title":"[Endpoint] Mobile","updated_at":"2021-07-20T13:55:17.618Z","updated_by":"blta3dd47a38c602549","url":"/mobile","_content_type_uid":"dr_topic_secondary","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-07-20T13:55:20.835Z","user":"blta3dd47a38c602549"}},{"_version":2,"locale":"en-us","uid":"bltd4b54e4cff686e47","ACL":{},"_in_progress":false,"created_at":"2021-05-29T07:24:41.940Z","created_by":"blt9a0fc67c46c47dd7","name":"Privacy","seo":{"meta_title":"Privacy","meta_description":"Privacy","meta_keywords":"","canonical_url":""},"tags":[],"title":"[Endpoint] Privacy","updated_at":"2021-07-20T13:54:46.246Z","updated_by":"blta3dd47a38c602549","url":"/privacy","_content_type_uid":"dr_topic_secondary","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-07-20T13:54:49.414Z","user":"blta3dd47a38c602549"}}],"seo":{"meta_title":"","meta_description":"","meta_keywords":"","canonical_url":""},"tags":[],"locale":"en-us","uid":"blt7b335051f439bf6d","created_by":"blt986fc66e34c7b415","updated_by":"blt986fc66e34c7b415","created_at":"2021-07-13T09:41:01.186Z","updated_at":"2021-07-13T09:41:01.186Z","ACL":{},"_version":1,"_in_progress":false,"publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-07-14T09:45:45.870Z","user":"blt8d6e4671551ab970"},"_owner":{"uid":"blt986fc66e34c7b415","created_at":"2021-05-21T10:05:50.073Z","updated_at":"2022-11-09T11:41:04.371Z","email":"someone@example.com","username":"-","first_name":"-","last_name":"-","company":"-","org_uid":[],"shared_org_uid":[],"mobile_number":"0000000000","country_code":"00","tfa_status":"-","authy_id":null,"active":false,"metadata":{},"profile_type":"developer","failed_attempts":0,"settings":{"preferences":{},"global":[]},"last_login_at":"1900-01-01T00:00:00.000Z"}}],"categories":[{"_version":13,"locale":"en-us","uid":"bltb87a73f19a122791","ACL":{},"_in_progress":false,"branding":{"hub_page_color":"000000","image_alt_text":"","hub_page_description_with_hyperlink":"","hub_page_logo":null},"created_at":"2021-05-29T07:25:11.415Z","created_by":"blt9a0fc67c46c47dd7","display_options":"Standard View","icon":null,"image_alt_text":"","modules":{"module_blocks":[]},"over_the_edge":[],"secondary_categories":[{"_version":9,"locale":"en-us","uid":"blt5159acef8bbbdbd2","ACL":{},"_in_progress":false,"branding":{"hub_page_color":"","hub_page_description":"","hub_page_logo":null},"created_at":"2021-05-29T07:25:50.638Z","created_by":"blt9a0fc67c46c47dd7","display_options":"Standard View","icon":null,"modules":{"module_blocks":[]},"over_the_edge":[],"secondary_category_name":"Intel","seo":{"canonical_url":"","meta_description":"Intel","meta_keywords":"","meta_title":"Intel"},"shown_in_header":true,"slug":"intel","sponsor_logo":null,"sponsor_text":"","tags":[],"title":"[Partner Perspectives] Intel","topic_page_description":"","updated_at":"2021-07-20T06:41:43.675Z","updated_by":"blt986fc66e34c7b415","_content_type_uid":"dr_category_secondary","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2022-09-09T14:10:34.726Z","user":"blt9488f204761710b3"}},{"_version":2,"locale":"en-us","uid":"bltf061b9cae7114970","ACL":{},"_in_progress":false,"branding":{"hub_page_color":"","hub_page_description":"","hub_page_description_with_hyperlink":"","hub_page_logo":null,"image_alt_text":""},"created_at":"2021-05-29T07:25:54.133Z","created_by":"blt9a0fc67c46c47dd7","display_options":"Standard View","icon":null,"image_alt_text":"","modules":{"module_blocks":[]},"over_the_edge":[],"secondary_category_name":"Bitdefender","seo":{"canonical_url":"","meta_description":"","meta_keywords":"","meta_title":""},"shown_in_header":true,"slug":"bitdefender","sponsor_logo":null,"sponsor_text":"","tags":[],"title":"[Partner Perspectives] Bitdefender","topic_page_description":"","updated_at":"2021-09-28T02:59:37.284Z","updated_by":"blt986fc66e34c7b415","_content_type_uid":"dr_category_secondary","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2022-09-09T14:10:34.737Z","user":"blt9488f204761710b3"}},{"_version":2,"locale":"en-us","uid":"bltf3b52db640ece380","ACL":{},"_in_progress":false,"branding":{"hub_page_color":"","hub_page_description":"","hub_page_description_with_hyperlink":"","hub_page_logo":null,"image_alt_text":""},"created_at":"2021-05-29T07:25:52.889Z","created_by":"blt9a0fc67c46c47dd7","display_options":"Standard View","icon":null,"image_alt_text":"","modules":{"module_blocks":[]},"over_the_edge":[],"secondary_category_name":"General Dynamics Fidelis","seo":{"canonical_url":"","meta_description":"","meta_keywords":"","meta_title":""},"shown_in_header":true,"slug":"general-dynamics-fidelis","sponsor_logo":null,"sponsor_text":"","tags":[],"title":"[Partner Perspectives] General Dynamics Fidelis","topic_page_description":"","updated_at":"2021-09-27T05:59:42.791Z","updated_by":"blt986fc66e34c7b415","_content_type_uid":"dr_category_secondary","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2022-09-09T14:10:34.755Z","user":"blt9488f204761710b3"}},{"_version":2,"locale":"en-us","uid":"blt13d8c03c3780161b","ACL":{},"_in_progress":false,"branding":{"hub_page_color":"","hub_page_description":"","hub_page_description_with_hyperlink":"","hub_page_logo":null,"image_alt_text":""},"created_at":"2021-05-29T07:25:56.306Z","created_by":"blt9a0fc67c46c47dd7","display_options":"Standard View","icon":null,"image_alt_text":"","modules":{"module_blocks":[]},"over_the_edge":[],"secondary_category_name":"Tenable","seo":{"canonical_url":"","meta_description":"","meta_keywords":"","meta_title":""},"shown_in_header":true,"slug":"tenable","sponsor_logo":null,"sponsor_text":"","tags":[],"title":"[Partner Perspectives] Tenable","topic_page_description":"","updated_at":"2021-09-28T02:54:32.206Z","updated_by":"blt986fc66e34c7b415","_content_type_uid":"dr_category_secondary","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2022-09-09T14:10:34.787Z","user":"blt9488f204761710b3"}},{"_version":2,"locale":"en-us","uid":"blt080f0617df413219","ACL":{},"_in_progress":false,"branding":{"hub_page_color":"","hub_page_description":"","hub_page_description_with_hyperlink":"","hub_page_logo":null,"image_alt_text":""},"created_at":"2021-05-29T07:25:55.363Z","created_by":"blt9a0fc67c46c47dd7","display_options":"Standard View","icon":null,"image_alt_text":"","modules":{"module_blocks":[]},"over_the_edge":[],"secondary_category_name":"Carbon Black","seo":{"canonical_url":"","meta_description":"","meta_keywords":"","meta_title":""},"shown_in_header":true,"slug":"carbon-black","sponsor_logo":null,"sponsor_text":"","tags":[],"title":"[Partner Perspectives] Carbon Black","topic_page_description":"","updated_at":"2021-09-28T02:56:58.486Z","updated_by":"blt986fc66e34c7b415","_content_type_uid":"dr_category_secondary","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2022-09-09T14:10:34.807Z","user":"blt9488f204761710b3"}},{"_version":2,"locale":"en-us","uid":"blta82e51ec93e2fac1","ACL":{},"_in_progress":false,"branding":{"hub_page_color":"","hub_page_description":"","hub_page_description_with_hyperlink":"","hub_page_logo":null,"image_alt_text":""},"created_at":"2021-05-29T07:25:58.531Z","created_by":"blt9a0fc67c46c47dd7","display_options":"Standard View","icon":null,"image_alt_text":"","modules":{"module_blocks":[]},"over_the_edge":[],"secondary_category_name":"Malwarebytes","seo":{"canonical_url":"","meta_description":"","meta_keywords":"","meta_title":""},"shown_in_header":true,"slug":"malwarebytes","sponsor_logo":null,"sponsor_text":"","tags":[],"title":"[Partner Perspectives] Malwarebytes","topic_page_description":"","updated_at":"2021-09-27T16:03:39.031Z","updated_by":"blt986fc66e34c7b415","_content_type_uid":"dr_category_secondary","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2022-09-09T14:10:34.837Z","user":"blt9488f204761710b3"}},{"_version":2,"locale":"en-us","uid":"bltdce9206e9328d201","ACL":{},"_in_progress":false,"branding":{"hub_page_color":"","hub_page_description":"","hub_page_description_with_hyperlink":"","hub_page_logo":null,"image_alt_text":""},"created_at":"2021-05-29T07:25:57.615Z","created_by":"blt9a0fc67c46c47dd7","display_options":"Standard View","icon":null,"image_alt_text":"","modules":{"module_blocks":[]},"over_the_edge":[],"secondary_category_name":"Evident.io","seo":{"canonical_url":"","meta_description":"","meta_keywords":"","meta_title":""},"shown_in_header":true,"slug":"evident-io","sponsor_logo":null,"sponsor_text":"","tags":[],"title":"[Partner Perspectives] Evident.io","topic_page_description":"","updated_at":"2021-09-28T02:39:01.265Z","updated_by":"blt986fc66e34c7b415","_content_type_uid":"dr_category_secondary","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2022-09-09T14:10:34.849Z","user":"blt9488f204761710b3"}},{"_version":2,"locale":"en-us","uid":"blt9ca336358f505cf7","ACL":{},"_in_progress":false,"branding":{"hub_page_color":"","hub_page_description":"","hub_page_description_with_hyperlink":"","hub_page_logo":null,"image_alt_text":""},"created_at":"2021-05-29T07:26:00.769Z","created_by":"blt9a0fc67c46c47dd7","display_options":"Standard View","icon":null,"image_alt_text":"","modules":{"module_blocks":[]},"over_the_edge":[],"secondary_category_name":"F5","seo":{"canonical_url":"","meta_description":"","meta_keywords":"","meta_title":""},"shown_in_header":true,"slug":"f5","sponsor_logo":null,"sponsor_text":"","tags":[],"title":"[Partner Perspectives] F5","topic_page_description":"","updated_at":"2021-09-27T04:43:08.815Z","updated_by":"blt986fc66e34c7b415","_content_type_uid":"dr_category_secondary","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2022-09-09T14:10:34.861Z","user":"blt9488f204761710b3"}},{"_version":3,"locale":"en-us","uid":"blt759bfac36f41d33f","ACL":{},"_in_progress":false,"branding":{"hub_page_color":"","hub_page_description":"","hub_page_description_with_hyperlink":"","hub_page_logo":null,"image_alt_text":""},"created_at":"2021-05-29T07:25:59.522Z","created_by":"blt9a0fc67c46c47dd7","display_options":"Standard View","icon":null,"image_alt_text":"","modules":{"module_blocks":[]},"over_the_edge":[],"secondary_category_name":"Juniper","seo":{"canonical_url":"","meta_description":"","meta_keywords":"","meta_title":""},"shown_in_header":true,"slug":"juniper","sponsor_logo":null,"sponsor_text":"","tags":[],"title":"[Partner