informa
Commentary

Google Chrome Polishes Its First Security Update

Last week, Google released its shiny new Chrome browser. However, before the week finished, Google also had to issue a patch for one of security's most common -- and most well-known to developers -- application security issues: a buffer overflow vulnerability that would make it possible for an attacker to completely take over your system.
Last week, Google released its shiny new Chrome browser. However, before the week finished, Google also had to issue a patch for one of security's most common -- and most well-known to developers -- application security issues: a buffer overflow vulnerability that would make it possible for an attacker to completely take over your system.According to this advisory from security firm SVRT-Bkis, they found a critical buffer overflow in Google Chrome that would enable an attacker to take complete control of an unpatched system.

From the advisory:


Type of Issue : Buffer Overflow.

Affected Software : Google Chrome 0.2.149.27.

Exploitation Environment : Google Chrome on Windows XP SP2.

Impact: Remote code execution.

Rating : Critical.

Description : The vulnerability is caused due to a boundary error when handling the "SaveAs" function. On saving a malicious page with an overly long title ( tag in HTML), the program causes a stack-based overflow and makes it possible for attackers to execute arbitrary code on users' systems. <P> How an attacker could exploit the issue : To exploit the Vulnerability, a hacker might construct a specially crafted Web page, which contains malicious code. He then tricks users into visiting his Web site and convinces them to save this Page. Right after that, the code would be executed, giving him the privilege to make use of the affected system. </blockquote> <P> Fortunately, Google promptly fixed the flaw. Just make sure you are running version 0.2.149.29 or higher. You can do that by selecting About, then Update within Chrome, or visiting <a href="http://www.google.com/chrome/">this</a> Google page. <P> I've a suspicion we've many more Google Chrome security-related updates on the way.</p><div class="mb-3"> <div class="informa-dfp-ads" data-name="Native_Ad_native_1v" data-size="fluid" data-targeting="pos=native_1v" ></div> </div></div></div><div id="articleFooter-newsletterSignup" class="newsletter-cta w-100 mt-3"><div class="text">Keep up with the latest cybersecurity threats, newly-discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.</div><a class="subscribe-btn dr-btn" href="https://www.darkreading.com/newsletter-signup/?_mc=dr_eoa" title="Subscribe" target="_blank" rel="noreferrer">Subscribe</a></div><div id="iris-container" class="my-5"></div><div class="bibblio_includes_beacon"></div><div class="bibblio_import_beacon" id="bibblio_catalogue_default"></div><div class="bibblio"><div class="title">Recommended Reading:</div><div class="bibblio_display_beacon" id="bibblio_rcm_footer"></div></div><div class="w-100 d-none d-lg-block"><div class="more-insights mt-2"><div class="title">More Insights</div><div class="container"><div class="row"><div id="articleFooter-moreInsights-" class="smartbox col-md-4"><div class="smartbox-title">White Papers</div><ul class="feed"><li class="feed-item"><div class="bullet-container square"><img class="icon-bullet square" src="https://beta.darkreading.com/icons/square-bullet.svg" alt="White Papers" height="8" width="8"/><img class="icon-bullet-on-hover square" src="https://beta.darkreading.com/icons/square-bullet-on-hover.svg" alt="White Papers" height="8" width="8"/></div><a target="_blank" rel="noreferrer" href="https://www.informationweek.com/whitepaper/cybersecurity/security-monitoring/2021-ransomware-threat-report/432943?cid=smartbox_techweb_whitepaper_14.500004727&_mc=smartbox_techweb_whitepaper_14.500004727">2021 Ransomware Threat Report</a></li><li class="feed-item"><div class="bullet-container square"><img class="icon-bullet square" src="https://beta.darkreading.com/icons/square-bullet.svg" alt="White Papers" height="8" width="8"/><img class="icon-bullet-on-hover square" src="https://beta.darkreading.com/icons/square-bullet-on-hover.svg" alt="White Papers" height="8" width="8"/></div><a target="_blank" rel="noreferrer" href="https://www.informationweek.com/whitepaper/cloud-security/cybersecurity/2021-cyberthreat-defense-report/429393?cid=smartbox_techweb_whitepaper_14.500004710&_mc=smartbox_techweb_whitepaper_14.500004710">2021 Cyberthreat Defense Report</a></li></ul><div class="readmore-link"><a target="_blank" rel="noreferrer" href="https://www.informationweek.com/whitepaper/Security">More White Papers</a></div></div><div id="articleFooter-moreInsights-" class="smartbox col-md-4"><div class="smartbox-title">Webinars</div><ul class="feed"><li class="feed-item"><div class="bullet-container square"><img class="icon-bullet square" src="https://beta.darkreading.com/icons/square-bullet.svg" alt="Webinars" height="8" width="8"/><img class="icon-bullet-on-hover square" src="https://beta.darkreading.com/icons/square-bullet-on-hover.svg" alt="Webinars" height="8" width="8"/></div><a target="_blank" rel="noreferrer" href="https://webinar.darkreading.com/930906?keycode=sbx&cid=smartbox_techweb_webcast_8.500001115&_mc=smartbox_techweb_webcast_8.500001115">Cybersecurity Forecast 2022: Snowpocalypse or cloudy with a chance of rain?</a></li><li class="feed-item"><div class="bullet-container square"><img class="icon-bullet square" src="https://beta.darkreading.com/icons/square-bullet.svg" alt="Webinars" height="8" width="8"/><img class="icon-bullet-on-hover square" src="https://beta.darkreading.com/icons/square-bullet-on-hover.svg" alt="Webinars" height="8" width="8"/></div><a target="_blank" rel="noreferrer" href="https://webinar.darkreading.com/951852?keycode=sbx&cid=smartbox_techweb_webcast_8.500001114&_mc=smartbox_techweb_webcast_8.500001114">Preventing Attackers from Navigating Your Enterprise Systems</a></li></ul><div class="readmore-link"><a target="_blank" rel="noreferrer" href="https://www.darkreading.com/upcoming-webinars">More Webinars</a></div></div><div id="articleFooter-moreInsights-" class="smartbox col-md-4"><div class="smartbox-title">Reports</div><ul class="feed"><li class="feed-item"><div class="bullet-container square"><img class="icon-bullet square" src="https://beta.darkreading.com/icons/square-bullet.svg" alt="Reports" height="8" width="8"/><img class="icon-bullet-on-hover square" src="https://beta.darkreading.com/icons/square-bullet-on-hover.svg" alt="Reports" height="8" width="8"/></div><a target="_blank" rel="noreferrer" href="https://www.informationweek.com/whitepaper/cybersecurity/security-monitoring/10-hot-talks-from-black-hat-usa-2021/431873?cid=smartbox_techweb_analytics_7.300005915&_mc=smartbox_techweb_analytics_7.300005915">10 Hot Talks From Black Hat USA 2021</a></li><li class="feed-item"><div class="bullet-container square"><img class="icon-bullet square" src="https://beta.darkreading.com/icons/square-bullet.svg" alt="Reports" height="8" width="8"/><img class="icon-bullet-on-hover square" src="https://beta.darkreading.com/icons/square-bullet-on-hover.svg" alt="Reports" height="8" width="8"/></div><a target="_blank" rel="noreferrer" href="https://www.informationweek.com/whitepaper/risk-management-security/security-monitoring/enterprise-cybersecurity-plans-in-a-post-pandemic-world/430493?cid=smartbox_techweb_analytics_7.300005913&_mc=smartbox_techweb_analytics_7.300005913">Enterprise Cybersecurity Plans in a Post-Pandemic World</a></li></ul><div class="readmore-link"><a target="_blank" rel="noreferrer" href="https://www.darkreading.com/archives.asp?section_id=315">More Reports</a></div></div></div></div></div></div><div class="w-100 d-lg-block"><div class="informa-dfp-ads" data-name="Native_Ad_insight_1v" data-size="fluid" data-targeting="pos=nativeinsight_1v"></div></div></div><div class="col-lg-4"><div class="d-flex w-100 justify-content-center align-items-center flex-column"><div class="informa-dfp-ads add-border-bottom add-pb" data-size="5*5,300*250,300*600" data-name="TAP_Native_Ad_300_1v" data-targeting="pos=300_1v" data-mapping="1119*0=300*600,300*250,5*5|0*0=5*5,320*250"></div><div class="informa-dfp-ads add-border-bottom add-pb" data-name="Right_300x250_Rectangle_300_2v" data-size="300*250,300*600" data-targeting="pos=300_2v"></div></div><div class="right-hand-rail-wrap"><div id="rhc-editorsChoice" class="right-hand-rail-first editor-choice"><div class="editor-choice-title">Editors' Choice</div><div class="editor-choice-article"><a href="https://www.darkreading.com/endpoint/is-xdr-overhyped-" title="Is XDR Overhyped?" class="d-flex align-items-center justify-content-center"><div class="lazyload-wrapper "><div style="height:75px" class="lazyload-placeholder"></div></div></a><div class="info pl-3"><div class="title"><a href="https://www.darkreading.com/endpoint/is-xdr-overhyped-">Is XDR Overhyped?