Perspectives] Juniper","topic_page_description":"","updated_at":"2021-09-27T16:04:01.683Z","updated_by":"blt986fc66e34c7b415","_content_type_uid":"dr_category_secondary","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2022-09-09T14:10:34.955Z","user":"blt9488f204761710b3"}},{"_version":2,"locale":"en-us","uid":"blt8de203de1204fefa","ACL":{},"_in_progress":false,"branding":{"hub_page_color":"","hub_page_description":"","hub_page_description_with_hyperlink":"","hub_page_logo":null,"image_alt_text":""},"created_at":"2021-05-29T07:26:03.245Z","created_by":"blt9a0fc67c46c47dd7","display_options":"Standard View","icon":null,"image_alt_text":"","modules":{"module_blocks":[]},"over_the_edge":[],"secondary_category_name":"iboss","seo":{"canonical_url":"","meta_description":"","meta_keywords":"","meta_title":""},"shown_in_header":true,"slug":"iboss","sponsor_logo":null,"sponsor_text":"","tags":[],"title":"[Partner Perspectives] iboss","topic_page_description":"","updated_at":"2021-09-27T16:02:15.948Z","updated_by":"blt986fc66e34c7b415","_content_type_uid":"dr_category_secondary","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2022-09-09T14:10:34.960Z","user":"blt9488f204761710b3"}},{"_version":2,"locale":"en-us","uid":"blt0857e3accb1bca3c","ACL":{},"_in_progress":false,"branding":{"hub_page_color":"","hub_page_description":"","hub_page_description_with_hyperlink":"","hub_page_logo":null,"image_alt_text":""},"created_at":"2021-05-29T07:26:02.003Z","created_by":"blt9a0fc67c46c47dd7","display_options":"Standard View","icon":null,"image_alt_text":"","modules":{"module_blocks":[]},"over_the_edge":[],"secondary_category_name":"Gigamon","seo":{"canonical_url":"","meta_description":"","meta_keywords":"","meta_title":""},"shown_in_header":true,"slug":"gigamon","sponsor_logo":null,"sponsor_text":"","tags":[],"title":"[Partner Perspectives] Gigamon","topic_page_description":"","updated_at":"2021-09-27T15:59:04.124Z","updated_by":"blt986fc66e34c7b415","_content_type_uid":"dr_category_secondary","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2022-09-09T14:10:34.953Z","user":"blt9488f204761710b3"}},{"_version":2,"locale":"en-us","uid":"blt0f2b2ba95fdf65ba","ACL":{},"_in_progress":false,"branding":{"hub_page_logo":null,"image_alt_text":"","hub_page_description_with_hyperlink":"","hub_page_color":""},"created_at":"2021-10-28T15:37:45.384Z","created_by":"bltfcb3d125bf8c49ee","display_options":"Standard View","icon":null,"image_alt_text":"","modules":{"module_blocks":[]},"over_the_edge":[],"secondary_category_name":"CrowdStrike","seo":{"meta_title":"","meta_description":"","meta_keywords":"","canonical_url":""},"shown_in_header":true,"slug":"crowdstrike","sponsor_logo":null,"sponsor_text":"","tags":[],"title":"[Partner Perspectives] CrowdStrike","topic_page_description":"","updated_at":"2021-10-28T15:41:17.530Z","updated_by":"bltfcb3d125bf8c49ee","_content_type_uid":"dr_category_secondary","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-12-06T21:12:52.566Z","user":"bltfcb3d125bf8c49ee"}},{"_version":1,"locale":"en-us","uid":"blt81e53b0d8a1f159a","ACL":{},"_in_progress":false,"branding":{"hub_page_logo":null,"image_alt_text":"","hub_page_description_with_hyperlink":"","hub_page_color":""},"created_at":"2021-10-28T15:38:57.813Z","created_by":"bltfcb3d125bf8c49ee","display_options":"Standard View","icon":null,"image_alt_text":"","modules":{"module_blocks":[]},"over_the_edge":[],"secondary_category_name":"Darktrace","seo":{"meta_title":"","meta_description":"","meta_keywords":"","canonical_url":""},"shown_in_header":true,"slug":"darktrace","sponsor_logo":null,"sponsor_text":"","tags":[],"title":"{Partner Perspectives] Darktrace","topic_page_description":"","updated_at":"2021-10-28T15:38:57.813Z","updated_by":"bltfcb3d125bf8c49ee","_content_type_uid":"dr_category_secondary","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2022-01-05T22:48:48.368Z","user":"bltfcb3d125bf8c49ee"}},{"_version":1,"locale":"en-us","uid":"bltf9ffef9c7c4fca81","ACL":{},"_in_progress":false,"branding":{"hub_page_logo":null,"image_alt_text":"","hub_page_description_with_hyperlink":"","hub_page_color":""},"created_at":"2022-09-07T17:20:29.124Z","created_by":"blt9488f204761710b3","display_options":"Standard View","icon":null,"image_alt_text":"","modules":{"module_blocks":[]},"over_the_edge":[],"secondary_category_name":"Microsoft","seo":{"meta_title":"","meta_description":"","meta_keywords":"","canonical_url":""},"shown_in_header":true,"slug":"microsoft","sponsor_logo":null,"sponsor_text":"","tags":[],"title":"[Partner Perspectives] Microsoft","topic_page_description":"","updated_at":"2022-09-07T17:20:29.124Z","updated_by":"blt9488f204761710b3","_content_type_uid":"dr_category_secondary","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2022-09-07T17:20:41.292Z","user":"blt9488f204761710b3"}},{"_version":1,"locale":"en-us","uid":"blt9c4de42f11c49292","ACL":{},"_in_progress":false,"branding":{"hub_page_logo":null,"image_alt_text":"","hub_page_description_with_hyperlink":"","hub_page_color":""},"created_at":"2022-10-19T16:03:58.197Z","created_by":"blt9488f204761710b3","display_options":"Standard View","icon":null,"image_alt_text":"","modules":{"module_blocks":[]},"over_the_edge":[],"secondary_category_name":"Zscaler","seo":{"meta_title":"","meta_description":"","meta_keywords":"","canonical_url":""},"shown_in_header":true,"slug":"zscaler","sponsor_logo":null,"sponsor_text":"","tags":[],"title":"[Partner Perspectives] Zscaler","topic_page_description":"","updated_at":"2022-10-19T16:03:58.197Z","updated_by":"blt9488f204761710b3","_content_type_uid":"dr_category_secondary","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2022-10-19T16:04:07.234Z","user":"blt9488f204761710b3"}}],"seo":{"canonical_url":"","meta_description":"Partner Perspectives","meta_keywords":"","meta_title":"Partner Perspectives"},"slug":"partner-perspectives","sponsor_logo":null,"sponsor_text":"","tags":[],"title":"Partner Perspectives","topic_page_description":"","updated_at":"2022-10-19T16:05:49.953Z","updated_by":"blt9488f204761710b3","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2022-10-19T16:05:58.559Z","user":"blt9488f204761710b3"}},{"_version":9,"locale":"en-us","uid":"blt0ff9d34f1c5fcce7","_in_progress":false,"branding":{"hub_page_logo":null,"image_alt_text":"","hub_page_description_with_hyperlink":"\u003cp\u003e\u003cbr\u003e\u003c/p\u003e","hub_page_color":""},"created_at":"2022-08-17T18:18:06.614Z","created_by":"blt31bd4bcd14669cc0","display_options":"Standard View","icon":null,"image_alt_text":"","modules":{"module_blocks":[]},"over_the_edge":[],"secondary_categories":[],"seo":{"meta_title":"ICS/OT Security","meta_description":"The latest news and analysis on threats and attacks against operational technology (OT) environments, as well as the security tools, technologies, and strategies for protecting industrial control systems (ICS) and OT networks.","meta_keywords":"","canonical_url":""},"slug":"ics-ot","sponsor_logo":null,"sponsor_text":"","tags":[],"title":"ICS/OT Security","topic_page_description":"The latest news and analysis on threats and attacks against operational technology (OT) environments, as well as the security tools, technologies, and strategies for protecting industrial control systems (ICS) and OT networks.","updated_at":"2022-10-05T21:22:31.907Z","updated_by":"blt31bd4bcd14669cc0","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2022-10-12T13:42:30.448Z","user":"blt31bd4bcd14669cc0"},"_owner":{"uid":"blt31bd4bcd14669cc0","created_at":"2021-06-01T09:34:00.613Z","updated_at":"2023-03-23T19:05:12.751Z","email":"someone@example.com","username":"-","first_name":"-","last_name":"-","company":"-","org_uid":[],"shared_org_uid":["blt5948195ac13977b0"],"mobile_number":"0000000000","country_code":"00","tfa_status":"-","authy_id":null,"active":true,"metadata":{},"profile_type":"business","failed_attempts":0,"settings":{"preferences":{},"global":[]},"last_login_at":"1900-01-01T00:00:00.000Z"}},{"_version":14,"locale":"en-us","uid":"blt8622595eba1da383","ACL":{},"_in_progress":false,"branding":{"hub_page_color":"","hub_page_description_with_hyperlink":"\u003cp\u003e\u003c/p\u003e\n\u003cp\u003e\u003c/p\u003e\n\u003cp\u003eThe Global Leader in Cybersecurity Events \u0026 Trainings.\u0026nbsp;\u003c/p\u003e\n\u003cp\u003eClick \u003ca href=\"https://www.blackhat.com\" target=\"_blank\"\u003ehere\u003c/a\u003e to learn more.\u003c/p\u003e\n\u003cp\u003e\u003c/p\u003e\n\u003cp\u003e\u003c/p\u003e","hub_page_logo":{"_version":1,"is_dir":false,"uid":"blt4ddfe1d59823f8f3","ACL":{},"content_type":"image/png","created_at":"2022-02-28T14:45:33.919Z","created_by":"blta3dd47a38c602549","file_size":"4211","filename":"Black_Hat.png","parent_uid":"blt966fbf792d032939","tags":[],"title":"Black_Hat.png","updated_at":"2022-02-28T14:45:33.919Z","updated_by":"blta3dd47a38c602549","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2022-07-21T15:40:26.097Z","user":"blt86eeaee2e17f91dc"},"url":"https://eu-images.contentstack.com/v3/assets/blt66983808af36a8ef/blt4ddfe1d59823f8f3/621ce00dba1c6a10726d97c4/Black_Hat.png"},"image_alt_text":"Black Hat Temporary"},"created_at":"2021-06-16T21:13:12.377Z","created_by":"blt9488f204761710b3","display_options":"Modular View","icon":null,"image_alt_text":"","modules":{"module_blocks":[{"uid":"blt7f631c6ec34e5f81","_content_type_uid":"dr_module_jobs"},{"uid":"blt3011a4d7f52f0425","_content_type_uid":"dr_module_jobs"},{"uid":"blt9d87466a690e2652","_content_type_uid":"dr_module_article_promo"},{"uid":"blt6e2f0c4102bcde09","_content_type_uid":"dr_featured_content"}]},"over_the_edge":[],"secondary_categories":[{"_version":1,"locale":"en-us","uid":"blt6725e33b8598a69d","ACL":{},"_in_progress":false,"branding":{"hub_page_logo":null,"image_alt_text":"","hub_page_description_with_hyperlink":"","hub_page_color":""},"created_at":"2022-05-30T12:59:33.578Z","created_by":"blta3dd47a38c602549","display_options":"Standard View","icon":null,"image_alt_text":"","modules":{"module_blocks":[]},"over_the_edge":[],"secondary_category_name":"Black Hat News","seo":{"meta_title":"","meta_description":"","meta_keywords":"","canonical_url":""},"shown_in_header":false,"slug":"black-hat-news","sponsor_logo":null,"sponsor_text":"","tags":[],"title":"Black Hat News","topic_page_description":"","updated_at":"2022-05-30T12:59:33.578Z","updated_by":"blta3dd47a38c602549","_content_type_uid":"dr_category_secondary","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2022-07-21T15:40:26.005Z","user":"blt86eeaee2e17f91dc"}}],"seo":{"canonical_url":"","meta_description":"Updates and insights from the Black Hat cybersecurity conference","meta_keywords":"","meta_title":""},"slug":"black-hat","sponsor_logo":null,"sponsor_text":"","tags":[],"title":"Black Hat","topic_page_description":"Updates and insights from Black Hat.","updated_at":"2022-07-07T17:43:03.736Z","updated_by":"blt86eeaee2e17f91dc","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2022-07-21T15:40:26.124Z","user":"blt86eeaee2e17f91dc"},"_owner":{"uid":"blt9488f204761710b3","created_at":"2021-05-21T10:05:50.071Z","updated_at":"2023-03-23T11:13:46.740Z","email":"someone@example.com","username":"-","first_name":"-","last_name":"-","company":"-","org_uid":[],"shared_org_uid":["blt5948195ac13977b0"],"mobile_number":"0000000000","country_code":"00","tfa_status":"-","authy_id":null,"active":true,"metadata":{},"profile_type":"business","failed_attempts":0,"settings":{"preferences":{},"global":[]},"last_login_at":"1900-01-01T00:00:00.000Z"}},{"_version":17,"locale":"en-us","uid":"blt0db4b40b15bb3ca2","ACL":{},"_in_progress":false,"branding":{"image_alt_text":"Dark Reading Technology Logo","hub_page_color":"000000","hub_page_description_with_hyperlink":"\u003cp\u003eTech News and Analysis\u003c/p\u003e","hub_page_logo":{"parent_uid":"blt966fbf792d032939","uid":"blte2d0d4f2e812b871","created_by":"blta3dd47a38c602549","updated_by":"blta3dd47a38c602549","created_at":"2021-09-30T08:22:01.619Z","updated_at":"2021-09-30T08:22:01.619Z","content_type":"image/png","file_size":"8009","filename":"DR_Technology_Logo_White.png","title":"DR_Technology_Logo_White.png","ACL":[],"_version":1,"is_dir":false,"tags":[],"publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-10-01T12:34:45.120Z","user":"blta3dd47a38c602549"},"url":"https://eu-images.contentstack.com/v3/assets/blt66983808af36a8ef/blte2d0d4f2e812b871/615573a972a0487ccb343d41/DR_Technology_Logo_White.png"}},"created_at":"2021-09-10T17:46:13.387Z","created_by":"blta3dd47a38c602549","display_options":"Modular View","icon":null,"image_alt_text":"","modules":{"module_blocks":[{"uid":"blt2bf72304a6aba7a2","_content_type_uid":"dr_featured_content"},{"uid":"blt81cfb8f03ba8dbbd","_content_type_uid":"dr_module_article_promo"},{"uid":"blt60343bf2d91f1598","_content_type_uid":"dr_module_article_promo"},{"uid":"bltb2833b9c1bc25adc","_content_type_uid":"dr_module_latest_content"}]},"over_the_edge":[],"secondary_categories":[{"title":"[DR-TECH] The Cyber Future","secondary_category_name":"The Cyber Future","slug":"the-cyber-future","shown_in_header":true,"branding":{"hub_page_logo":null,"image_alt_text":"","hub_page_description":"","hub_page_color":""},"sponsor_text":"","sponsor_logo":null,"image_alt_text":"","over_the_edge":[],"display_options":"Standard View","modules":{"module_blocks":[]},"seo":{"meta_title":"","meta_description":"","meta_keywords":"","canonical_url":""},"icon":null,"topic_page_description":"","tags":[],"locale":"en-us","uid":"bltc11ff98f98398512","created_by":"blta3dd47a38c602549","updated_by":"blta3dd47a38c602549","created_at":"2021-09-10T17:49:59.274Z","updated_at":"2021-09-10T17:49:59.274Z","_content_type_uid":"dr_category_secondary","ACL":{},"_version":1,"_in_progress":false,"publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-10-01T12:34:45.095Z","user":"blta3dd47a38c602549"}},{"_version":1,"locale":"en-us","uid":"bltb60f3c528a3177f8","ACL":{},"_in_progress":false,"branding":{"hub_page_logo":null,"image_alt_text":"","hub_page_description":"","hub_page_color":""},"created_at":"2021-09-10T17:49:23.472Z","created_by":"blta3dd47a38c602549","display_options":"Standard View","icon":null,"image_alt_text":"","modules":{"module_blocks":[]},"over_the_edge":[],"secondary_category_name":"Emerging Tech","seo":{"meta_title":"","meta_description":"","meta_keywords":"","canonical_url":""},"shown_in_header":true,"slug":"emerging-tech","sponsor_logo":null,"sponsor_text":"","tags":[],"title":"[DR-TECH] Emerging Tech","topic_page_description":"","updated_at":"2021-09-10T17:49:23.472Z","updated_by":"blta3dd47a38c602549","_content_type_uid":"dr_category_secondary","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-10-01T14:12:01.048Z","user":"blta3dd47a38c602549"}},{"title":"[DR-TECH] Tech Talks","secondary_category_name":"Tech Talks","slug":"tech-talks","shown_in_header":true,"branding":{"hub_page_logo":null,"image_alt_text":"","hub_page_description":"","hub_page_color":""},"sponsor_text":"","sponsor_logo":null,"image_alt_text":"","over_the_edge":[],"display_options":"Standard View","modules":{"module_blocks":[]},"seo":{"meta_title":"","meta_description":"","meta_keywords":"","canonical_url":""},"icon":null,"topic_page_description":"","tags":[],"locale":"en-us","uid":"bltb9fce7117e1d3083","created_by":"blta3dd47a38c602549","updated_by":"blta3dd47a38c602549","created_at":"2021-09-10T17:48:56.310Z","updated_at":"2021-09-10T17:48:56.310Z","_content_type_uid":"dr_category_secondary","ACL":{},"_version":1,"_in_progress":false,"publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-10-01T12:34:45.102Z","user":"blta3dd47a38c602549"}},{"title":"[DR-TECH] Tech Trends","secondary_category_name":"Tech Trends","slug":"tech-trends","shown_in_header":true,"branding":{"hub_page_logo":null,"image_alt_text":"","hub_page_description":"","hub_page_color":""},"sponsor_text":"","sponsor_logo":null,"image_alt_text":"","over_the_edge":[],"display_options":"Standard View","modules":{"module_blocks":[]},"seo":{"meta_title":"","meta_description":"","meta_keywords":"","canonical_url":""},"icon":null,"topic_page_description":"","tags":[],"locale":"en-us","uid":"blt54beaadb3c555193","created_by":"blta3dd47a38c602549","updated_by":"blta3dd47a38c602549","created_at":"2021-09-10T17:48:10.159Z","updated_at":"2021-09-10T17:48:10.159Z","_content_type_uid":"dr_category_secondary","ACL":{},"_version":1,"_in_progress":false,"publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-10-01T12:34:45.114Z","user":"blta3dd47a38c602549"}}],"seo":{"meta_title":"","meta_description":"Cybersecurity technology and product news, analysis, expert commentary, and in-depth feature articles.","meta_keywords":"","canonical_url":""},"slug":"dr-tech","sponsor_logo":null,"sponsor_text":"","tags":[],"title":"DR Tech","topic_page_description":"Cybersecurity technology and product news, analysis, expert commentary, and in-depth feature articles.","updated_at":"2022-07-05T17:29:28.761Z","updated_by":"blt7639e1b0bae9533a","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2022-07-05T17:29:37.178Z","user":"blt7639e1b0bae9533a"},"_owner":{"uid":"blta3dd47a38c602549","created_at":"2021-05-21T10:05:50.070Z","updated_at":"2023-03-06T11:25:30.882Z","email":"someone@example.com","username":"-","first_name":"-","last_name":"-","company":"-","org_uid":[],"shared_org_uid":["blt5948195ac13977b0"],"mobile_number":"0000000000","country_code":"00","tfa_status":"-","authy_id":null,"active":true,"metadata":{},"profile_type":"business","failed_attempts":0,"settings":{"preferences":{},"global":[]},"last_login_at":"1900-01-01T00:00:00.000Z"}},{"_version":6,"locale":"en-us","uid":"blta6cab0108fb2fe2d","ACL":{},"_in_progress":false,"branding":{"hub_page_color":"000000","hub_page_description_with_hyperlink":"","hub_page_logo":null,"image_alt_text":""},"created_at":"2021-05-29T07:25:21.501Z","created_by":"blt9a0fc67c46c47dd7","display_options":"Standard View","icon":null,"image_alt_text":"","modules":{"module_blocks":[]},"over_the_edge":[],"secondary_categories":[{"_version":2,"locale":"en-us","uid":"blt3a07a5f6f122df83","ACL":{},"_in_progress":false,"branding":{"hub_page_color":"","hub_page_description":"","hub_page_logo":null},"created_at":"2021-05-29T07:25:45.829Z","created_by":"blt9a0fc67c46c47dd7","display_options":"Standard View","icon":null,"modules":{"module_blocks":[]},"over_the_edge":[],"secondary_category_name":"Advanced Threats","seo":{"canonical_url":"","meta_description":"Advanced Threats","meta_keywords":"","meta_title":"Advanced Threats"},"shown_in_header":true,"slug":"advanced-threats","sponsor_logo":null,"sponsor_text":"","tags":[],"title":"[Vulnerabilities/Threats] Advanced Threats","topic_page_description":"","updated_at":"2021-07-16T11:10:36.838Z","updated_by":"blta3dd47a38c602549","_content_type_uid":"dr_category_secondary","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-07-20T11:43:56.836Z","user":"blta3dd47a38c602549"}},{"_version":2,"locale":"en-us","uid":"blt2e8d75e7e5494295","ACL":{},"_in_progress":false,"branding":{"hub_page_color":"","hub_page_description":"","hub_page_logo":null},"created_at":"2021-05-29T07:25:44.920Z","created_by":"blt9a0fc67c46c47dd7","display_options":"Standard View","icon":null,"modules":{"module_blocks":[]},"over_the_edge":[],"secondary_category_name":"Insider Threats","seo":{"canonical_url":"","meta_description":"Insider Threats","meta_keywords":"","meta_title":"Insider Threats"},"shown_in_header":true,"slug":"insider-threats","sponsor_logo":null,"sponsor_text":"","tags":[],"title":"[Vulnerabilities/Threats] Insider Threats","topic_page_description":"","updated_at":"2021-07-16T11:07:19.341Z","updated_by":"blta3dd47a38c602549","_content_type_uid":"dr_category_secondary","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-07-20T11:43:31.039Z","user":"blta3dd47a38c602549"}},{"_version":3,"locale":"en-us","uid":"blteb326d2311783787","ACL":{},"_in_progress":false,"branding":{"hub_page_color":"","hub_page_description":"","hub_page_logo":null},"created_at":"2021-05-29T07:25:47.773Z","created_by":"blt9a0fc67c46c47dd7","display_options":"Standard View","icon":null,"modules":{"module_blocks":[]},"over_the_edge":[],"secondary_category_name":"Vulnerability Management","seo":{"canonical_url":"","meta_description":"Vulnerability Management","meta_keywords":"","meta_title":"Vulnerability Management"},"shown_in_header":true,"slug":"vulnerability-management","sponsor_logo":null,"sponsor_text":"","tags":[],"title":"{Vulnerabilities/Threats] Vulnerability Management","topic_page_description":"","updated_at":"2021-07-20T08:20:16.855Z","updated_by":"blt986fc66e34c7b415","_content_type_uid":"dr_category_secondary","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-07-20T11:42:56.421Z","user":"blta3dd47a38c602549"}}],"seo":{"canonical_url":"","meta_description":"Breaking news, analysis, and expert commentary on software \u0026 hardware vulnerabilities and cyber threats, and the tools, tech, and practices for addressing them","meta_keywords":"","meta_title":"Vulnerabilities / Threats"},"slug":"vulnerabilities-threats","sponsor_logo":null,"sponsor_text":"","tags":[],"title":"Vulnerabilities/Threats","topic_page_description":"Breaking news, news analysis, and expert commentary on cybersecurity