</a></div><div class="author">Ericka Chickowski, Contributing Writer</div></div></div><div class="editor-choice-article"><a href="https://www.darkreading.com/attacks-breaches/us-indicts-iranian-nationals-for-cyber-enabled-election-interference" title="US Indicts Iranian Nationals for Cyber-Enabled Election Interference" class="d-flex align-items-center justify-content-center"><div class="lazyload-wrapper "><div style="height:75px" class="lazyload-placeholder"></div></div></a><div class="info pl-3"><div class="title"><a href="https://www.darkreading.com/attacks-breaches/us-indicts-iranian-nationals-for-cyber-enabled-election-interference">US Indicts Iranian Nationals for Cyber-Enabled Election Interference</a></div><div class="author">Jai Vijayan, Contributing Writer</div></div></div><div class="editor-choice-article"><a href="https://www.darkreading.com/vulnerabilities-threats/zero-trust-an-answer-to-the-ransomware-menace-" title="Zero Trust: An Answer to the Ransomware Menace?" class="d-flex align-items-center justify-content-center"><div class="lazyload-wrapper "><div style="height:75px" class="lazyload-placeholder"></div></div></a><div class="info pl-3"><div class="title"><a href="https://www.darkreading.com/vulnerabilities-threats/zero-trust-an-answer-to-the-ransomware-menace-">Zero Trust: An Answer to the Ransomware Menace?</a></div><div class="author">Steve Durbin, CEO of the Information Security Forum</div></div></div><div class="editor-choice-article"><a href="https://www.darkreading.com/vulnerabilities-threats/-perswaysion-phishing-campaign-continues-to-be-an-active-threat-for-organizations" title="'PerSwaysion' Phishing Campaign Still Ongoing, and Pervasive" class="d-flex align-items-center justify-content-center"><div class="lazyload-wrapper "><div style="height:75px" class="lazyload-placeholder"></div></div></a><div class="info pl-3"><div class="title"><a href="https://www.darkreading.com/vulnerabilities-threats/-perswaysion-phishing-campaign-continues-to-be-an-active-threat-for-organizations">'PerSwaysion' Phishing Campaign Still Ongoing, and Pervasive</a></div><div class="author">Jai Vijayan, Contributing Writer</div></div></div></div><div id="rhc-webinars" class="smartbox " type="Webinars"><div class="smartbox-title">Webinars</div><ul class="feed"><li class="feed-item"><svg width="20" height="18" fill="none" xmlns="http://www.w3.org/2000/svg" class="feed-item-icon"><path d="M19.803 14.639a.807.807 0 00-.088-.156l-1.822-2.52a.775.775 0 00-.628-.323H3.516V3.2c0-.882.701-1.6 1.563-1.6h9.842c.862 0 1.563.718 1.563 1.6v5.2c0 .442.35.8.781.8a.79.79 0 00.781-.8V3.2c0-1.764-1.402-3.2-3.125-3.2H5.08C3.356 0 1.954 1.436 1.954 3.2v8.976L.285 14.483a.805.805 0 00-.088.156 2.442 2.442 0 00.186 2.275A2.323 2.323 0 002.344 18h15.312c.793 0 1.526-.406 1.96-1.086.435-.68.505-1.53.187-2.275zm-1.494 1.399a.764.764 0 01-.654.362h-4.92a.79.79 0 00-.782-.8H8.047a.79.79 0 00-.781.8H2.344a.764.764 0 01-.653-.362.801.801 0 01-.089-.688l1.527-2.11H16.87l1.527 2.11a.801.801 0 01-.089.688zM6.308 8.81a.814.814 0 00.03 1.131.769.769 0 001.105-.031 3.396 3.396 0 012.519-1.112H10c.962 0 1.856.395 2.518 1.112a.77.77 0 001.104.031.814.814 0 00.031-1.13 5.033 5.033 0 00-1.509-1.118c.393-.496.63-1.127.63-1.813C12.773 4.292 11.511 3 9.96 3 8.41 3 7.149 4.292 7.149 5.88c0 .693.24 1.33.64 1.827-.552.27-1.056.642-1.481 1.103zM9.96 4.6c.69 0 1.25.574 1.25 1.28 0 .706-.56 1.28-1.25 1.28s-1.25-.574-1.25-1.28c0-.706.56-1.28 1.25-1.28z" fill="#494949"></path></svg><a target="_blank" rel="noreferrer" href="https://webinar.darkreading.com/930906?keycode=sbx&cid=smartbox_techweb_webcast_8.500001115&_mc=smartbox_techweb_webcast_8.500001115">Cybersecurity Forecast 2022: Snowpocalypse or cloudy with a chance of rain?</a></li><li class="feed-item"><svg width="20" height="18" fill="none" xmlns="http://www.w3.org/2000/svg" class="feed-item-icon"><path d="M19.803 14.639a.807.807 0 00-.088-.156l-1.822-2.52a.775.775 0 00-.628-.323H3.516V3.2c0-.882.701-1.6 1.563-1.6h9.842c.862 0 1.563.718 1.563 1.6v5.2c0 .442.35.8.781.8a.79.79 0 00.781-.8V3.2c0-1.764-1.402-3.2-3.125-3.2H5.08C3.356 0 1.954 1.436 1.954 3.2v8.976L.285 14.483a.805.805 0 00-.088.156 2.442 2.442 0 00.186 2.275A2.323 2.323 0 002.344 18h15.312c.793 0 1.526-.406 1.96-1.086.435-.68.505-1.53.187-2.275zm-1.494 1.399a.764.764 0 01-.654.362h-4.92a.79.79 0 00-.782-.8H8.047a.79.79 0 00-.781.8H2.344a.764.764 0 01-.653-.362.801.801 0 01-.089-.688l1.527-2.11H16.87l1.527 2.11a.801.801 0 01-.089.688zM6.308 8.81a.814.814 0 00.03 1.131.769.769 0 001.105-.031 3.396 3.396 0 012.519-1.112H10c.962 0 1.856.395 2.518 1.112a.77.77 0 001.104.031.814.814 0 00.031-1.13 5.033 5.033 0 00-1.509-1.118c.393-.496.63-1.127.63-1.813C12.773 4.292 11.511 3 9.96 3 8.41 3 7.149 4.292 7.149 5.88c0 .693.24 1.33.64 1.827-.552.27-1.056.642-1.481 1.103zM9.96 4.6c.69 0 1.25.574 1.25 1.28 0 .706-.56 1.28-1.25 1.28s-1.25-.574-1.25-1.28c0-.706.56-1.28 1.25-1.28z" fill="#494949"></path></svg><a target="_blank" rel="noreferrer" href="https://webinar.darkreading.com/951852?keycode=sbx&cid=smartbox_techweb_webcast_8.500001114&_mc=smartbox_techweb_webcast_8.500001114">Preventing Attackers from Navigating Your Enterprise Systems</a></li><li class="feed-item"><svg width="20" height="18" fill="none" xmlns="http://www.w3.org/2000/svg" class="feed-item-icon"><path d="M19.803 14.639a.807.807 0 00-.088-.156l-1.822-2.52a.775.775 0 00-.628-.323H3.516V3.2c0-.882.701-1.6 1.563-1.6h9.842c.862 0 1.563.718 1.563 1.6v5.2c0 .442.35.8.781.8a.79.79 0 00.781-.8V3.2c0-1.764-1.402-3.2-3.125-3.2H5.08C3.356 0 1.954 1.436 1.954 3.2v8.976L.285 14.483a.805.805 0 00-.088.156 2.442 2.442 0 00.186 2.275A2.323 2.323 0 002.344 18h15.312c.793 0 1.526-.406 1.96-1.086.435-.68.505-1.53.187-2.275zm-1.494 1.399a.764.764 0 01-.654.362h-4.92a.79.79 0 00-.782-.8H8.047a.79.79 0 00-.781.8H2.344a.764.764 0 01-.653-.362.801.801 0 01-.089-.688l1.527-2.11H16.87l1.527 2.11a.801.801 0 01-.089.688zM6.308 8.81a.814.814 0 00.03 1.131.769.769 0 001.105-.031 3.396 3.396 0 012.519-1.112H10c.962 0 1.856.395 2.518 1.112a.77.77 0 001.104.031.814.814 0 00.031-1.13 5.033 5.033 0 00-1.509-1.118c.393-.496.63-1.127.63-1.813C12.773 4.292 11.511 3 9.96 3 8.41 3 7.149 4.292 7.149 5.88c0 .693.24 1.33.64 1.827-.552.27-1.056.642-1.481 1.103zM9.96 4.6c.69 0 1.25.574 1.25 1.28 0 .706-.56 1.28-1.25 1.28s-1.25-.574-1.25-1.28c0-.706.56-1.28 1.25-1.28z" fill="#494949"></path></svg><a target="_blank" rel="noreferrer" href="https://webinar.darkreading.com/945057?keycode=sbx&cid=smartbox_techweb_webcast_8.500001107&_mc=smartbox_techweb_webcast_8.500001107">Protecting Enterprise Data from Malicious Insiders</a></li><li class="feed-item"><svg width="20" height="18" fill="none" xmlns="http://www.w3.org/2000/svg" class="feed-item-icon"><path d="M19.803 14.639a.807.807 0 00-.088-.156l-1.822-2.52a.775.775 0 00-.628-.323H3.516V3.2c0-.882.701-1.6 1.563-1.6h9.842c.862 0 1.563.718 1.563 1.6v5.2c0 .442.35.8.781.8a.79.79 0 00.781-.8V3.2c0-1.764-1.402-3.2-3.125-3.2H5.08C3.356 0 1.954 1.436 1.954 3.2v8.976L.285 14.483a.805.805 0 00-.088.156 2.442 2.442 0 00.186 2.275A2.323 2.323 0 002.344 18h15.312c.793 0 1.526-.406 1.96-1.086.435-.68.505-1.53.187-2.275zm-1.494 1.399a.764.764 0 01-.654.362h-4.92a.79.79 0 00-.782-.8H8.047a.79.79 0 00-.781.8H2.344a.764.764 0 01-.653-.362.801.801 0 01-.089-.688l1.527-2.11H16.87l1.527 2.11a.801.801 0 01-.089.688zM6.308 8.81a.814.814 0 00.03 1.131.769.769 0 001.105-.031 3.396 3.396 0 012.519-1.112H10c.962 0 1.856.395 2.518 1.112a.77.77 0 001.104.031.814.814 0 00.031-1.13 5.033 5.033 0 00-1.509-1.118c.393-.496.63-1.127.63-1.813C12.773 4.292 11.511 3 9.96 3 8.41 3 7.149 4.292 7.149 5.88c0 .693.24 1.33.64 1.827-.552.27-1.056.642-1.481 1.103zM9.96 4.6c.69 0 1.25.574 1.25 1.28 0 .706-.56 1.28-1.25 1.28s-1.25-.574-1.25-1.28c0-.706.56-1.28 1.25-1.28z" fill="#494949"></path></svg><a target="_blank" rel="noreferrer" href="https://webinar.darkreading.com/950051?keycode=sbx&cid=smartbox_techweb_webcast_8.500001105&_mc=smartbox_techweb_webcast_8.500001105">Beyond Patch Management: Next-Generation Approaches to Finding and Fixing Vulnerable Code</a></li><li class="feed-item"><svg width="20" height="18" fill="none" xmlns="http://www.w3.org/2000/svg" class="feed-item-icon"><path d="M19.803 14.639a.807.807 0 00-.088-.156l-1.822-2.52a.775.775 0 00-.628-.323H3.516V3.2c0-.882.701-1.6 1.563-1.6h9.842c.862 0 1.563.718 1.563 1.6v5.2c0 .442.35.8.781.8a.79.79 0 00.781-.8V3.2c0-1.764-1.402-3.2-3.125-3.2H5.08C3.356 0 1.954 1.436 1.954 3.2v8.976L.285 14.483a.805.805 0 00-.088.156 2.442 2.442 0 00.186 2.275A2.323 2.323 0 002.344 18h15.312c.793 0 1.526-.406 1.96-1.086.435-.68.505-1.53.187-2.275zm-1.494 1.399a.764.764 0 01-.654.362h-4.92a.79.79 0 00-.782-.8H8.047a.79.79 0 00-.781.8H2.344a.764.764 0 01-.653-.362.801.801 0 01-.089-.688l1.527-2.11H16.87l1.527 2.11a.801.801 0 01-.089.688zM6.308 8.81a.814.814 0 00.03 1.131.769.769 0 001.105-.031 3.396 3.396 0 012.519-1.112H10c.962 0 1.856.395 2.518 1.112a.77.77 0 001.104.031.814.814 0 00.031-1.13 5.033 5.033 0 00-1.509-1.118c.393-.496.63-1.127.63-1.813C12.773 4.292 11.511 3 9.96 3 8.41 3 7.149 4.292 7.149 5.88c0 .693.24 1.33.64 1.827-.552.27-1.056.642-1.481 1.103zM9.96 4.6c.69 0 1.25.574 1.25 1.28 0 .706-.56 1.28-1.25 1.28s-1.25-.574-1.25-1.28c0-.706.56-1.28 1.25-1.28z" fill="#494949"></path></svg><a target="_blank" rel="noreferrer" href="https://webinar.informationweek.com/5876?keycode=sbx&cid=smartbox_techweb_webcast_8.500000934&_mc=smartbox_techweb_webcast_8.500000934">The ROI Story: Identifying & Justifying Disruptive Technology</a></li></ul><div class="readmore-link"><a target="_blank" rel="noreferrer" href="https://www.darkreading.com/upcoming-webinars">More Webinars</a></div></div><div id="rhc-whitePapers" class="smartbox " type="Whitepapers"><div class="smartbox-title">White Papers</div><ul class="feed"><li class="feed-item"><svg width="24" height="24" fill="none" xmlns="http://www.w3.org/2000/svg" class="feed-item-icon"><g clip-path="url(#whitepaper_svg__clip0)" fill="#494949"><path d="M19.997 18H6.666a.669.669 0 00-.67.669V20a.669.669 0 11-1.33 0V4a.669.669 0 