threat intelligence, including tools \u0026 technologies. ","updated_at":"2022-02-28T13:38:26.594Z","updated_by":"bltfcb3d125bf8c49ee","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2022-02-28T13:38:32.017Z","user":"bltfcb3d125bf8c49ee"}},{"_version":4,"locale":"en-us","uid":"bltdeb10b926a7ccf5c","ACL":{},"_in_progress":false,"branding":{"hub_page_color":"000000","hub_page_description_with_hyperlink":"","hub_page_logo":null,"image_alt_text":""},"created_at":"2021-05-29T07:25:17.673Z","created_by":"blt9a0fc67c46c47dd7","display_options":"Standard View","icon":null,"image_alt_text":"","modules":{"module_blocks":[]},"over_the_edge":[],"secondary_categories":[],"seo":{"canonical_url":"","meta_description":"Breaking news, news analysis, and expert commentary on cybersecurity threat intelligence, including tools \u0026 technologies","meta_keywords":"","meta_title":"Threat Intelligence"},"slug":"threat-intelligence","sponsor_logo":null,"sponsor_text":"","tags":[],"title":"Threat Intelligence","topic_page_description":"Breaking news, news analysis, and expert commentary on cybersecurity threat intelligence, including tools \u0026 technologies.","updated_at":"2022-02-28T13:36:02.565Z","updated_by":"bltfcb3d125bf8c49ee","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2022-02-28T13:36:07.579Z","user":"bltfcb3d125bf8c49ee"}},{"_version":2,"locale":"en-us","uid":"blt000a3e5dc1d51c08","ACL":{},"_in_progress":false,"branding":{"hub_page_color":"","hub_page_description_with_hyperlink":"","hub_page_logo":null,"image_alt_text":""},"created_at":"2021-06-16T21:13:39.947Z","created_by":"blt9488f204761710b3","display_options":"Standard View","icon":null,"image_alt_text":"","modules":{"module_blocks":[]},"over_the_edge":[],"secondary_categories":[],"seo":{"canonical_url":"","meta_description":"Archive of cybersecurity news articles, expert commentary, and detailed analysis published by the former Security Now website, now part of Dark Reading.","meta_keywords":"","meta_title":""},"slug":"security-now","sponsor_logo":null,"sponsor_text":"","tags":[],"title":"Security Now","topic_page_description":"In 2020, Security Now became part of Dark Reading. This page contains an archive of cybersecurity news articles, detailed analysis, and expert commentary published by Security Now. ","updated_at":"2022-02-28T13:34:44.576Z","updated_by":"bltfcb3d125bf8c49ee","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2022-02-28T13:34:49.315Z","user":"bltfcb3d125bf8c49ee"},"_owner":{"uid":"blt9488f204761710b3","created_at":"2021-05-21T10:05:50.071Z","updated_at":"2023-03-23T11:13:46.740Z","email":"someone@example.com","username":"-","first_name":"-","last_name":"-","company":"-","org_uid":[],"shared_org_uid":["blt5948195ac13977b0"],"mobile_number":"0000000000","country_code":"00","tfa_status":"-","authy_id":null,"active":true,"metadata":{},"profile_type":"business","failed_attempts":0,"settings":{"preferences":{},"global":[]},"last_login_at":"1900-01-01T00:00:00.000Z"}},{"_version":4,"locale":"en-us","uid":"blt7095e7265cf0f380","ACL":{},"_in_progress":false,"branding":{"hub_page_color":"000000","hub_page_description_with_hyperlink":"","hub_page_logo":null,"image_alt_text":""},"created_at":"2021-05-29T07:25:22.491Z","created_by":"blt9a0fc67c46c47dd7","display_options":"Standard View","icon":null,"image_alt_text":"","modules":{"module_blocks":[]},"over_the_edge":[],"secondary_categories":[{"_version":2,"locale":"en-us","uid":"blt9d07d0a4c0d8cb54","ACL":{},"_in_progress":false,"branding":{"hub_page_color":"","hub_page_description":"","hub_page_logo":null},"created_at":"2021-05-29T07:25:43.070Z","created_by":"blt9a0fc67c46c47dd7","display_options":"Standard View","icon":null,"modules":{"module_blocks":[]},"over_the_edge":[],"secondary_category_name":"Compliance","seo":{"canonical_url":"","meta_description":"Compliance","meta_keywords":"","meta_title":"Compliance"},"shown_in_header":true,"slug":"compliance","sponsor_logo":null,"sponsor_text":"","tags":[],"title":"[Risk] Compliance","topic_page_description":"","updated_at":"2021-07-16T11:20:24.692Z","updated_by":"blta3dd47a38c602549","_content_type_uid":"dr_category_secondary","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-07-20T11:46:22.899Z","user":"blta3dd47a38c602549"}}],"seo":{"canonical_url":"","meta_description":"Breaking news, news analysis, and expert commentary on cybersecurity risk, and the tools, technologies, and practices for assessing risk","meta_keywords":"","meta_title":"Risk"},"slug":"risk","sponsor_logo":null,"sponsor_text":"","tags":[],"title":"Risk","topic_page_description":"Breaking news, news analysis, and expert commentary on cybersecurity risk, and the tools, technologies, and practices for assessing risk.","updated_at":"2022-02-28T13:33:37.389Z","updated_by":"bltfcb3d125bf8c49ee","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2022-02-28T13:33:43.718Z","user":"bltfcb3d125bf8c49ee"}},{"_version":4,"locale":"en-us","uid":"bltaebee183784263bf","ACL":{},"_in_progress":false,"branding":{"hub_page_color":"000000","hub_page_description_with_hyperlink":"","hub_page_logo":null,"image_alt_text":""},"created_at":"2021-05-29T07:25:18.693Z","created_by":"blt9a0fc67c46c47dd7","display_options":"Standard View","icon":null,"image_alt_text":"","modules":{"module_blocks":[]},"over_the_edge":[],"secondary_categories":[],"seo":{"canonical_url":"","meta_description":"Breaking news, news analysis, and expert commentary on the intersection of cybersecurity and physical security","meta_keywords":"","meta_title":"Physical Security"},"slug":"physical-security","sponsor_logo":null,"sponsor_text":"","tags":[],"title":"Physical Security","topic_page_description":"Breaking news, news analysis, and expert commentary on the intersection of cybersecurity and physical security.","updated_at":"2022-02-28T13:31:50.971Z","updated_by":"bltfcb3d125bf8c49ee","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2022-02-28T13:32:02.329Z","user":"bltfcb3d125bf8c49ee"}},{"_version":5,"locale":"en-us","uid":"blta96d37f2f5d942cf","ACL":{},"_in_progress":false,"branding":{"hub_page_color":"000000","hub_page_description_with_hyperlink":"","hub_page_logo":null,"image_alt_text":""},"created_at":"2021-05-29T07:25:15.618Z","created_by":"blt9a0fc67c46c47dd7","display_options":"Standard View","icon":null,"image_alt_text":"","modules":{"module_blocks":[]},"over_the_edge":[],"secondary_categories":[],"seo":{"canonical_url":"","meta_description":"Breaking news, news analysis, and expert commentary on threats to the network perimeter, and the tools \u0026 technologies for securing it","meta_keywords":"","meta_title":"Perimeter"},"slug":"perimeter","sponsor_logo":null,"sponsor_text":"","tags":[],"title":"Perimeter","topic_page_description":"Breaking news, news analysis, and expert commentary on threats to the network perimeter, and the tools \u0026 technologies for securing it.","updated_at":"2022-02-28T13:17:18.892Z","updated_by":"bltfcb3d125bf8c49ee","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2022-02-28T13:29:22.075Z","user":"bltfcb3d125bf8c49ee"}},{"_version":4,"locale":"en-us","uid":"blt072b989d237a00d2","ACL":{},"_in_progress":false,"branding":{"hub_page_color":"000000","hub_page_description_with_hyperlink":"","hub_page_logo":null,"image_alt_text":""},"created_at":"2021-05-29T07:25:19.615Z","created_by":"blt9a0fc67c46c47dd7","display_options":"Standard View","icon":null,"image_alt_text":"","modules":{"module_blocks":[]},"over_the_edge":[],"secondary_categories":[{"_version":4,"locale":"en-us","uid":"blt1922da536f26f75a","ACL":{},"_in_progress":false,"branding":{"hub_page_color":"","hub_page_description":"","hub_page_logo":null},"created_at":"2021-05-29T07:25:46.834Z","created_by":"blt9a0fc67c46c47dd7","display_options":"Standard View","icon":null,"modules":{"module_blocks":[]},"over_the_edge":[],"secondary_category_name":"Identity \u0026 Access Management","seo":{"canonical_url":"","meta_description":"Identity \u0026 Access Management","meta_keywords":"","meta_title":"Identity \u0026 Access Management"},"shown_in_header":true,"slug":"identity-and-access-management","sponsor_logo":null,"sponsor_text":"","tags":[],"title":"[Operations] Identity \u0026 Access Management","topic_page_description":"","updated_at":"2021-07-20T12:02:06.708Z","updated_by":"blt986fc66e34c7b415","_content_type_uid":"dr_category_secondary","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-07-20T12:09:06.252Z","user":"blt986fc66e34c7b415"}}],"seo":{"canonical_url":"","meta_description":"Breaking news, news analysis, and expert commentary on cybersecurity operations, and the tools \u0026 technologies for security teams","meta_keywords":"","meta_title":"Operations"},"slug":"operations","sponsor_logo":null,"sponsor_text":"","tags":[],"title":"Operations","topic_page_description":"Breaking news, news analysis, and expert commentary on cybersecurity operations, and the tools \u0026 technologies for security teams.","updated_at":"2022-02-28T13:16:25.930Z","updated_by":"bltfcb3d125bf8c49ee","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2022-02-28T13:16:33.681Z","user":"bltfcb3d125bf8c49ee"}},{"_version":155,"locale":"en-us","uid":"blt7a29bd8a29d3130b","ACL":{},"_in_progress":false,"branding":{"hub_page_color":"000000","image_alt_text":"Edge Logo","hub_page_description_with_hyperlink":"\u003cp\u003eCybersecurity In-Depth\u003c/p\u003e","hub_page_logo":{"parent_uid":"blt966fbf792d032939","uid":"blt482d47e4fd046239","created_by":"blta3dd47a38c602549","updated_by":"blta3dd47a38c602549","created_at":"2021-10-08T14:20:30.584Z","updated_at":"2021-10-08T14:20:30.584Z","content_type":"image/png","file_size":"4884","filename":"TheEdge-Logo-0.png","title":"TheEdge-Logo-0.png","ACL":[],"_version":1,"is_dir":false,"tags":[],"publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-10-08T14:21:25.169Z","user":"blta3dd47a38c602549"},"url":"https://eu-images.contentstack.com/v3/assets/blt66983808af36a8ef/blt482d47e4fd046239/616053ae5cf2461e097404d8/TheEdge-Logo-0.png"}},"created_at":"2021-05-29T07:25:25.978Z","created_by":"blt9a0fc67c46c47dd7","display_options":"Modular View","icon":null,"image_alt_text":"","modules":{"module_blocks":[{"uid":"blt0a4a76389ec40ec6","_content_type_uid":"dr_featured_content"},{"uid":"blt2a13fe94a98405cd","_content_type_uid":"dr_module_article_promo"},{"uid":"bltefdbbe29deef8414","_content_type_uid":"dr_module_article_promo"},{"uid":"blt801b94c10208828e","_content_type_uid":"dr_module_latest_content"}]},"over_the_edge":[],"secondary_categories":[{"_content_type_uid":"dr_category_secondary","_version":40,"locale":"en-us","uid":"bltb7711dfcd24f1fc0","ACL":{},"_in_progress":false,"branding":{"hub_page_color":"000000","hub_page_logo":{"_version":1,"is_dir":false,"uid":"blt2bc2d9dd689b0def","ACL":{},"content_type":"image/png","created_at":"2021-06-07T21:43:29.490Z","created_by":"bltfcb3d125bf8c49ee","file_size":"4813","filename":"TheEdge-Logo.png","tags":[],"title":"TheEdge-Logo.png","updated_at":"2021-06-07T21:43:29.490Z","updated_by":"bltfcb3d125bf8c49ee","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-07-15T11:49:43.071Z","user":"blt986fc66e34c7b415"},"url":"https://eu-images.contentstack.com/v3/assets/blt66983808af36a8ef/blt2bc2d9dd689b0def/60be930173c30c216ca2a004/TheEdge-Logo.png"},"image_alt_text":"","hub_page_description_with_hyperlink":""},"created_at":"2021-05-29T07:25:49.625Z","created_by":"blt9a0fc67c46c47dd7","display_options":"Standard View","icon":{"uid":"bltf050bd5685cd6a94","created_by":"blt6fb043d513578596","updated_by":"blt6fb043d513578596","created_at":"2021-07-06T15:53:38.409Z","updated_at":"2021-07-06T15:53:38.409Z","content_type":"image/svg+xml","file_size":"3222","filename":"edge-article-icon.svg","title":"edge-article-icon.svg","ACL":[],"_version":1,"is_dir":false,"tags":[],"publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-07-15T11:54:17.246Z","user":"blt986fc66e34c7b415"},"url":"https://eu-images.contentstack.com/v3/assets/blt66983808af36a8ef/bltf050bd5685cd6a94/60e47c8244e9812aec444767/edge-article-icon.svg"},"image_alt_text":"","modules":{"module_blocks":[]},"over_the_edge":[],"secondary_category_name":"Edge Articles","seo":{"canonical_url":"","meta_description":"In-Depth feature articles, analysis, and commentary on cybersecurity trends and best practices.","meta_keywords":"","meta_title":"Edge Articles"},"shown_in_header":true,"slug":"edge-articles","sponsor_logo":null,"sponsor_text":"Brought to you by","tags":[],"title":"[Edge] Edge Articles","topic_page_description":"In-Depth feature articles, analysis, and commentary on cybersecurity trends and best practices.","updated_at":"2022-03-23T20:45:39.501Z","updated_by":"bltfcb3d125bf8c49ee","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2022-03-23T20:45:50.888Z","user":"bltfcb3d125bf8c49ee"}},{"_version":38,"locale":"en-us","uid":"blt3a5a059746d0ef60","ACL":{},"_in_progress":false,"branding":{"hub_page_color":"","hub_page_description":"","hub_page_logo":null},"created_at":"2021-05-29T07:25:48.749Z","created_by":"blt9a0fc67c46c47dd7","display_options":"Standard View","icon":null,"modules":{"module_blocks":[{"uid":"blt0a4a76389ec40ec6","_content_type_uid":"dr_featured_content"},{"uid":"bltefdbbe29deef8414","_content_type_uid":"dr_module_article_promo"},{"uid":"blt2a13fe94a98405cd","_content_type_uid":"dr_module_article_promo"},{"uid":"blt801b94c10208828e","_content_type_uid":"dr_module_latest_content"}]},"over_the_edge":[],"secondary_category_name":"Edge Ask the Experts","seo":{"canonical_url":"","meta_description":"A forum for cybersecurity professionals to ask questions and get answers about IT security threats and best practices.","meta_keywords":"","meta_title":"Edge Ask the Experts"},"shown_in_header":true,"slug":"edge-ask-the-experts","sponsor_logo":null,"sponsor_text":"","tags":[],"title":"[Edge] Edge Ask the Experts","topic_page_description":"A forum for cybersecurity professionals to ask questions and get answers about IT security threats and best practices.","updated_at":"2021-07-21T02:55:50.043Z","updated_by":"blt986fc66e34c7b415","_content_type_uid":"dr_category_secondary","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-07-21T02:55:54.234Z","user":"blt986fc66e34c7b415"}},{"_version":12,"locale":"en-us","uid":"blt224b0dfefd4bcafa","ACL":{},"_in_progress":false,"branding":{"hub_page_color":"000000","hub_page_logo":{"_version":1,"is_dir":false,"uid":"blt2bc2d9dd689b0def","ACL":{},"content_type":"image/png","created_at":"2021-06-07T21:43:29.490Z","created_by":"bltfcb3d125bf8c49ee","file_size":"4813","filename":"TheEdge-Logo.png","tags":[],"title":"TheEdge-Logo.png","updated_at":"2021-06-07T21:43:29.490Z","updated_by":"bltfcb3d125bf8c49ee","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-07-15T11:49:43.071Z","user":"blt986fc66e34c7b415"},"url":"https://eu-images.contentstack.com/v3/assets/blt66983808af36a8ef/blt2bc2d9dd689b0def/60be930173c30c216ca2a004/TheEdge-Logo.png"},"image_alt_text":"","hub_page_description_with_hyperlink":""},"created_at":"2021-05-29T07:25:38.968Z","created_by":"blt9a0fc67c46c47dd7","display_options":"Standard View","icon":null,"image_alt_text":"","modules":{"module_blocks":[]},"over_the_edge":[],"secondary_category_name":"Edge Slideshows","seo":{"canonical_url":"","meta_description":"Images, illustrations, and graphics describing emerging cybersecurity threats and best practices.","meta_keywords":"","meta_title":"Edge Slideshows | Dark Reading"},"shown_in_header":true,"slug":"edge-slideshows","sponsor_logo":null,"sponsor_text":"Brought to you by","tags":[],"title":"[Edge] Edge Slideshows","topic_page_description":"Images, illustrations, and graphics describing emerging cybersecurity threats and best practices.","updated_at":"2022-03-24T17:23:46.177Z","updated_by":"blt9488f204761710b3","_content_type_uid":"dr_category_secondary","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2022-03-24T17:23:56.621Z","user":"blt9488f204761710b3"}},{"_version":16,"locale":"en-us","uid":"bltcda9b1fc00b570f2","ACL":{},"_in_progress":false,"branding":{"hub_page_color":"000000","hub_page_logo":null,"hub_page_description_with_hyperlink":"","image_alt_text":""},"created_at":"2021-05-29T07:25:51.768Z","created_by":"blt9a0fc67c46c47dd7","display_options":"Standard View","icon":null,"image_alt_text":"","modules":{"module_blocks":[]},"over_the_edge":[],"secondary_category_name":"Edge Threat Monitor","seo":{"canonical_url":"","meta_description":"Graphic data and analysis of emerging cybersecurity attacks, threats, and trends.","meta_keywords":"","meta_title":"Edge Threat Monitor"},"shown_in_header":true,"slug":"edge-threat-monitor","sponsor_logo":null,"sponsor_text":"Brought to you by","tags":[],"title":"[Edge] Edge Threat Monitor","topic_page_description":"Graphic data and analysis of emerging cybersecurity attacks, threats, and trends.","updated_at":"2022-03-24T17:19:59.274Z","updated_by":"blt9488f204761710b3","_content_type_uid":"dr_category_secondary","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2022-03-24T17:20:08.918Z","user":"blt9488f204761710b3"}}],"seo":{"canonical_url":"","meta_description":"In-Depth feature articles, analysis, and expert expert commentary on cybersecurity trends and best practices","meta_keywords":"","meta_title":"Edge"},"slug":"edge","sponsor_logo":null,"sponsor_text":"","tags":[],"title":"Edge","topic_page_description":"In-Depth feature articles, analysis, and expert commentary on cybersecurity trends and best practices.","updated_at":"2022-02-25T15:46:20.858Z","updated_by":"blt31bd4bcd14669cc0","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2022-02-25T15:46:31.216Z","user":"blt31bd4bcd14669cc0"}},{"_version":9,"locale":"en-us","uid":"blt318dca99b92ea6b7","ACL":{},"_in_progress":false,"branding":{"hub_page_color":"000000","hub_page_description_with_hyperlink":"","hub_page_logo":null,"image_alt_text":""},"created_at":"2021-05-29T07:25:13.674Z","created_by":"blt9a0fc67c46c47dd7","display_options":"Standard View","icon":null,"image_alt_text":"","modules":{"module_blocks":[]},"over_the_edge":[],"secondary_categories":[],"seo":{"canonical_url":"","meta_description":"Breaking news, news analysis, and expert commentary on cybersecurity threats to the cloud as well as coverage of cloud security tools \u0026 technologiesBreaking new","meta_keywords":"","meta_title":"Cloud"},"slug":"cloud","sponsor_logo":null,"sponsor_text":"","tags":[],"title":"Cloud","topic_page_description":"Breaking news, news analysis, and expert commentary on cybersecurity threats to the cloud as well as security tools \u0026 technologies to protect it.","updated_at":"2022-02-25T15:40:37.460Z","updated_by":"blt31bd4bcd14669cc0","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2022-02-25T15:40:48.099Z","user":"blt31bd4bcd14669cc0"}},{"_version":6,"locale":"en-us","uid":"blta1a9507fc4e576e5","ACL":{},"_in_progress":false,"branding":{"hub_page_color":"000000","hub_page_description_with_hyperlink":"","hub_page_logo":null,"image_alt_text":""},"created_at":"2021-05-29T07:25:14.614Z","created_by":"blt9a0fc67c46c47dd7","display_options":"Standard View","icon":null,"image_alt_text":"","modules":{"module_blocks":[]},"over_the_edge":[],"secondary_categories":[],"seo":{"canonical_url":"","meta_description":"Breaking news, news analysis, and expert commentary on cyberattacks and data breaches, as well as tools, technologies, and practices for threat defense","meta_keywords":"","meta_title":"Attacks / Breaches"},"slug":"attacks-breaches","sponsor_logo":null,"sponsor_text":"","tags":[],"title":"Attacks/Breaches","topic_page_description":"Breaking news, news analysis, and expert commentary on cyberattacks and data breaches, as well as the tools, technologies, and practices for defense.","updated_at":"2022-02-25T15:33:04.411Z","updated_by":"bltfcb3d125bf8c49ee","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2022-02-25T15:33:11.389Z","user":"bltfcb3d125bf8c49ee"}},{"_version":4,"locale":"en-us","uid":"bltf294cb1507e8f8f0","ACL":{},"_in_progress":false,"branding":{"hub_page_color":"000000","hub_page_description_with_hyperlink":"","hub_page_logo":null,"image_alt_text":""},"created_at":"2021-05-29T07:25:23.818Z","created_by":"blt9a0fc67c46c47dd7","display_options":"Standard View","icon":null,"image_alt_text":"","modules":{"module_blocks":[]},"over_the_edge":[],"secondary_categories":[],"seo":{"canonical_url":"","meta_description":"Breaking news, news analysis, and expert commentary on cyber threats to mobile devices and the tools \u0026 technologies to protect them.","meta_keywords":"","meta_title":"Mobile"},"slug":"mobile","sponsor_logo":null,"sponsor_text":"","tags":[],"title":"Mobile","topic_page_description":"Breaking news, news analysis, and expert commentary on cyber threats to mobile devices and the tools \u0026 technologies to protect