01.662-.669h11.338a.669.669 0 01.662.669v12a.669.669 0 001.331 0V4a2 2 0 00-1.993-2H5.328a2 2 0 00-2 2v16a2 2 0 004 0v-.669h12V20a.669.669 0 01-.669.669h-10a.668.668 0 100 1.331h10a2 2 0 002-2v-1.331a.669.669 0 00-.662-.669z"></path><path d="M13.996 7H10.67a.668.668 0 110-1.331h3.325a.67.67 0 110 1.33zM13.996 11.375H10.67a.669.669 0 010-1.331h3.325a.67.67 0 010 1.331zM13.996 15.681H10.67a.67.67 0 110-1.331h3.325a.668.668 0 110 1.331zM8.003 7a.669.669 0 11.251-.049.669.669 0 01-.258.05h.007zM8.003 11.375a.669.669 0 11.251-.049.67.67 0 01-.258.05h.007zM8.003 15.681a.669.669 0 11.251-.049.666.666 0 01-.258.05h.007z"></path></g><defs><clipPath id="whitepaper_svg__clip0"><path fill="#fff" transform="translate(1.996 2)" d="M0 0h20v20H0z"></path></clipPath></defs></svg><a target="_blank" rel="noreferrer" href="https://www.informationweek.com/whitepaper/cybersecurity/security-monitoring/2021-ransomware-threat-report/432943?cid=smartbox_techweb_whitepaper_14.500004727&_mc=smartbox_techweb_whitepaper_14.500004727">2021 Ransomware Threat Report</a></li><li class="feed-item"><svg width="24" height="24" fill="none" xmlns="http://www.w3.org/2000/svg" class="feed-item-icon"><g clip-path="url(#whitepaper_svg__clip0)" fill="#494949"><path d="M19.997 18H6.666a.669.669 0 00-.67.669V20a.669.669 0 11-1.33 0V4a.669.669 0 01.662-.669h11.338a.669.669 0 01.662.669v12a.669.669 0 001.331 0V4a2 2 0 00-1.993-2H5.328a2 2 0 00-2 2v16a2 2 0 004 0v-.669h12V20a.669.669 0 01-.669.669h-10a.668.668 0 100 1.331h10a2 2 0 002-2v-1.331a.669.669 0 00-.662-.669z"></path><path d="M13.996 7H10.67a.668.668 0 110-1.331h3.325a.67.67 0 110 1.33zM13.996 11.375H10.67a.669.669 0 010-1.331h3.325a.67.67 0 010 1.331zM13.996 15.681H10.67a.67.67 0 110-1.331h3.325a.668.668 0 110 1.331zM8.003 7a.669.669 0 11.251-.049.669.669 0 01-.258.05h.007zM8.003 11.375a.669.669 0 11.251-.049.67.67 0 01-.258.05h.007zM8.003 15.681a.669.669 0 11.251-.049.666.666 0 01-.258.05h.007z"></path></g><defs><clipPath id="whitepaper_svg__clip0"><path fill="#fff" transform="translate(1.996 2)" d="M0 0h20v20H0z"></path></clipPath></defs></svg><a target="_blank" rel="noreferrer" href="https://www.informationweek.com/whitepaper/cloud-security/cybersecurity/2021-cyberthreat-defense-report/429393?cid=smartbox_techweb_whitepaper_14.500004710&_mc=smartbox_techweb_whitepaper_14.500004710">2021 Cyberthreat Defense Report</a></li><li class="feed-item"><svg width="24" height="24" fill="none" xmlns="http://www.w3.org/2000/svg" class="feed-item-icon"><g clip-path="url(#whitepaper_svg__clip0)" fill="#494949"><path d="M19.997 18H6.666a.669.669 0 00-.67.669V20a.669.669 0 11-1.33 0V4a.669.669 0 01.662-.669h11.338a.669.669 0 01.662.669v12a.669.669 0 001.331 0V4a2 2 0 00-1.993-2H5.328a2 2 0 00-2 2v16a2 2 0 004 0v-.669h12V20a.669.669 0 01-.669.669h-10a.668.668 0 100 1.331h10a2 2 0 002-2v-1.331a.669.669 0 00-.662-.669z"></path><path d="M13.996 7H10.67a.668.668 0 110-1.331h3.325a.67.67 0 110 1.33zM13.996 11.375H10.67a.669.669 0 010-1.331h3.325a.67.67 0 010 1.331zM13.996 15.681H10.67a.67.67 0 110-1.331h3.325a.668.668 0 110 1.331zM8.003 7a.669.669 0 11.251-.049.669.669 0 01-.258.05h.007zM8.003 11.375a.669.669 0 11.251-.049.67.67 0 01-.258.05h.007zM8.003 15.681a.669.669 0 11.251-.049.666.666 0 01-.258.05h.007z"></path></g><defs><clipPath id="whitepaper_svg__clip0"><path fill="#fff" transform="translate(1.996 2)" d="M0 0h20v20H0z"></path></clipPath></defs></svg><a target="_blank" rel="noreferrer" href="https://www.informationweek.com/whitepaper/cloud-infrastructure/cybersecurity/defending-critical-infrastructure-against-ransomware/432973?cid=smartbox_techweb_whitepaper_14.500004729&_mc=smartbox_techweb_whitepaper_14.500004729">Defending Critical Infrastructure Against Ransomware</a></li><li class="feed-item"><svg width="24" height="24" fill="none" xmlns="http://www.w3.org/2000/svg" class="feed-item-icon"><g clip-path="url(#whitepaper_svg__clip0)" fill="#494949"><path d="M19.997 18H6.666a.669.669 0 00-.67.669V20a.669.669 0 11-1.33 0V4a.669.669 0 01.662-.669h11.338a.669.669 0 01.662.669v12a.669.669 0 001.331 0V4a2 2 0 00-1.993-2H5.328a2 2 0 00-2 2v16a2 2 0 004 0v-.669h12V20a.669.669 0 01-.669.669h-10a.668.668 0 100 1.331h10a2 2 0 002-2v-1.331a.669.669 0 00-.662-.669z"></path><path d="M13.996 7H10.67a.668.668 0 110-1.331h3.325a.67.67 0 110 1.33zM13.996 11.375H10.67a.669.669 0 010-1.331h3.325a.67.67 0 010 1.331zM13.996 15.681H10.67a.67.67 0 110-1.331h3.325a.668.668 0 110 1.331zM8.003 7a.669.669 0 11.251-.049.669.669 0 01-.258.05h.007zM8.003 11.375a.669.669 0 11.251-.049.67.67 0 01-.258.05h.007zM8.003 15.681a.669.669 0 11.251-.049.666.666 0 01-.258.05h.007z"></path></g><defs><clipPath id="whitepaper_svg__clip0"><path fill="#fff" transform="translate(1.996 2)" d="M0 0h20v20H0z"></path></clipPath></defs></svg><a target="_blank" rel="noreferrer" href="https://www.informationweek.com/whitepaper/cybersecurity/network-and-perimeter-security/simple-solutions-for-continuous-visibility-to-active-directory-exposures-and-live-attacks-/431143?cid=smartbox_techweb_whitepaper_14.500004716&_mc=smartbox_techweb_whitepaper_14.500004716">Simple Solutions for Continuous Visibility to Active Directory Exposures & Live Attacks</a></li><li class="feed-item"><svg width="24" height="24" fill="none" xmlns="http://www.w3.org/2000/svg" class="feed-item-icon"><g clip-path="url(#whitepaper_svg__clip0)" fill="#494949"><path d="M19.997 18H6.666a.669.669 0 00-.67.669V20a.669.669 0 11-1.33 0V4a.669.669 0 01.662-.669h11.338a.669.669 0 01.662.669v12a.669.669 0 001.331 0V4a2 2 0 00-1.993-2H5.328a2 2 0 00-2 2v16a2 2 0 004 0v-.669h12V20a.669.669 0 01-.669.669h-10a.668.668 0 100 1.331h10a2 2 0 002-2v-1.331a.669.669 0 00-.662-.669z"></path><path d="M13.996 7H10.67a.668.668 0 110-1.331h3.325a.67.67 0 110 1.33zM13.996 11.375H10.67a.669.669 0 010-1.331h3.325a.67.67 0 010 1.331zM13.996 15.681H10.67a.67.67 0 110-1.331h3.325a.668.668 0 110 1.331zM8.003 7a.669.669 0 11.251-.049.669.669 0 01-.258.05h.007zM8.003 11.375a.669.669 0 11.251-.049.67.67 0 01-.258.05h.007zM8.003 15.681a.669.669 0 11.251-.049.666.666 0 01-.258.05h.007z"></path></g><defs><clipPath id="whitepaper_svg__clip0"><path fill="#fff" transform="translate(1.996 2)" d="M0 0h20v20H0z"></path></clipPath></defs></svg><a target="_blank" rel="noreferrer" href="https://www.informationweek.com/whitepaper/cybersecurity/cloud-services/4-steps-to-achieving-comprehensive-kubernetes-security/424343?cid=smartbox_techweb_whitepaper_14.500004681&_mc=smartbox_techweb_whitepaper_14.500004681">4 Steps to Achieving Comprehensive Kubernetes Security</a></li></ul><div class="readmore-link"><a target="_blank" rel="noreferrer" href="https://www.informationweek.com/whitepaper/Security">More White Papers</a></div></div><div id="rhc-events" class="smartbox " type="Live Events"><div class="smartbox-title">Events</div><ul class="feed"><li class="feed-item"><svg width="20" height="20" fill="none" xmlns="http://www.w3.org/2000/svg" class="feed-item-icon"><path d="M7.376.79c0-.436.354-.79.79-.79h8.312a2.354 2.354 0 012.351 2.351v6.82h.38a.791.791 0 010 1.58h-7.765a.791.791 0 010-1.58h5.805V2.35a.772.772 0 00-.771-.77H8.166a.791.791 0 01-.79-.79zM.79 12.117c.436 0 .79-.354.79-.79V7.776c0-.425.346-.771.771-.771h3.067c.247 0 .477.117.622.315l1.582 3.009a.785.785 0 00.466.387.785.785 0 00.603-.056.793.793 0 00.33-1.067L7.416 6.541a.785.785 0 00-.041-.07 2.357 2.357 0 00-1.902-1.047H2.351a2.354 2.354 0 00-2.35 2.352v3.55c0 .437.354.791.79.791zm.771-9.766A2.354 2.354 0 013.912 0a2.354 2.354 0 012.351 2.351 2.354 2.354 0 01-2.35 2.351 2.354 2.354 0 01-2.352-2.35zm1.58 0a.772.772 0 001.542 0 .772.772 0 00-1.542 0zm16.83 16.073A1.306 1.306 0 0118.696 20H1.305a1.306 1.306 0 01-1.277-1.574 3.848 3.848 0 011.809-2.522 2.337 2.337 0 01-.393-1.3 2.354 2.354 0 012.351-2.35 2.354 2.354 0 012.351 2.35c0 .481-.145.928-.393 1.3a3.824 3.824 0 011.145 1.034 3.847 3.847 0 011.144-1.034 2.338 2.338 0 01-.393-1.3A2.354 2.354 0 0110 12.255a2.354 2.354 0 012.351 2.35c0 .481-.145.928-.393 1.3a3.805 3.805 0 011.144 1.034 3.841 3.841 0 011.144-1.034 2.337 2.337 0 01-.392-1.3 2.354 2.354 0 012.35-2.35 2.354 2.354 0 012.352 2.35 2.353 2.353 0 01-2.31 2.351l-.02.001h-.042c-.944 0-1.78.599-2.104 1.464h4.346a.792.792 0 01.604-.606.083.083 0 01.007-.001h.001a.794.794 0 01.934.61zm-4.537-3.82a.772.772 0 001.542 0 .772.772 0 00-1.542 0zm-12.41 0a.772.772 0 001.542 0 .772.772 0 00-1.542 0zm2.897 3.815a2.258 2.258 0 00-2.105-1.463h-.041c-.944 0-1.782.599-2.105 1.463h4.25zm3.308-3.814a.772.772 0 001.542 0 .772.772 0 00-1.542 0zm2.896 3.814a2.258 2.258 0 00-2.105-1.463h-.04c-.944 0-1.781.599-2.105 1.463h4.25z" fill="#494949"></path></svg><a target="_blank" rel="noreferrer" href="https://vts.informaengage.com/cybersecurity_outlook_2022/?keycode=sbx&cid=smartbox_techweb_session_16.500259&_mc=smartbox_techweb_session_16.500259">Cybersecurity Outlook 2022 - December 8 Virtual Event</a></li></ul><div class="readmore-link"><a target="_blank" rel="noreferrer" href="https://www.darkreading.com/upcoming-events">More Events</a></div></div></div><div class="w-100 d-lg-none mt-4"><div class="more-insights mt-2"><div class="title">More Insights</div><div class="container"><div class="row"><div id="articleFooter-moreInsights-" class="smartbox col-md-4"><div class="smartbox-title">White Papers</div><ul class="feed"><li class="feed-item"><div class="bullet-container square"><img class="icon-bullet square" src="https://beta.darkreading.com/icons/square-bullet.svg" alt="White Papers" height="8" width="8"/><img class="icon-bullet-on-hover