them.","updated_at":"2022-02-23T16:40:39.389Z","updated_by":"bltfcb3d125bf8c49ee","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2022-02-23T16:40:47.486Z","user":"bltfcb3d125bf8c49ee"}},{"_version":23,"locale":"en-us","uid":"blt2ad9c5595f143d37","ACL":{},"_in_progress":false,"branding":{"hub_page_color":"000000","hub_page_description_with_hyperlink":"","hub_page_logo":null,"image_alt_text":""},"created_at":"2021-05-29T07:25:16.736Z","created_by":"blt9a0fc67c46c47dd7","display_options":"Standard View","icon":null,"image_alt_text":"","modules":{"module_blocks":[]},"over_the_edge":[],"secondary_categories":[],"seo":{"canonical_url":"","meta_description":"Breaking news, news analysis, and expert commentary on cybersecurity threats to Internet of Things (IoT) devices, and the tools \u0026 technologies to protect them","meta_keywords":"","meta_title":"IoT"},"slug":"iot","sponsor_logo":null,"sponsor_text":"","tags":[],"title":"IoT","topic_page_description":"Breaking news, news analysis, and expert commentary on cyber threats to Internet of Things (IoT) devices and the tools \u0026 technologies to protect them.","updated_at":"2022-02-23T16:38:34.620Z","updated_by":"bltfcb3d125bf8c49ee","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2022-02-23T16:38:40.328Z","user":"bltfcb3d125bf8c49ee"}},{"_version":4,"locale":"en-us","uid":"blt88fe329e8d35e99f","ACL":{},"_in_progress":false,"branding":{"hub_page_color":"000000","hub_page_description_with_hyperlink":"","hub_page_logo":null,"image_alt_text":""},"created_at":"2021-05-29T07:25:20.552Z","created_by":"blt9a0fc67c46c47dd7","display_options":"Standard View","icon":null,"image_alt_text":"","modules":{"module_blocks":[]},"over_the_edge":[],"secondary_categories":[{"_version":2,"locale":"en-us","uid":"blt038394f2fc302955","ACL":{},"_in_progress":false,"branding":{"hub_page_color":"","hub_page_description":"","hub_page_logo":null},"created_at":"2021-05-29T07:25:41.005Z","created_by":"blt9a0fc67c46c47dd7","display_options":"Standard View","icon":null,"modules":{"module_blocks":[]},"over_the_edge":[],"secondary_category_name":"Authentication","seo":{"canonical_url":"","meta_description":"Authentication","meta_keywords":"","meta_title":"Authentication"},"shown_in_header":true,"slug":"authentication","sponsor_logo":null,"sponsor_text":"","tags":[],"title":"[Endpoint] Authentication","topic_page_description":"","updated_at":"2021-07-15T08:43:26.396Z","updated_by":"blt986fc66e34c7b415","_content_type_uid":"dr_category_secondary","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-07-20T11:44:33.457Z","user":"blta3dd47a38c602549"}},{"_version":2,"locale":"en-us","uid":"blt9f22a744d7b136d6","ACL":{},"_in_progress":false,"branding":{"hub_page_color":"","hub_page_description":"","hub_page_logo":null},"created_at":"2021-05-29T07:25:44.029Z","created_by":"blt9a0fc67c46c47dd7","display_options":"Standard View","icon":null,"modules":{"module_blocks":[]},"over_the_edge":[],"secondary_category_name":"Privacy","seo":{"canonical_url":"","meta_description":"Privacy","meta_keywords":"","meta_title":"Privacy"},"shown_in_header":true,"slug":"privacy","sponsor_logo":null,"sponsor_text":"","tags":[],"title":"[Endpoint] Privacy","topic_page_description":"","updated_at":"2021-07-16T11:18:55.988Z","updated_by":"blta3dd47a38c602549","_content_type_uid":"dr_category_secondary","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-07-20T11:44:57.811Z","user":"blta3dd47a38c602549"}}],"seo":{"canonical_url":"","meta_description":"Breaking news, news analysis, and expert commentary on endpoint security, including tools \u0026 technologies","meta_keywords":"","meta_title":"Endpoint"},"slug":"endpoint","sponsor_logo":null,"sponsor_text":"","tags":[],"title":"Endpoint","topic_page_description":"Breaking news, news analysis, and expert commentary on endpoint security, including tools \u0026 technologies.","updated_at":"2022-02-23T16:36:06.407Z","updated_by":"bltfcb3d125bf8c49ee","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2022-02-23T16:36:30.291Z","user":"bltfcb3d125bf8c49ee"}},{"_version":4,"locale":"en-us","uid":"bltd3cfe11c117abf74","ACL":{},"_in_progress":false,"branding":{"hub_page_logo":null,"image_alt_text":"","hub_page_description_with_hyperlink":"","hub_page_color":""},"created_at":"2022-01-31T10:12:03.498Z","created_by":"bltfcb3d125bf8c49ee","display_options":"Standard View","icon":null,"image_alt_text":"","modules":{"module_blocks":[]},"over_the_edge":[],"secondary_categories":[],"seo":{"meta_title":"","meta_description":"Breaking news, news analysis, and expert commentary on cyber threats targeting remote users and their devices, and the tools \u0026 technologies to protect them.","meta_keywords":"","canonical_url":""},"slug":"remote-workforce","sponsor_logo":null,"sponsor_text":"","tags":[],"title":"Remote Workforce","topic_page_description":"Breaking news, news analysis, and expert commentary on cybersecurity threats that target remote users and their devices and the tools \u0026 technologies to protect them.","updated_at":"2022-02-23T15:58:45.216Z","updated_by":"bltfcb3d125bf8c49ee","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2022-02-23T15:58:50.081Z","user":"bltfcb3d125bf8c49ee"},"_owner":{"uid":"bltfcb3d125bf8c49ee","created_at":"2021-05-21T10:05:50.071Z","updated_at":"2023-02-01T11:16:58.861Z","email":"someone@example.com","username":"-","first_name":"-","last_name":"-","company":"-","org_uid":[],"shared_org_uid":["blt5948195ac13977b0"],"mobile_number":"0000000000","country_code":"00","tfa_status":"-","authy_id":null,"active":true,"metadata":{},"profile_type":"business","failed_attempts":0,"settings":{"preferences":{},"global":[]},"last_login_at":"1900-01-01T00:00:00.000Z"}},{"_version":4,"locale":"en-us","uid":"bltd1eb4d6946b90153","ACL":{},"_in_progress":false,"branding":{"hub_page_color":"000000","hub_page_description_with_hyperlink":"","hub_page_logo":null,"image_alt_text":""},"created_at":"2021-05-29T07:25:27.087Z","created_by":"blt9a0fc67c46c47dd7","display_options":"Standard View","icon":null,"image_alt_text":"","modules":{"module_blocks":[]},"over_the_edge":[],"secondary_categories":[],"seo":{"canonical_url":"","meta_description":"Breaking news, news analysis and expert commentary on cybersecurity careers and industry leaders","meta_keywords":"","meta_title":"Careers \u0026 People"},"slug":"careers-and-people","sponsor_logo":null,"sponsor_text":"","tags":[],"title":"Careers \u0026 People","topic_page_description":"Breaking news, news analysis, and expert commentary on cybersecurity careers and industry leaders.","updated_at":"2022-02-23T15:53:43.785Z","updated_by":"bltfcb3d125bf8c49ee","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2022-02-23T15:54:44.662Z","user":"bltfcb3d125bf8c49ee"}},{"_version":4,"locale":"en-us","uid":"blt153276da84f3050e","ACL":{},"_in_progress":false,"branding":{"hub_page_color":"000000","hub_page_description_with_hyperlink":"","hub_page_logo":null,"image_alt_text":""},"created_at":"2021-05-29T07:25:24.935Z","created_by":"blt9a0fc67c46c47dd7","display_options":"Standard View","icon":null,"image_alt_text":"","modules":{"module_blocks":[]},"over_the_edge":[],"secondary_categories":[{"title":"[App-Sec] Database Security","secondary_category_name":"Database Security","slug":"database-security","shown_in_header":true,"tags":[],"locale":"en-us","ACL":{},"uid":"blt185c79bc5185685f","created_by":"blt9a0fc67c46c47dd7","updated_by":"blta3dd47a38c602549","created_at":"2021-05-29T07:25:42.038Z","updated_at":"2021-07-16T11:21:34.290Z","_content_type_uid":"dr_category_secondary","_version":2,"_in_progress":false,"branding":{"hub_page_color":"","hub_page_description":"","hub_page_logo":null},"display_options":"Standard View","icon":null,"modules":{"module_blocks":[]},"over_the_edge":[],"seo":{"canonical_url":"","meta_description":"Database Security","meta_keywords":"","meta_title":"Database Security"},"sponsor_logo":null,"sponsor_text":"","topic_page_description":"","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-07-20T11:41:13.664Z","user":"blta3dd47a38c602549"}}],"seo":{"canonical_url":"","meta_description":"Breaking news, news analysis, and expert commentary on application security, including tools \u0026 technologies","meta_keywords":"","meta_title":"Application Security"},"slug":"application-security","sponsor_logo":null,"sponsor_text":"","tags":[],"title":"Application Security","topic_page_description":"Breaking news, news analysis, and expert commentary on application security, including tools \u0026 technologies.","updated_at":"2022-02-23T15:22:10.587Z","updated_by":"bltfcb3d125bf8c49ee","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2022-02-23T15:22:20.056Z","user":"bltfcb3d125bf8c49ee"}},{"_version":7,"locale":"en-us","uid":"bltf8dd78a4e0baf1e3","ACL":{},"_in_progress":false,"branding":{"hub_page_color":"000000","hub_page_description_with_hyperlink":"\u003cp\u003e\u003c/p\u003e\n\u003cp\u003e\u003cbr\u003e\u003c/p\u003e\n\u003cp\u003e\u003c/p\u003e","hub_page_logo":null,"image_alt_text":""},"created_at":"2021-05-29T07:25:12.643Z","created_by":"blt9a0fc67c46c47dd7","display_options":"Standard View","icon":null,"image_alt_text":"","modules":{"module_blocks":[]},"over_the_edge":[],"secondary_categories":[{"_version":6,"locale":"en-us","uid":"blt510176d85efe2f04","ACL":{},"_in_progress":false,"branding":{"hub_page_color":"","hub_page_description":"","hub_page_logo":null},"created_at":"2021-05-29T07:25:39.882Z","created_by":"blt9a0fc67c46c47dd7","display_options":"Standard View","icon":null,"modules":{"module_blocks":[]},"over_the_edge":[],"secondary_category_name":"Security Monitoring","seo":{"canonical_url":"","meta_description":"Security Monitoring","meta_keywords":"","meta_title":"Security Monitoring"},"shown_in_header":true,"slug":"security-monitoring","sponsor_logo":null,"sponsor_text":"Sponsor Text","tags":[],"title":"[Analytics] Security Monitoring","topic_page_description":"","updated_at":"2021-07-20T11:46:58.515Z","updated_by":"blta3dd47a38c602549","_content_type_uid":"dr_category_secondary","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-07-20T11:47:01.191Z","user":"blta3dd47a38c602549"}}],"seo":{"canonical_url":"","meta_description":"Breaking news, news analysis, and expert commentary about cybersecurity data analytics, including tools \u0026 technologies","meta_keywords":"analytics,data analytics,security,cybersecurity","meta_title":"Breaking news, news analysis, commentary on security data analytics."},"slug":"analytics","sponsor_logo":null,"sponsor_text":"","tags":[],"title":"Analytics","topic_page_description":"Breaking news, news analysis, and expert commentary about cybersecurity data analytics, including tools \u0026 technologies.","updated_at":"2022-02-23T15:17:04.315Z","updated_by":"bltfcb3d125bf8c49ee","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2022-02-23T15:17:13.080Z","user":"bltfcb3d125bf8c49ee"}},{"_version":26,"locale":"en-us","uid":"blt47ebc4f3a45cfe48","ACL":{},"_in_progress":false,"branding":{"hub_page_color":"000000","image_alt_text":"Omdia Logo","hub_page_description_with_hyperlink":"\u003cp\u003eEnterprise cybersecurity technology\u003c/p\u003e\n\u003cp\u003eresearch that connects the dots \u003cstrong\u003e|\u003c/strong\u003e\u0026nbsp;\u003ca href=\"https://omdia.tech.informa.com/\" target=\"_blank\"\u003eLearn more\u003c/a\u003e\u003c/p\u003e","hub_page_logo":{"uid":"blt41661bfd68149993","created_by":"blt986fc66e34c7b415","updated_by":"blt986fc66e34c7b415","created_at":"2021-09-23T02:34:37.142Z","updated_at":"2021-09-23T02:34:37.142Z","content_type":"image/png","file_size":"9803","filename":"Vector.png","title":"Vector.png","ACL":[],"_version":1,"is_dir":false,"tags":[],"publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-10-25T13:38:23.525Z","user":"blt9488f204761710b3"},"url":"https://eu-images.contentstack.com/v3/assets/blt66983808af36a8ef/blt41661bfd68149993/614be7bd6db99f25817e6c21/Vector.png"}},"created_at":"2021-06-16T21:12:18.733Z","created_by":"blt9488f204761710b3","display_options":"Modular View","icon":null,"image_alt_text":"","modules":{"module_blocks":[{"uid":"blt7ef981a3c49f83e4","_content_type_uid":"dr_module_article_promo"},{"uid":"blt06b0e4fcb74a2904","_content_type_uid":"dr_module_jobs"},{"uid":"bltf0145cf743710573","_content_type_uid":"dr_module_latest_content_grid"},{"uid":"blt74c7a7dbe5919173","_content_type_uid":"dr_module_article_promo"},{"uid":"bltb08e2126c3aea60b","_content_type_uid":"dr_modular_external_link"}]},"over_the_edge":[],"secondary_categories":[],"seo":{"canonical_url":"","meta_description":"","meta_keywords":"","meta_title":""},"slug":"omdia","sponsor_logo":null,"sponsor_text":"","tags":[],"title":"Omdia","topic_page_description":"","updated_at":"2021-12-15T21:17:16.402Z","updated_by":"bltb9dc8193e565cad1","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-12-15T21:17:26.312Z","user":"bltb9dc8193e565cad1"},"_owner":{"uid":"blt9488f204761710b3","created_at":"2021-05-21T10:05:50.071Z","updated_at":"2023-03-23T11:13:46.740Z","email":"someone@example.com","username":"-","first_name":"-","last_name":"-","company":"-","org_uid":[],"shared_org_uid":["blt5948195ac13977b0"],"mobile_number":"0000000000","country_code":"00","tfa_status":"-","authy_id":null,"active":true,"metadata":{},"profile_type":"business","failed_attempts":0,"settings":{"preferences":{},"global":[]},"last_login_at":"1900-01-01T00:00:00.000Z"}}],"smartbox":[{"feed":{"href":"https://smartbox.techweb.com/smartbox/externalsmartbox?site_id=162801002\u0026taxonomy_ids=\u0026num_display=5\u0026article_type=upcoming_webinars\u0026output_type=xml","title":"Webinars","__typename":"Link"},"read_more_link":{"href":"https://www.darkreading.com/upcoming-webinars","title":"More Webinars","__typename":"Link"},"title":"Webinars","type":"Webinars","system":{"publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2022-08-23T19:57:57.348Z","user":"blt9488f204761710b3","__typename":"SystemPublishDetails"},"uid":"blt8f82585c522cc0f5","__typename":"EntrySystemField"},"hidden":false,"ordinal":1,"__typename":"DrSmartbox","articles":[{"title":["Building Out the Best Response Playbook for Ransomware Attacks"],"link":["https://darkreading.tradepub.com/c/pubRD.mpl?secure=1\u0026sr=pp\u0026_t=pp:\u0026qf=w_palo190\u0026ch=sbx\u0026cid=smartbox_techweb_upcoming_webinars_8.500001271\u0026_mc=smartbox_techweb_upcoming_webinars_8.500001271"],"publishDate":["Feb 24, 2023"],"publishedSite":[""],"eventDate":["Mar 28, 2023"],"publishedSiteURL":[""],"description":["When ransomware locks up your business's critical data and essential gear, there is no time to panic. The organization needs answers fast: Is the infection going to spread to other endpoints? Will the attackers publicly dump the stolen information? How good are our backups? What does our insurance provider say? How well the organization weathers the attack will depend on how well the organization prepared the answers in advance. In this webinar, learn what processes and procedures should go into your ransomware response playbook, and learn about the tools and techniques that will help you bounce back from a ransomware infection.\r\nDuring this webinar you will:\r\n--Learn the basic building blocks of a ransomware response playbook.\r\n--Get real-world advice on managing critical communications during ransomware incident response.\r\n--Find out what experts have to say about the role of cyber insurance."]},{"title":["ChatGPT: Defending Your Business Against AI-Supercharged Ransomware"],"link":["https://darkreading.tradepub.com/c/pubRD.mpl?secure=1\u0026sr=pp\u0026_t=pp:\u0026qf=w_defa3936\u0026ch=sbx\u0026cid=smartbox_techweb_upcoming_webinars_8.500001275\u0026_mc=smartbox_techweb_upcoming_webinars_8.500001275"],"publishDate":["Mar 07, 2023"],"publishedSite":[""],"eventDate":["Mar 29, 2023"],"publishedSiteURL":[""],"description":["This webinar will dig into the ways criminals are projected to take advantage of ChatGPT and other AI tools to improve the reach and effectiveness of their ransomware attacks. The session will conclude with a review of a 12-step plan that businesses can use to improve their active defenses as well as their mitigation of and recovery from successful ransomware attacks - both conventional and AI-enabled."]},{"title":["Ten Emerging Vulnerabilities Every Enterprise Should Know"],"link":["https://darkreading.tradepub.com/c/pubRD.mpl?secure=1\u0026sr=pp\u0026_t=pp:\u0026qf=w_defa3791\u0026ch=sbx\u0026cid=smartbox_techweb_upcoming_webinars_8.500001265\u0026_mc=smartbox_techweb_upcoming_webinars_8.500001265"],"publishDate":["Feb 06, 2023"],"publishedSite":[""],"eventDate":["Mar 30, 2023"],"publishedSiteURL":[""],"description":["Every day, black hat attackers and white hat researchers are discovering new security vulnerabilities in widely-used systems and applications that might be exploited to compromise your data. Are you aware of the newest - and potentially most impactful - vulnerabilities that have been discovered/disclosed? In this webinar, top researchers and experts discuss some of the most dangerous emerging vulnerabilities, and what you can do to prevent them from being exploited in your organization."]},{"title":["How Applications Are Attacked: A Year in Application Security"],"link":["https://darkreading.tradepub.com/c/pubRD.mpl?secure=1\u0026sr=pp\u0026_t=pp:\u0026qf=w_clow15\u0026ch=sbx\u0026cid=smartbox_techweb_upcoming_webinars_8.500001276\u0026_mc=smartbox_techweb_upcoming_webinars_8.500001276"],"publishDate":["Mar 10, 2023"],"publishedSite":[""],"eventDate":["Apr 04, 2023"],"publishedSiteURL":[""],"description":["Cloudflare sees up to 61 million requests per second, meaning we have an unprecedented view into Internet trends like application attacks and API traffic, and automated bot activity. We have put that incredible visibility to use by profiling a year of attacks targeting the applications that run business.\r\n\r\nJoin Cloudflare Field CTO Trey Guinn and Product Marketing Director, Dan Gould, as they discusses key attacks that organizational security postures must account for in 2023"]},{"title":["Managing Identity in the Cloud"],"link":["https://darkreading.tradepub.com/c/pubRD.mpl?secure=1\u0026sr=pp\u0026_t=pp:\u0026qf=w_defa3923\u0026ch=sbx\u0026cid=smartbox_techweb_upcoming_webinars_8.500001274\u0026_mc=smartbox_techweb_upcoming_webinars_8.500001274"],"publishDate":["Mar 02, 2023"],"publishedSite":[""],"eventDate":["Apr 05, 2023"],"publishedSiteURL":[""],"description":["Shifting identity management and provisioning to the cloud helps streamline these operations. It also brings a new set of challenges, including integrating and managing user identities, privileges, and other attributes used in various on-premise and cloud systems, especially if your organization is operating in a hybrid model. In this webinar, experts will provide insights and recommendations for harnessing user and machine identities in the cloud and among hybrid environments to ensure more solid security identity for the enterprise."]}]},{"feed":{"href":"https://smartbox.techweb.com/smartbox/externalsmartbox?site_id=162801002\u0026taxonomy_ids=\u0026num_display=\u0026article_type=whitepaper\u0026output_type=xml","title":"White Papers","__typename":"Link"},"read_more_link":{"href":"https://www.informationweek.com/whitepaper/Security","title":"More White Papers","__typename":"Link"},"title":"White Papers","type":"Whitepapers","system":{"publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2022-09-02T13:14:06.993Z","user":"blt9488f204761710b3","__typename":"SystemPublishDetails"},"uid":"blt1192837947494c5f","__typename":"EntrySystemField"},"hidden":false,"ordinal":3,"__typename":"DrSmartbox","articles":[{"title":["Cloud Journey Migration Stage: Adaptive Cloud Security"],"link":["https://www.informationweek.com/whitepaper/cybersecurity/security/cloud-journey-migration-stage-adaptive-cloud-security/443421?cid=smartbox_techweb_whitepaper_14.500005310\u0026_mc=smartbox_techweb_whitepaper_14.500005310"],"publishedSite":[""],"publishedSiteURL":[""]},{"title":["Seven Ways to Avoid the Nightmare of a Cloud Misconfiguration Attack"],"link":["https://www.informationweek.com/whitepaper/cybersecurity/security/seven-ways-to-avoid-the-nightmare-of-a-cloud-misconfiguration-attack/442453?cid=smartbox_techweb_whitepaper_14.500005301\u0026_mc=smartbox_techweb_whitepaper_14.500005301"],"publishedSite":[""],"publishedSiteURL":[""]},{"title":["The Importance Adopting DevSecOps"],"link":["https://www.informationweek.com/whitepaper/cybersecurity/security/the-importance-adopting-devsecops/440653?cid=smartbox_techweb_whitepaper_14.500005299\u0026_mc=smartbox_techweb_whitepaper_14.500005299"],"publishedSite":[""],"publishedSiteURL":[""]},{"title":["Developer-Focused Security from Code to Cloud and Back to Code"],"link":["https://www.informationweek.com/whitepaper/cybersecurity/security/developer-focused-security-from-code-to-cloud-and-back-to-code/440613?cid=smartbox_techweb_whitepaper_14.500005298\u0026_mc=smartbox_techweb_whitepaper_14.500005298"],"publishedSite":[""],"publishedSiteURL":[""]},{"title":["Cloud Incident Response Datasheet"],"link":["https://www.informationweek.com/whitepaper/cloud-security/cybersecurity/idc-the-critical-nature-of-cloud-incident-readiness-and-response/437693?cid=smartbox_techweb_whitepaper_14.500005296\u0026_mc=smartbox_techweb_whitepaper_14.500005296"],"publishedSite":[""],"publishedSiteURL":[""]}]},{"feed":{"href":"https://smartbox.techweb.com/smartbox/externalsmartbox?site_id=162801002\u0026taxonomy_ids=\u0026num_display=5\u0026article_type=analytics\u0026output_type=xml","title":"Reports","__typename":"Link"},"read_more_link":{"href":"/must-reads","title":"More Reports","__typename":"Link"},"title":"Reports","type":"Reports","system":{"publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2022-09-02T13:14:06.971Z","user":"blt9488f204761710b3","__typename":"SystemPublishDetails"},"uid":"blt5145c70334f61d02","__typename":"EntrySystemField"},"hidden":false,"ordinal":1,"__typename":"DrSmartbox","articles":[{"title":["The 10 Most Impactful Types of Vulnerabilities for Enterprises Today"],"link":["https://darkreading.tradepub.com/c/pubRD.mpl?secure=1\u0026sr=pp\u0026_t=pp:\u0026pc=w_defa3977\u0026ch=sbx\u0026cid=smartbox_techweb_analytics_7.300005981\u0026_mc=smartbox_techweb_analytics_7.300005981"],"publishedSite":[""],"publishedSiteURL":[""],"description":["The enterprise attack surface is constantly expanding. Enterprises have to think beyond zero day vulnerabilities. It's imperative security teams start looking at vulnerabilities in 5G, firmware, edge, and ICS/OT, among others.