square" src="https://beta.darkreading.com/icons/square-bullet-on-hover.svg" alt="White Papers" height="8" width="8"/></div><a target="_blank" rel="noreferrer" href="https://www.informationweek.com/whitepaper/cybersecurity/security-monitoring/2021-ransomware-threat-report/432943?cid=smartbox_techweb_whitepaper_14.500004727&_mc=smartbox_techweb_whitepaper_14.500004727">2021 Ransomware Threat Report</a></li><li class="feed-item"><div class="bullet-container square"><img class="icon-bullet square" src="https://beta.darkreading.com/icons/square-bullet.svg" alt="White Papers" height="8" width="8"/><img class="icon-bullet-on-hover square" src="https://beta.darkreading.com/icons/square-bullet-on-hover.svg" alt="White Papers" height="8" width="8"/></div><a target="_blank" rel="noreferrer" href="https://www.informationweek.com/whitepaper/cloud-security/cybersecurity/2021-cyberthreat-defense-report/429393?cid=smartbox_techweb_whitepaper_14.500004710&_mc=smartbox_techweb_whitepaper_14.500004710">2021 Cyberthreat Defense Report</a></li></ul><div class="readmore-link"><a target="_blank" rel="noreferrer" href="https://www.informationweek.com/whitepaper/Security">More White Papers</a></div></div><div id="articleFooter-moreInsights-" class="smartbox col-md-4"><div class="smartbox-title">Webinars</div><ul class="feed"><li class="feed-item"><div class="bullet-container square"><img class="icon-bullet square" src="https://beta.darkreading.com/icons/square-bullet.svg" alt="Webinars" height="8" width="8"/><img class="icon-bullet-on-hover square" src="https://beta.darkreading.com/icons/square-bullet-on-hover.svg" alt="Webinars" height="8" width="8"/></div><a target="_blank" rel="noreferrer" href="https://webinar.darkreading.com/930906?keycode=sbx&cid=smartbox_techweb_webcast_8.500001115&_mc=smartbox_techweb_webcast_8.500001115">Cybersecurity Forecast 2022: Snowpocalypse or cloudy with a chance of rain?</a></li><li class="feed-item"><div class="bullet-container square"><img class="icon-bullet square" src="https://beta.darkreading.com/icons/square-bullet.svg" alt="Webinars" height="8" width="8"/><img class="icon-bullet-on-hover square" src="https://beta.darkreading.com/icons/square-bullet-on-hover.svg" alt="Webinars" height="8" width="8"/></div><a target="_blank" rel="noreferrer" href="https://webinar.darkreading.com/951852?keycode=sbx&cid=smartbox_techweb_webcast_8.500001114&_mc=smartbox_techweb_webcast_8.500001114">Preventing Attackers from Navigating Your Enterprise Systems</a></li></ul><div class="readmore-link"><a target="_blank" rel="noreferrer" href="https://www.darkreading.com/upcoming-webinars">More Webinars</a></div></div><div id="articleFooter-moreInsights-" class="smartbox col-md-4"><div class="smartbox-title">Reports</div><ul class="feed"><li class="feed-item"><div class="bullet-container square"><img class="icon-bullet square" src="https://beta.darkreading.com/icons/square-bullet.svg" alt="Reports" height="8" width="8"/><img class="icon-bullet-on-hover square" src="https://beta.darkreading.com/icons/square-bullet-on-hover.svg" alt="Reports" height="8" width="8"/></div><a target="_blank" rel="noreferrer" href="https://www.informationweek.com/whitepaper/cybersecurity/security-monitoring/10-hot-talks-from-black-hat-usa-2021/431873?cid=smartbox_techweb_analytics_7.300005915&_mc=smartbox_techweb_analytics_7.300005915">10 Hot Talks From Black Hat USA 2021</a></li><li class="feed-item"><div class="bullet-container square"><img class="icon-bullet square" src="https://beta.darkreading.com/icons/square-bullet.svg" alt="Reports" height="8" width="8"/><img class="icon-bullet-on-hover square" src="https://beta.darkreading.com/icons/square-bullet-on-hover.svg" alt="Reports" height="8" width="8"/></div><a target="_blank" rel="noreferrer" href="https://www.informationweek.com/whitepaper/risk-management-security/security-monitoring/enterprise-cybersecurity-plans-in-a-post-pandemic-world/430493?cid=smartbox_techweb_analytics_7.300005913&_mc=smartbox_techweb_analytics_7.300005913">Enterprise Cybersecurity Plans in a Post-Pandemic World</a></li></ul><div class="readmore-link"><a target="_blank" rel="noreferrer" href="https://www.darkreading.com/archives.asp?section_id=315">More Reports</a></div></div></div></div></div></div></div></div></div></main><footer><div class="container"><div class="row"><div class="col-lg-5"><h4 class="f-nav-title">Discover More From Informa Tech</h4><div class="nav-2-col"><ul class="nav-2-col-ul-left"><li><a href="https://www.interop.com/" rel="noreferrer" target="_blank">Interop</a></li><li><a href="https://www.informationweek.com/" rel="noreferrer" target="_blank">InformationWeek</a></li><li><a href="https://www.networkcomputing.com/" rel="noreferrer" target="_blank">Network Computing</a></li><li><a href="https://www.itprotoday.com/" rel="noreferrer" target="_blank">ITPro Today</a></li></ul><ul class="nav-2-col-ul-right"><li><a href="https://www.datacenterknowledge.com/" rel="noreferrer" target="_blank">Data Center Knowledge</a></li><li><a href="https://www.blackhat.com/" rel="noreferrer" target="_blank">Black Hat</a></li><li><a href="http://www.omdia.com/" rel="noreferrer" target="_blank">Omdia</a></li></ul></div></div><div class="col-lg-3"><h4 class="f-nav-title">Working With Us</h4><ul class="nav-2-col-ul-left"><li><a href="https://www.darkreading.com/about-us" rel="noreferrer" target="_blank">About Us</a></li><li><a href="https://www.darkreading.com/advertise" rel="noreferrer" target="_blank">Advertise</a></li><li><a href="https://info.wrightsmedia.com/informa-licensing-reprints-request" rel="noreferrer" target="_blank">Reprints</a></li></ul></div><div class="col-lg-4"><h4 class="f-nav-title f-nav-social-networks text-lg-left">Follow Dark Reading On Social</h4><div class="f-social-networks"><ul class="d-flex justify-content-lg-start w-100"><li class="social-icon-wrap"><a href="https://www.darkreading.com/rss.xml" rel="noreferrer" target="_blank" title="Rss"><i class="fas fa-rss"></i></a></li><li class="social-icon-wrap"><a href="https://twitter.com/DarkReading" rel="noreferrer" target="_blank" title="Twitter"><i class="fab fa-twitter"></i></a></li><li class="social-icon-wrap"><a href="https://www.linkedin.com/company/dark-reading/" rel="noreferrer" target="_blank" title="Linkedin"><i class="fab fa-linkedin-in"></i></a></li><li class="social-icon-wrap"><a href="https://www.facebook.com/darkreadingcom" rel="noreferrer" target="_blank" title="Facebook"><i class="fab fa-facebook-f"></i></a></li></ul></div></div></div><div class="row"><div class="w-100"><div class="f-hr"></div></div></div><div class="row"><div class="col-md-12 b-f-wrap "><div class="f-logo-wrap d-flex justify-content-between align-items-center"><div class="f-logo"><div class="lazyload-wrapper "><div style="height:200px" class="lazyload-placeholder"></div></div></div><div class="f-h-nav"><ul class="nav-horizontal d-flex"><li><a href="https://tech.informa.com/" rel="noreferrer" target="_blank">Home</a></li><li><a href="https://tech.informa.com/cookie-policy" rel="noreferrer" target="_blank">Cookies</a></li><li><a href="https://tech.informa.com/privacy-policy" rel="noreferrer" target="_blank">Privacy</a></li><li><a href="https://tech.informa.com/terms-and-conditions" rel="noreferrer" target="_blank">Terms</a></li></ul></div></div></div></div><div class="row"><div class="w-100"><div class="f-hr"></div></div></div><div class="row"><div class="col-md-12 b-f-wrap"><div class="f-logo-wrap d-flex justify-content-between align-items-center"><div class="f-logo o-hidden d-none d-sm-block"><img src="https://eu-images.contentstack.com/v3/assets/blt66983808af36a8ef/blt3edeb23396a4b5dc/60b1ea7a9afdef577986633e/Whitelogo_1.png" alt="Logo"/></div><div class="copyright-wrap"><p>Copyright © <!-- -->2021<!-- --> <!-- -->Informa PLC Informa UK Limited is a company registered in England and Wales with company number 1072954 whose registered office is 5 Howick Place, London, SW1P 1WG.</p></div></div></div></div></div></footer></div></div></div><script id="__NEXT_DATA__" type="application/json">{"props":{"pageProps":{"data":{"typeOfSlug":"articlePost","result":{"_version":2,"locale":"en-us","uid":"bltb8b51aa64bdcf847","ACL":{},"_in_progress":false,"article_label":[{"_version":2,"locale":"en-us","uid":"blt610cb37ce61b4a29","ACL":{},"_in_progress":false,"article_label_page_description":"","created_at":"2021-05-29T07:27:37.247Z","created_by":"blt9a0fc67c46c47dd7","label":"Commentary","seo":{"canonical_url":"","meta_description":"","meta_keywords":"","meta_title":""},"tags":[],"title":"Commentary","updated_at":"2021-09-12T15:45:51.152Z","updated_by":"blt871c9fa65adba4f6","url":"/commentary","_content_type_uid":"dr_article_label","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-09-14T10:07:22.582Z","user":"blt986fc66e34c7b415"}}],"author_page":[{"_content_type_uid":"dr_author","_version":4,"locale":"en-us","uid":"blt4affc35d13fd5dcf","_in_progress":false,"author_description":"An award winning writer and journalist, for more than 20 years George Hulme has written about business, technology, and IT security topics. He currently freelances for a wide range of publications, and is security blogger at InformationWeek.com.","author_email":"george@georgehulme.com","author_name":"George V. Hulme","author_role":"Contributor","created_at":"2021-06-24T07:19:49.732Z","created_by":"blt5ee151557599d2cd","portrait":{"uid":"blt1294f16114f9d036","created_at":"2021-06-24T07:19:49.286Z","updated_at":"2021-06-24T07:19:49.286Z","created_by":"blt5ee151557599d2cd","updated_by":"blt5ee151557599d2cd","content_type":"image/jpeg","file_size":"6449","tags":[],"filename":"Hulme-IWK-125x125.jpg","url":"https://eu-images.contentstack.com/v3/assets/blt66983808af36a8ef/blt1294f16114f9d036/60d43215e1461d39eb814e70/Hulme-IWK-125x125.jpg","ACL":[],"is_dir":false,"parent_uid":"blt60b58d3e4f06fc5f","_version":1,"title":"Hulme-IWK-125x125.jpg","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-09-22T04:14:19.227Z","user":"blt5ee151557599d2cd"}},"title":"George V. Hulme","updated_at":"2021-06-26T01:00:33.732Z","updated_by":"blt5ee151557599d2cd","url":"/author/george-v-hulme","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-09-22T04:14:17.230Z","user":"blt5ee151557599d2cd"}}],"body":"Last week, Google released its shiny new Chrome browser. However, before the week finished, Google also had to issue a patch for one of security's most common -- and most well-known to developers -- application security issues: a buffer overflow vulnerability that would make it possible for an attacker to completely take over your system.According to this \u003ca href=\"http://security.bkis.vn/?p=119\"\u003eadvisory\u003c/a\u003e from security firm SVRT-Bkis, they found a critical buffer overflow in Google Chrome that would enable an attacker to take complete control of an unpatched system. \r\n\u003cP\u003e\r\nFrom the advisory:\r\n\u003cP\u003e\r\n\u003cblockquote\u003eType of Issue : Buffer Overflow.\r\n\u003cP\u003e\r\nAffected Software : Google Chrome 0.2.149.27.\r\n\u003cP\u003e\r\nExploitation Environment : Google Chrome on Windows XP SP2.\r\n\u003cP\u003e\r\nImpact: Remote code execution.\r\n\u003cP\u003e\r\nRating : Critical.\r\n\u003cP\u003e\r\nDescription :\r\nThe vulnerability is caused due to a boundary error when handling the \"SaveAs\" function. On saving a malicious page with an overly long title (\u003ctitle\u003e tag in HTML), the program causes a stack-based overflow and makes it possible for attackers to execute arbitrary code on users' systems.\r\n\u003cP\u003e\r\nHow an attacker could exploit the issue :\r\nTo exploit the Vulnerability, a hacker might construct a specially crafted Web page, which contains malicious code. He then tricks users into visiting his Web site and convinces them to save this Page. Right after that, the code would be executed, giving him the privilege to make use of the affected system.\r\n\u003c/blockquote\u003e\r\n\u003cP\u003e\r\nFortunately, Google promptly fixed the flaw. Just make sure you are running version 0.2.149.29 or higher. You can do that by selecting About, then Update within Chrome, or visiting \u003ca href=\"http://www.google.com/chrome/\"\u003ethis\u003c/a\u003e Google page.\r\n\u003cP\u003e\r\nI've a suspicion we've many more Google Chrome security-related updates on the way.\r\n","byline":null,"created_at":"2021-06-28T07:34:08.528Z","created_by":"blt5ee151557599d2cd","featured_image":null,"featured_image_caption":null,"featured_image_credit":null,"keywords":[],"old_url":"/risk-management/google-chrome-polishes-its-first-security-update/d/d-id/1071754","published_date":"2008-09-08T19:26:05-05:00","seo":{"meta_keywords":"","canonical_url":null,"meta_description":"Last week, Google released its shiny new Chrome browser. However, before the week finished, Google also had to issue a patch for one of security's most common -","meta_title":"Google Chrome Polishes Its First Security Update"},"summary":"Last week, Google released its shiny new Chrome browser. However, before the week finished, Google also had to issue a patch for one of security's most common -- and most well-known to developers -- application security issues: a buffer overflow vulnerability that would make it possible for an attacker to completely take over your system.","tags":[],"term_selector":{"primaryTerm":"risk","primaryTermInRealText":"Risk","primaryCategoryBelonged":"risk"},"title":"Google Chrome Polishes Its First Security Update","updated_at":"2021-09-10T09:34:58.066Z","updated_by":"blt5ee151557599d2cd","url":"/google-chrome-polishes-its-first-security-update","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-09-10T09:34:59.747Z","user":"blt5ee151557599d2cd"},"pageType":"article","bodyText":"Last week, Google released its shiny new Chrome browser. However, before the week finished, Google also had to issue a patch for one of security's most common -- and most well-known to developers -- application security issues: a buffer overflow vulnerability that would make it possible for an attacker to completely take over your system.According to this advisory from security firm SVRT-Bkis, they found a critical buffer overflow in Google Chrome that would enable an attacker to take complete control of an unpatched system. \r \r From the advisory:\r \r Type of Issue : Buffer Overflow.\r \r Affected Software : Google Chrome 0.2.149.27.\r \r Exploitation Environment : Google Chrome on Windows XP SP2.\r \r Impact: Remote code execution.\r \r Rating : Critical.\r \r Description :\r The vulnerability is caused due to a boundary error when handling the \"SaveAs\" function. On saving a malicious page with an overly long title ( tag in HTML), the program causes a stack-based overflow and makes it possible for attackers to execute arbitrary code on users' systems.\r \r How an attacker could exploit the issue :\r To exploit the Vulnerability, a hacker might construct a specially crafted Web page, which contains malicious code. He then tricks users into visiting his Web site and convinces them to save this Page. Right after that, the code would be executed, giving him the privilege to make use of the affected system.\r \r \r Fortunately, Google promptly fixed the flaw. Just make sure you are running version 0.2.149.29 or higher. You can do that by selecting About, then Update within Chrome, or visiting this Google page.\r \r I've a suspicion we've many more Google Chrome security-related updates on the way."},"seo":{"meta_keywords":"","canonical_url":"https://www.darkreading.com/risk/google-chrome-polishes-its-first-security-update","meta_description":"Last week, Google released its shiny new Chrome browser. However, before the week finished, Google also had to issue a patch for one of security's most common -","meta_title":"Google Chrome Polishes Its First Security Update","meta_zephr-tags":"DR-pageType-article, DR-pagePrimaryCategory-risk, DR-contentLabel-commentary, DR-pageIsSponsored-false"},"slug":"google-chrome-polishes-its-first-security-update","term":{"slug":"risk","display_options":"Standard View","topic_page_description":"","title":"Risk","system":{"uid":"blt7095e7265cf0f380","__typename":"EntrySystemField"},"seo":{"canonical_url":"","meta_description":"Risk","meta_keywords":"","meta_title":"Risk","__typename":"Seo"},"secondary_categoriesConnection":{"totalCount":1,"edges":[{"node":{"title":"[Risk] Compliance","secondary_category_name":"Compliance","slug":"compliance","display_options":"Standard View","topic_page_description":"","system":{"uid":"blt9d07d0a4c0d8cb54","__typename":"EntrySystemField"},"shown_in_header":true,"seo":{"meta_description":"Compliance","canonical_url":"","meta_keywords":"","meta_title":"Compliance","__typename":"Seo"},"sponsor_text":"","sponsor_logoConnection":{"edges":[],"__typename":"SysAssetConnection"},"image_alt_text":null,"branding":{"hub_page_color":"","hub_page_description_with_hyperlink":null,"image_alt_text":null,"hub_page_logoConnection":{"edges":[],"totalCount":0,"__typename":"SysAssetConnection"},"__typename":"DrCategorySecondaryBranding"},"__typename":"DrCategorySecondary"},"__typename":"DrPrimaryCategorySecondaryCategoriesEdge"}],"__typename":"DrPrimaryCategorySecondaryCategoriesConnection"},"sponsor_logoConnection":{"edges":[],"__typename":"SysAssetConnection"},"sponsor_text":"","image_alt_text":null,"branding":{"hub_page_color":"000000","hub_page_description_with_hyperlink":null,"image_alt_text":null,"hub_page_logoConnection":{"totalCount":0,"edges":[],"__typename":"SysAssetConnection"},"__typename":"DrPrimaryCategoryBranding","hub_page_logo":{}},"__typename":"DrPrimaryCategory","term_related":["compliance","risk"],"term_selector":{"primaryTerm":"risk","primaryCategoryBelonged":"risk","primaryTermInRealText":"Risk"},"pagePrimaryCategory":"risk","uid":"blt7095e7265cf0f380","fullSlug":"risk","secondary_categories":[],"sponsor_logo":{},"icon":{},"term_type":"primary","isFound":true,"all_terms":["dr-tech","the-cyber-future","emerging-tech","tech-talks","tech-trends","omdia","edge","edge-articles","edge-ask-the-experts","edge-slideshows","edge-threat-monitor","iot","vulnerabilities-threats","advanced-threats","insider-threats","vulnerability-management","careers-and-people","mobile","perimeter","application-security","database-security","cloud","analytics","security-monitoring","attacks-breaches","risk","compliance","physical-security","threat-intelligence","operations","identity-and-access-management","endpoint","authentication","privacy","security-now","black-hat"]},"isEdge":true,"primaryCategory":"risk","smartbox":[{"title":"Reports","ordinal":null,"type":"Reports","hidden":true,"feed":{"title":"Reports","href":"http://smartbox.techweb.com/smartbox/externalsmartbox?site_id=162801002\u0026taxonomy_ids=\u0026num_display=10\u0026article_type=analytics\u0026output_type=xml","__typename":"Link"},"read_more_link":{"title":"More Reports","href":"https://www.darkreading.com/archives.asp?section_id=315","__typename":"Link"},"system":{"uid":"blt5145c70334f61d02","__typename":"EntrySystemField"},"__typename":"DrSmartbox","articles":[{"title":["10 Hot Talks From Black Hat USA 2021"],"link":["https://www.informationweek.com/whitepaper/cybersecurity/security-monitoring/10-hot-talks-from-black-hat-usa-2021/431873?cid=smartbox_techweb_analytics_7.300005915\u0026_mc=smartbox_techweb_analytics_7.300005915"],"publishedSite":[""],"publishedSiteURL":[""]},{"title":["Enterprise Cybersecurity Plans in a Post-Pandemic World"],"link":["https://www.informationweek.com/whitepaper/risk-management-security/security-monitoring/enterprise-cybersecurity-plans-in-a-post-pandemic-world/430493?cid=smartbox_techweb_analytics_7.300005913\u0026_mc=smartbox_techweb_analytics_7.300005913"],"publishedSite":[""],"publishedSiteURL":[""],"description":["As the COVID-19 pandemic eases, IT security threats and the challenges involved in responding to them are trending upward. Security leaders expect that cyberattacks like ransomware, phishing, and malware will increase even as the pandemic eventually recedes.