\r\n\r\nManaging system vulnerabilities is one of the old est - and most frustrating - security challenges that enterprise defenders face. Every software application and hardware device ships with intrinsic flaws - flaws that, if critical enough, attackers can exploit from anywhere in the world. It's crucial that defenders take stock of what areas of the tech stack have the most emerging, and critical, vulnerabilities they must manage. It's not just zero day vulnerabilities. Consider that CISA's Known Exploited Vulnerabilities (KEV) catalog lists vulnerabilitlies in widely used applications that are \"actively exploited,\" and most of them are flaws that were discovered several years ago and have been fixed. There are also emerging vulnerabilities in 5G networks, cloud infrastructure, Edge applications, and firmwares to consider. "]},{"title":["Shoring Up the Software Supply Chain Across Enterprise Applications"],"link":["https://darkreading.tradepub.com/c/pubRD.mpl?secure=1\u0026sr=pp\u0026_t=pp:\u0026pc=w_defa3940\u0026ch=sbx\u0026cid=smartbox_techweb_analytics_7.300005980\u0026_mc=smartbox_techweb_analytics_7.300005980"],"publishedSite":[""],"publishedSiteURL":[""],"description":["Supply chain security attacks are growing at an alarming pace, and things are going to keep getting worse until DevSecOps teams get on the same page. A little help from the feds could also be welcome\r\n\r\nModern-day software development depends heavily on third-party components, libraries, and frameworks. Many of these components have their own dependencies, and software owners and project developers may not even know all the different pieces of code that make up their application. With attackers increasingly targeting these software building blocks to compromise enterprise applications, managing and protecting the software supply chain is more important than ever. Software developers and owners have to have visibility in their application, identify the vulnerabilities, and address them in a timely manner.\r\n\r\nIn this report, experts discuss the ever-expanding software attack surface and how to secure the supply chain. "]},{"title":["The Promise and Reality of Cloud Security"],"link":["https://darkreading.tradepub.com/c/pubRD.mpl?secure=1\u0026sr=pp\u0026_t=pp:\u0026pc=w_darl08\u0026ch=sbx\u0026cid=smartbox_techweb_analytics_7.300005973\u0026_mc=smartbox_techweb_analytics_7.300005973"],"publishedSite":[""],"publishedSiteURL":[""],"description":["Cloud security has been part of the cybersecurity conversation for years but has been on the sidelines for most enterprises.\r\n\r\nThe shift to remote work during the COVID-19 pandemic and digital transformation projects have moved cloud infrastructure front-and-center as enterprises address the associated security risks. This report - a compilation of cutting-edge Black Hat research, in-depth Omdia analysis, and comprehensive Dark Reading reporting - explores how cloud security is rapidly evolving."]},{"title":["10 Hot Talks From Black Hat USA 2022"],"link":["https://darkreading.tradepub.com/c/pubRD.mpl?secure=1\u0026sr=pp\u0026_t=pp:\u0026pc=w_defa3521\u0026ch=sbx\u0026cid=smartbox_techweb_analytics_7.300005970\u0026_mc=smartbox_techweb_analytics_7.300005970"],"publishedSite":[""],"publishedSiteURL":[""],"description":["Black Hat USA brings together cutting-edge research, new security tools, and sophisticated defensive techniques over the course of two days.\r\n\r\nThere were some recurring themes across the sessions, and many of these topics are going to be important issues to watch in 2023. This report covers the following topics:\r\n\r\n--Identity and access management\r\n--Container security\r\n--Software supply chain security\r\n--Defensive techniques such as threat hunting\r\n--Workforce Challenges\r\n--Geopolitics\r\n--Role of AI and Machine Learning"]},{"title":["How Machine Learning, AI \u0026 Deep Learning Improve Cybersecurity"],"link":["https://www.informationweek.com/whitepaper/cybersecurity/cloud-security/how-machine-learning,-ai-and-deep-learning-improve-cybersecurity/442433?keycode=sbx\u0026cid=smartbox_techweb_analytics_7.300005958\u0026_mc=smartbox_techweb_analytics_7.300005958"],"publishedSite":[""],"publishedSiteURL":[""]}]},{"feed":{"href":"https://smartbox.techweb.com/smartbox/externalsmartbox?site_id=162801002\u0026taxonomy_ids=\u0026num_display=3\u0026article_type=session\u0026output_type=xml","title":"Events","__typename":"Link"},"read_more_link":{"href":"https://www.darkreading.com/upcoming-events","title":"More Events","__typename":"Link"},"title":"Events","type":"Live Events","system":{"publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-10-19T13:23:56.785Z","user":"blt9488f204761710b3","__typename":"SystemPublishDetails"},"uid":"blt8b6a33909c49602f","__typename":"EntrySystemField"},"hidden":false,"ordinal":2,"__typename":"DrSmartbox","articles":[{"title":["Black Hat USA - August 5-10 - Learn More"],"link":["https://www.blackhat.com?cid=smartbox_techweb_session_16.500287\u0026_mc=smartbox_techweb_session_16.500287"],"publishDate":["Aug 05, 2023"],"publishedSite":[""],"publishedSiteURL":[""]},{"title":["Black Hat Asia - May 9-12 - Learn More"],"link":["https://www.blackhat.com?cid=smartbox_techweb_session_16.500286\u0026_mc=smartbox_techweb_session_16.500286"],"publishDate":["May 09, 2023"],"publishedSite":[""],"publishedSiteURL":[""]}]},{"feed":{"href":"https://smartbox.techweb.com/smartbox/externalsmartbox?site_id=162801002\u0026taxonomy_ids=\u0026num_display=3\u0026article_type=session\u0026output_type=xml","title":"Thao tests smartbox","__typename":"Link"},"read_more_link":{"href":"https://finance.vietstock.vn/TDC-ctcp-kinh-doanh-va-phat-trien-binh-duong.htm","title":"Read more","__typename":"Link"},"title":"Thao test smartbox","type":"Webinars","system":{"publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-10-13T09:32:03.167Z","user":"blta36fe02d0bc9c8a3","__typename":"SystemPublishDetails"},"uid":"blt378d3b273bbe06e9","__typename":"EntrySystemField"},"hidden":false,"ordinal":1,"__typename":"DrSmartbox","articles":[{"title":["Black Hat USA - August 5-10 - Learn More"],"link":["https://www.blackhat.com?cid=smartbox_techweb_session_16.500287\u0026_mc=smartbox_techweb_session_16.500287"],"publishDate":["Aug 05, 2023"],"publishedSite":[""],"publishedSiteURL":[""]},{"title":["Black Hat Asia - May 9-12 - Learn More"],"link":["https://www.blackhat.com?cid=smartbox_techweb_session_16.500286\u0026_mc=smartbox_techweb_session_16.500286"],"publishDate":["May 09, 2023"],"publishedSite":[""],"publishedSiteURL":[""]}]}],"articleSettings":{"_version":94,"locale":"en-us","uid":"blt71c2ca1d1bdca542","ACL":{},"_in_progress":false,"article_display_settings":{"article_template":"two-column"},"created_at":"2021-08-03T04:55:12.335Z","created_by":"blt986fc66e34c7b415","modules":{"module_blocks":[]},"right_hand_rail_configuration":{"right_component":[{"uid":"blt9262b8fd3485b1dc","_content_type_uid":"dr_editor_s_choice"},{"uid":"blt8f82585c522cc0f5","_content_type_uid":"dr_smartbox"},{"uid":"blt5145c70334f61d02","_content_type_uid":"dr_smartbox"},{"uid":"blt1192837947494c5f","_content_type_uid":"dr_smartbox"},{"uid":"blt8b6a33909c49602f","_content_type_uid":"dr_smartbox"}]},"subscribe_to_newsletters":{"message":"Keep up with the latest cybersecurity threats, newly-discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.","open_subscribe_link_on_new_tab":true,"subscribe_link":{"title":"Subscribe","href":"https://darkreading.tradepub.com/c/pubRD.mpl?secure=1\u0026sr=pp\u0026_t=pp:\u0026qf=w_defa3135\u0026ch=dr_eoa"}},"tags":[],"title":"[DR] Settings - Article","updated_at":"2023-01-04T22:24:18.168Z","updated_by":"blt9488f204761710b3","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2023-01-04T22:24:34.257Z","user":"blt9488f204761710b3"}}},"adsPattern":"article/risk","sponsoredContentSettings":{"title":"Sponsored Content Settings","sponsored_content_label":"Sponsored","label_background_color":"ffdc2d","label_text_color":"000","__typename":"DrSponsoredContent"},"slideshowItems":[],"tagManagerSlideArticleArgs":{},"isEdgePage":true,"pageAid":99708,"ptype":"article","listModuleData":[],"pageName":"article","keyword":""}},"__N_SSP":true},"page":"/[category]/[hybidPage]","query":{"category":"risk","hybidPage":"google-chrome-polishes-its-first-security-update"},"buildId":"MRQZLrLBZoMyPCirkHNfy","assetPrefix":"https://beta.darkreading.com","runtimeConfig":{"environment":"dr_production","contentApiUrl":"http://localhost:3000/api"},"isFallback":false,"gssp":true,"scriptLoader":[]}</script><script async="" src="https://securepubads.g.doubleclick.net/tag/js/gpt.js"></script></body></html><script defer src="https://static.cloudflareinsights.com/beacon.min.js/vb26e4fa9e5134444860be286fd8771851679335129114" integrity="sha512-M3hN/6cva/SjwrOtyXeUa5IuCT0sedyfT+jK/OV+s+D0RnzrTfwjwJHhd+wYfMm9HJSrZ1IKksOdddLuN6KOzw==" data-cf-beacon='{"rayId":"7ad8e7823fc07f7e","version":"2023.3.0","b":1,"token":"af0cdaaec56f4ed087ea8bc39ec08d1b","si":100}' crossorigin="anonymous"></script>