\r\n\r\nDownload the Dark Reading and Omdia Research Report Enterprise Cybersecurity Plans in a Post-Pandemic World to understand how security leaders are maintaining pace with pandemic-related challenges, and where there is room for improvement."]},{"title":["The State of Malware Threats"],"link":["https://www.informationweek.com/whitepaper/cybersecurity/risk-management-security/the-state-of-malware-threats/428693?cid=smartbox_techweb_analytics_7.300005894\u0026_mc=smartbox_techweb_analytics_7.300005894"],"publishedSite":[""],"publishedSiteURL":[""]},{"title":["How Enterprises are Attacking the Cybersecurity Problem"],"link":["https://www.informationweek.com/whitepaper/cybersecurity/security-monitoring/how-enterprises-are-attacking-the-cybersecurity-problem/432103?cid=smartbox_techweb_analytics_7.300005916\u0026_mc=smartbox_techweb_analytics_7.300005916"],"publishedSite":[""],"publishedSiteURL":[""],"description":["Concerns over supply chain vulnerabilities and attack visibility drove some significant changes in enterprise cybersecurity strategies over the past year. Dark Reading's 2021 Strategic Security Survey showed that many organizations are staying the course regarding the use of a mix of attack prevention and threat detection technologies and practices for dealing with cyber threats. "]},{"title":["State of DevOps 2021"],"link":["https://www.informationweek.com/whitepaper/application-acceleration/enterprise/state-of-devops-2021/429973?cid=smartbox_techweb_analytics_7.300005911\u0026_mc=smartbox_techweb_analytics_7.300005911"],"publishedSite":[""],"publishedSiteURL":[""],"description":["The chaos of the pandemic and increasing cyberattacks meant that organizations put some DevOps adoption plans on hold temporarily. However, teams that had already embraced the approach saw efficiency and application improvements. Find out more today!"]},{"title":["Incident Readiness and Building Response Playbook"],"link":["https://www.informationweek.com/whitepaper/cybersecurity/security-monitoring/incident-readiness-and-building-response-playbook/429723?cid=smartbox_techweb_analytics_7.300005908\u0026_mc=smartbox_techweb_analytics_7.300005908"],"publishedSite":[""],"publishedSiteURL":[""]},{"title":["Defending Against Critical Threats"],"link":["https://www.informationweek.com/whitepaper/cybersecurity/endpoint-security/defending-against-critical-threats/429033?cid=smartbox_techweb_analytics_7.300005906\u0026_mc=smartbox_techweb_analytics_7.300005906"],"publishedSite":[""],"publishedSiteURL":[""]},{"title":["Increased Cooperation Between Access Brokers, Ransomware Operators Reviewed"],"link":["https://www.informationweek.com/whitepaper/cybersecurity/risk-management-security/increased-cooperation-between-access-brokers,-ransomware-operators-reviewed/429153?cid=smartbox_techweb_analytics_7.300005903\u0026_mc=smartbox_techweb_analytics_7.300005903"],"publishedSite":[""],"publishedSiteURL":[""]},{"title":["Intel 471 Breach Report"],"link":["https://www.informationweek.com/whitepaper/cybersecurity/risk-management-security/intel-471-breach-report/429143?cid=smartbox_techweb_analytics_7.300005902\u0026_mc=smartbox_techweb_analytics_7.300005902"],"publishedSite":[""],"publishedSiteURL":[""]},{"title":["CVE Weaponization Report"],"link":["https://www.informationweek.com/whitepaper/cybersecurity/risk-management-security/cve-weaponization-report/429173?cid=smartbox_techweb_analytics_7.300005901\u0026_mc=smartbox_techweb_analytics_7.300005901"],"publishedSite":[""],"publishedSiteURL":[""]}]},{"title":"Webinars","ordinal":1,"type":"Webinars","hidden":false,"feed":{"title":"Webinars","href":"https://smartbox.techweb.com/smartbox/externalsmartbox?site_id=162801002\u0026taxonomy_ids=\u0026num_display=5\u0026article_type=webcast\u0026output_type=xml","__typename":"Link"},"read_more_link":{"title":"More Webinars","href":"https://www.darkreading.com/upcoming-webinars","__typename":"Link"},"system":{"uid":"blt8f82585c522cc0f5","__typename":"EntrySystemField"},"__typename":"DrSmartbox","articles":[{"title":["Cybersecurity Forecast 2022: Snowpocalypse or cloudy with a chance of rain?"],"link":["https://webinar.darkreading.com/930906?keycode=sbx\u0026cid=smartbox_techweb_webcast_8.500001115\u0026_mc=smartbox_techweb_webcast_8.500001115"],"publishedSite":[""],"eventDate":["Dec 09, 2021"],"publishedSiteURL":[""],"description":["Does the year ahead hold significant promise for IT and Security teams, or does the upheaval caused by COVID-19 and the spike in cyberattacks continue well into 2022? As threat actors continue to evolve, what should security teams look out for and how should security executives prepare to ensure their organization doesn't become the subject of the next news headline? Please join Qualys CISO, Ben Carr and Director of Malware Threat Research, Travis Smith for a discussion covering emerging trends."]},{"title":["Preventing Attackers from Navigating Your Enterprise Systems"],"link":["https://webinar.darkreading.com/951852?keycode=sbx\u0026cid=smartbox_techweb_webcast_8.500001114\u0026_mc=smartbox_techweb_webcast_8.500001114"],"publishedSite":[""],"eventDate":["Dec 15, 2021"],"publishedSiteURL":[""],"description":["Over the past few years, cyber attackers have favored exploits in which they steal a legitimate user's credentials and then navigate enterprise defenses as a trusted end user. This \"lateral movement\" enables the attacker to quickly gain access to a wide variety of applications and data, and can lead to a major data breach. In this webinar, experts discuss methods for recognizing anomalous and unauthorized behavior among trusted users, and how to prevent those \"users\" from gaining access to critical information. You'll also learn how to limit trusted users from accessing systems or gaining privileges that their roles don't require them to have."]},{"title":["Protecting Enterprise Data from Malicious Insiders"],"link":["https://webinar.darkreading.com/945057?keycode=sbx\u0026cid=smartbox_techweb_webcast_8.500001107\u0026_mc=smartbox_techweb_webcast_8.500001107"],"publishedSite":[""],"eventDate":["Dec 14, 2021"],"publishedSiteURL":[""],"description":["It's a sad truth: not all employees are nice. Corporate espionage, sabotage and other security incidents could be committed or aided by any insider with something to gain. How do you know when a once-trustworthy employee is about to do something malicious? How can you identify anomalous behavior among your users? Most of all, how can you prevent employees from taking cyber actions that might hurt your enterprise's business? In this webinar, experts discuss methods for detecting and mitigating malicious insider threats, and for preventing users from using their trusted positions to threaten your data."]},{"title":["Beyond Patch Management: Next-Generation Approaches to Finding and Fixing Vulnerable Code"],"link":["https://webinar.darkreading.com/950051?keycode=sbx\u0026cid=smartbox_techweb_webcast_8.500001105\u0026_mc=smartbox_techweb_webcast_8.500001105"],"publishedSite":[""],"eventDate":["Dec 07, 2021"],"publishedSiteURL":[""],"description":["A good patch management process can help make your enterprise data more secure. But what does it do for vulnerabilities that haven't been patched? Attackers are increasingly manipulating open-source, third-party components in software -- do you have a process to find and repair those bugs? In this webinar, top experts will update you on the latest critical applications vulnerabilities and provide advice on how you can scan, detect, and remediate new vulns on an ongoing basis."]},{"title":["The ROI Story: Identifying \u0026 Justifying Disruptive Technology"],"link":["https://webinar.informationweek.com/5876?keycode=sbx\u0026cid=smartbox_techweb_webcast_8.500000934\u0026_mc=smartbox_techweb_webcast_8.500000934"],"publishedSite":[""],"eventDate":["Mar 25, 2020"],"publishedSiteURL":[""],"description":["This webinar will assist anyone interested in how to use financial analysis as a framework to optimize strategic decision-making."]}]},{"title":"Thao test smartbox","ordinal":1,"type":"Webinars","hidden":false,"feed":{"title":"Thao tests smartbox","href":"https://smartbox.techweb.com/smartbox/externalsmartbox?site_id=162801002\u0026taxonomy_ids=\u0026num_display=3\u0026article_type=session\u0026output_type=xml","__typename":"Link"},"read_more_link":{"title":"Read more","href":"https://finance.vietstock.vn/TDC-ctcp-kinh-doanh-va-phat-trien-binh-duong.htm","__typename":"Link"},"system":{"uid":"blt378d3b273bbe06e9","__typename":"EntrySystemField"},"__typename":"DrSmartbox","articles":[{"title":["Cybersecurity Outlook 2022 - December 8 Virtual Event"],"link":["https://vts.informaengage.com/cybersecurity_outlook_2022/?keycode=sbx\u0026cid=smartbox_techweb_session_16.500259\u0026_mc=smartbox_techweb_session_16.500259"],"publishDate":["Dec 08, 2021"],"publishedSite":[""],"publishedSiteURL":[""],"description":["Join Black Hat, Dark Reading and Omdia at this free, all-day virtual event offering expert insight on the cyber-threats and trends enterprises will face in the coming year.\r\n\r\nOn December 8, Cybersecurity Outlook 2022 will look at some of the new threats posed by online attackers, as well as evolving products and technologies that may mitigate those threats. You'll hear from some of the cybersecurity industry's top thinkers, as well as researchers who have been studying the next wave of cyber vulnerabilities and exploits."]}]},{"title":"Events","ordinal":2,"type":"Live Events","hidden":false,"feed":{"title":"Events","href":"https://smartbox.techweb.com/smartbox/externalsmartbox?site_id=162801002\u0026taxonomy_ids=\u0026num_display=3\u0026article_type=session\u0026output_type=xml","__typename":"Link"},"read_more_link":{"title":"More Events","href":"https://www.darkreading.com/upcoming-events","__typename":"Link"},"system":{"uid":"blt8b6a33909c49602f","__typename":"EntrySystemField"},"__typename":"DrSmartbox","articles":[{"title":["Cybersecurity Outlook 2022 - December 8 Virtual Event"],"link":["https://vts.informaengage.com/cybersecurity_outlook_2022/?keycode=sbx\u0026cid=smartbox_techweb_session_16.500259\u0026_mc=smartbox_techweb_session_16.500259"],"publishDate":["Dec 08, 2021"],"publishedSite":[""],"publishedSiteURL":[""],"description":["Join Black Hat, Dark Reading and Omdia at this free, all-day virtual event offering expert insight on the cyber-threats and trends enterprises will face in the coming year.\r\n\r\nOn December 8, Cybersecurity Outlook 2022 will look at some of the new threats posed by online attackers, as well as evolving products and technologies that may mitigate those threats. You'll hear from some of the cybersecurity industry's top thinkers, as well as researchers who have been studying the next wave of cyber vulnerabilities and exploits."]}]},{"title":"White Papers","ordinal":3,"type":"Whitepapers","hidden":false,"feed":{"title":"White Papers","href":"http://smartbox.techweb.com/smartbox/externalsmartbox?site_id=162801002\u0026taxonomy_ids=\u0026num_display=\u0026article_type=whitepaper\u0026output_type=xml","__typename":"Link"},"read_more_link":{"title":"More White Papers","href":"https://www.informationweek.com/whitepaper/Security","__typename":"Link"},"system":{"uid":"blt1192837947494c5f","__typename":"EntrySystemField"},"__typename":"DrSmartbox","articles":[{"title":["2021 Ransomware Threat Report"],"link":["https://www.informationweek.com/whitepaper/cybersecurity/security-monitoring/2021-ransomware-threat-report/432943?cid=smartbox_techweb_whitepaper_14.500004727\u0026_mc=smartbox_techweb_whitepaper_14.500004727"],"publishedSite":[""],"publishedSiteURL":[""]},{"title":["2021 Cyberthreat Defense Report"],"link":["https://www.informationweek.com/whitepaper/cloud-security/cybersecurity/2021-cyberthreat-defense-report/429393?cid=smartbox_techweb_whitepaper_14.500004710\u0026_mc=smartbox_techweb_whitepaper_14.500004710"],"publishedSite":[""],"publishedSiteURL":[""]},{"title":["Defending Critical Infrastructure Against Ransomware"],"link":["https://www.informationweek.com/whitepaper/cloud-infrastructure/cybersecurity/defending-critical-infrastructure-against-ransomware/432973?cid=smartbox_techweb_whitepaper_14.500004729\u0026_mc=smartbox_techweb_whitepaper_14.500004729"],"publishedSite":[""],"publishedSiteURL":[""]},{"title":["Simple Solutions for Continuous Visibility to Active Directory Exposures \u0026 Live Attacks"],"link":["https://www.informationweek.com/whitepaper/cybersecurity/network-and-perimeter-security/simple-solutions-for-continuous-visibility-to-active-directory-exposures-and-live-attacks-/431143?cid=smartbox_techweb_whitepaper_14.500004716\u0026_mc=smartbox_techweb_whitepaper_14.500004716"],"publishedSite":[""],"publishedSiteURL":[""]},{"title":["4 Steps to Achieving Comprehensive Kubernetes Security"],"link":["https://www.informationweek.com/whitepaper/cybersecurity/cloud-services/4-steps-to-achieving-comprehensive-kubernetes-security/424343?cid=smartbox_techweb_whitepaper_14.500004681\u0026_mc=smartbox_techweb_whitepaper_14.500004681"],"publishedSite":[""],"publishedSiteURL":[""]}]}],"secondaryData":[],"editorsChoice":{"_version":29,"locale":"en-us","uid":"blt9262b8fd3485b1dc","ACL":{},"_in_progress":false,"created_at":"2021-05-29T07:25:35.582Z","created_by":"blt9a0fc67c46c47dd7","selected_articles":[{"_version":27,"locale":"en-us","uid":"blt94cc72f9bf4c9dd7","_in_progress":false,"article_label":[{"uid":"bltb7044c2767b4f204","_content_type_uid":"dr_article_label"}],"author_page":[{"_version":1,"locale":"en-us","uid":"blte5114e772817a079","ACL":{},"_in_progress":false,"author_description":"Ericka Chickowski specializes in coverage of information technology and business innovation. She has focused on information security for the better part of a decade and regularly writes about the security industry as a contributor to Dark Reading. ","author_email":"ericka@chickowski.com","author_name":"Ericka Chickowski","author_role":"Contributing Writer","created_at":"2021-05-29T07:26:16.855Z","created_by":"blt9a0fc67c46c47dd7","portrait":{"uid":"blt1fa01ab14787f501","created_at":"2021-05-29T07:13:43.790Z","updated_at":"2021-05-29T07:13:43.790Z","created_by":"blt9a0fc67c46c47dd7","updated_by":"blt9a0fc67c46c47dd7","content_type":"image/jpeg","file_size":"5362","tags":[],"filename":"ErickaChick_125x125.jpeg","url":"https://eu-images.contentstack.com/v3/assets/blt66983808af36a8ef/blt1fa01ab14787f501/60b1e9a77f791568be5e0dbb/ErickaChick_125x125.jpeg","ACL":{},"is_dir":false,"_version":1,"title":"ErickaChick_125x125.jpeg","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-05-29T07:13:44.960Z","user":"blt9a0fc67c46c47dd7"}},"social_links":{"twitter_link":{"title":"@ErickaChick","href":"https://twitter.com/ErickaChick"},"linkedin_link":{"title":"","href":""}},"tags":["freelancer"],"title":"Ericka Chickowski","updated_at":"2021-05-29T07:26:16.855Z","updated_by":"blt9a0fc67c46c47dd7","url":"/author/ericka-chickowski","_content_type_uid":"dr_author","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-05-29T07:54:08.403Z","user":"blt9a0fc67c46c47dd7"}}],"body":"\u003cp\u003e.\u003c/p\u003e","byline":"","created_at":"2021-11-16T21:34:43.394Z","created_by":"bltcec76181e7cb79fe","featured_image":{"uid":"bltc3c4154170c731c2","created_at":"2021-11-16T21:41:20.154Z","updated_at":"2021-11-16T21:41:20.154Z","created_by":"bltcec76181e7cb79fe","updated_by":"bltcec76181e7cb79fe","content_type":"image/jpeg","file_size":"10538785","tags":[],"filename":"SOC_Dimco_AdobeStock.jpeg","url":"https://eu-images.contentstack.com/v3/assets/blt66983808af36a8ef/bltc3c4154170c731c2/619425805613955659d664ab/SOC_Dimco_AdobeStock.jpeg","ACL":{},"is_dir":false,"parent_uid":null,"_version":1,"title":"SOC_Dimco_AdobeStock.jpeg","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-11-17T17:00:00.100Z","user":"blt36bec842c46f38f6"}},"featured_image_caption":"","featured_image_credit":"Dimco via AdobeStock","image_alt_text":"XDR","keywords":[],"old_url":"","published_date":"2021-11-17T17:00:00.000Z","seo":{"meta_title":"","meta_description":"","meta_keywords":"","canonical_url":""},"slideshow":[{"image":{"uid":"bltc3c4154170c731c2","created_at":"2021-11-16T21:41:20.154Z","updated_at":"2021-11-16T21:41:20.154Z","created_by":"bltcec76181e7cb79fe","updated_by":"bltcec76181e7cb79fe","content_type":"image/jpeg","file_size":"10538785","tags":[],"filename":"SOC_Dimco_AdobeStock.jpeg","url":"https://eu-images.contentstack.com/v3/assets/blt66983808af36a8ef/bltc3c4154170c731c2/619425805613955659d664ab/SOC_Dimco_AdobeStock.jpeg","ACL":{},"is_dir":false,"parent_uid":null,"_version":1,"title":"SOC_Dimco_AdobeStock.jpeg","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-11-17T17:00:00.100Z","user":"blt36bec842c46f38f6"}},"_metadata":{"uid":"csdf186f3da67080ff"},"title":"","description":"\u003cp\u003eAs security teams strive to get the most out of as many shreds of collectible security data as they can — detecting and responding to threat signals with as little trouble as possible — the category of extended detection and response (XDR) is gaining steam. It’s still early days for this growing niche, with a lot of interpretations of what XDR even is. \u003c/p\u003e\u003cp\u003eThe foundation starts with XDR centralizing telemetry from security tools not just across the network but other key areas, like endpoints, cloud, and identity. The secret sauce tends to be what XDR does next with the data, using machine learning and threat intelligence to correlate the data and contextualize all of the different data dimensions against one another and against risk scoring to provide speedier and higher fidelity detection with less legwork from analysts. \u003c/p\u003e\u003cp\u003eExperts say the promise of XDR is that it makes good on unmet security promises, like security information and event management (SIEM), accelerating how security teams detect, investigate, and remediate threats. Sounds great — and suspiciously like hype to all those cyber cynics out there. So we asked a number of security experts whether they think this category is overhyped and what buyers should keep in mind as they mull over their XDR options.\u003c/p\u003e","image_alt_text":"XDR","caption":"","image_credits":"Source: Dimco via AdobeStock"},{"image":{"uid":"blt23443431668ffde7","created_at":"2021-11-16T21:35:15.833Z","updated_at":"2021-11-16T21:35:15.833Z","created_by":"bltcec76181e7cb79fe","updated_by":"bltcec76181e7cb79fe","content_type":"image/jpeg","file_size":"139925","tags":[],"filename":"luckbron.jpeg","url":"https://eu-images.contentstack.com/v3/assets/blt66983808af36a8ef/blt23443431668ffde7/619424130a12a3553436344d/luckbron.jpeg","ACL":{},"is_dir":false,"parent_uid":null,"_version":1,"title":"luckbron.jpeg","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-11-17T17:00:00.097Z","user":"blt36bec842c46f38f6"}},"_metadata":{"uid":"csc510226d46b404b4"},"title":"The New Magic Acronym","description":"\u003cp\u003e“XDR is indeed the new magic word. And like all new magic words, [it's] overhyped and multi-interpretable. It is used for all kinds of capabilities that go beyond only having a single point solution. This can be a real pitfall for less knowledgeable customers. \u003c/p\u003e\u003cp\u003e“Next to this there is a big difference between ‘extended’ detection and response vs. ‘everything’ detection and response. In our company we strongly believe in being able to include every possible source (open architecture). This will support customers much better, in case they have a best-of-breed strategy or already signed multiyear license contracts for one or more point solutions.”\u003c/p\u003e\u003cp\u003e\u003cem\u003e— Luck Bron, principal cyber security consultant, Defenced\u003c/em\u003e\u003c/p\u003e","image_alt_text":"Luck Bron","caption":"","image_credits":"Source: Luck Bron"},{"image":{"uid":"bltaad970b5eedff16f","created_at":"2021-11-17T14:55:17.829Z","updated_at":"2021-11-17T14:55:17.829Z","created_by":"blt36bec842c46f38f6","updated_by":"blt36bec842c46f38f6","content_type":"image/jpeg","file_size":"62575","tags":[],"filename":"Hugh_Njemanze3.jpg","url":"https://eu-images.contentstack.com/v3/assets/blt66983808af36a8ef/bltaad970b5eedff16f/619517d506d9fc6b7fbc28f1/Hugh_Njemanze3.jpg","ACL":{},"is_dir":false,"parent_uid":null,"_version":1,"title":"Hugh_Njemanze3.jpg","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-11-17T17:00:00.123Z","user":"blt36bec842c46f38f6"}},"_metadata":{"uid":"cs04cd85a64f4cb331"},"title":"Whatever the Hype, Ops Teams Are Using XDR","description":"\u003cp\u003e\"Organizations use multiple technology layers to address different security challenges. As is always the case, though, adversaries continually find new ways of getting past existing defenses, which is an ongoing problem that produces a steady cadence of new security products and services. \u003c/p\u003e\u003cp\u003e\"XDR has emerged as the latest innovation taking aim at closing threat detection and response gaps. Whether or not XDR is over-, under-, or hyped just right remains to be seen. However, security operations teams are actively using it to connect siloed legacy tools, threat data, and intelligence to more quickly and efficiently identify and respond to attackers and breaches.\"\u003c/p\u003e\u003cp\u003e\u003cem\u003e— Hugh Njemanze, president, Anomali\u003c/em\u003e\u003c/p\u003e","image_alt_text":"Hugh Njemanze","caption":"","image_credits":"Source: Hugh Njemanze"},{"image":{"uid":"blt80f027daac033390","created_at":"2021-11-16T21:35:42.389Z","updated_at":"2021-11-16T21:35:42.389Z","created_by":"bltcec76181e7cb79fe","updated_by":"bltcec76181e7cb79fe","content_type":"image/jpeg","file_size":"43451","tags":[],"filename":"John_Bambenek_Netenrich.jpg","url":"https://eu-images.contentstack.com/v3/assets/blt66983808af36a8ef/blt80f027daac033390/6194242e0a12a35534363451/John_Bambenek_Netenrich.jpg","ACL":{},"is_dir":false,"parent_uid":null,"_version":1,"title":"John_Bambenek_Netenrich.jpg","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-11-17T17:00:00.200Z","user":"blt36bec842c46f38f6"}},"_metadata":{"uid":"cs057c4019bec90299"},"title":"Only as Good as the Team Using It","description":"\u003cp\u003e“XDR, in so far as vendors are just packaging existing tools and saying it is XDR, is overhyped. XDR isn't so much new as it is a repackaging of an idea based on the inability of our current toolsets to realize the promise. SIEM *should* have been about managing discrete forms of data from a wide variety of devices and logs [from endpoints and networks] to allow for building robust detection. What SIEM became was data normalization tied to storage costs.\u003c/p\u003e\u003cp\u003e“As with any security tool, [XDR] is only as good as the team that's using it to secure an environment and the data it can ingest. An organization either needs to have threat researchers and/or a hunt team or be willing to outsource that to a trusted third party.”\u003c/p\u003e\u003cp\u003e\u003cem\u003e— John Bambenek, principal threat hunter, Netenrich\u003c/em\u003e\u003c/p\u003e","image_alt_text":"John Bambenek","caption":"","image_credits":"Source: John Bambenek"},{"image":{"uid":"blt3ae06ffead407110","created_at":"2021-11-16T21:36:23.802Z","updated_at":"2021-11-16T21:36:23.802Z","created_by":"bltcec76181e7cb79fe","updated_by":"bltcec76181e7cb79fe","content_type":"image/jpeg","file_size":"28863","tags":[],"filename":"Randy-Watkins-.jpg","url":"https://eu-images.contentstack.com/v3/assets/blt66983808af36a8ef/blt3ae06ffead407110/619424575da8f858d58cd8ef/Randy-Watkins-.jpg","ACL":{},"is_dir":false,"parent_uid":null,"_version":1,"title":"Randy-Watkins-.jpg","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-11-17T17:00:00.300Z","user":"blt36bec842c46f38f6"}},"_metadata":{"uid":"csd2be2e0388de332b"},"title":"Endpoint Data is the Key","description":"\u003cp\u003e“XDR is certainly worth the hype. It was built to deliver the outcomes we expected from SIEM, without the overhead or cost to maintain. Additionally, with the context wrapped around a more authoritative source for data — [the] endpoint — alerts are higher fidelity, investigations are faster, and response can be done directly from the XDR platform. \u003c/p\u003e\u003cp\u003e“Because of the ambiguous definition of XDR, most of the misconceptions revolve around capabilities. From the assumed data sources to aggregation vs. correlation and replacement of a SIEM, the lack of a definitive capability set leaves many organizations assuming the benefit based on the marketing material.” \u003c/p\u003e\u003cp\u003e\u003cem\u003e— Randy Watkins, CTO, Critical Start \u003c/em\u003e\u003c/p\u003e","image_alt_text":"Randy Watkins","caption":"","image_credits":"Source: Randy Watkins"},{"image":{"uid":"blt9fee30bb5338a8c4","created_at":"2021-11-16T21:36:57.297Z","updated_at":"2021-11-16T21:36:57.297Z","created_by":"bltcec76181e7cb79fe","updated_by":"bltcec76181e7cb79fe","content_type":"image/jpeg","file_size":"62854","tags":[],"filename":"bensmith.jpeg","url":"https://eu-images.contentstack.com/v3/assets/blt66983808af36a8ef/blt9fee30bb5338a8c4/6194247901638259ffd72102/bensmith.jpeg","ACL":{},"is_dir":false,"parent_uid":null,"_version":1,"title":"bensmith.jpeg","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-11-17T17:00:00.634Z","user":"blt36bec842c46f38f6"}},"_metadata":{"uid":"cs853d23bb98e32b05"},"title":"Be Sure to Pull Back the Curtains","description":"\u003cp\u003e“We are well past the time when 'we're fine with just a SIEM' or 'we're fine with just an EDR' was the right answer for the visibility you need in your operating environment. The biggest selling point of XDR — and the biggest promise — is its ability not only to ingest all the things, but to make it easier for our human beings in the SOC to get to the right answer more quickly. \u003c/p\u003e\u003cp\u003e“Pull back the curtains to confirm that what you are looking at is a fully formed, tightly integrated collection of technologies, and not a bucket full of different products that don't look like one another and are hard to navigate. Always keep your human analysts front and center when considering these technologies. Will this XDR solution complicate or simplify their day-to-day life?”\u003c/p\u003e\u003cp\u003e\u003cem\u003e— Ben Smith, field CTO, NetWitness \u003c/em\u003e\u003c/p\u003e","image_alt_text":"Ben Smith","caption":"","image_credits":"Source: Ben Smith"},{"image":{"uid":"blt5653ddeaed03c480","created_at":"2021-11-17T14:56:15.657Z","updated_at":"2021-11-17T14:56:15.657Z","created_by":"blt36bec842c46f38f6","updated_by":"blt36bec842c46f38f6","content_type":"image/jpeg","file_size":"50599","tags":[],"filename":"Marc_Brawner3.jpg","url":"https://eu-images.contentstack.com/v3/assets/blt66983808af36a8ef/blt5653ddeaed03c480/6195180f33f178402fe2a77f/Marc_Brawner3.jpg","ACL":{},"is_dir":false,"parent_uid":null,"_version":1,"title":"Marc_Brawner3.jpg","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-11-17T17:00:00.115Z","user":"blt36bec842c46f38f6"}},"_metadata":{"uid":"cs185f95b73192a271"},"title":"Misconceptions Abound","description":"\u003cp\u003e“There’s no question that XDR has gained in awareness in a short period of time, and its overarching principles are sound. However, it’s vital that organizations not look at it as a 'magic bullet' that can solve all cybersecurity problems. XDR provides a compelling technology story to describe improvements in previous mainstream detection and response technologies, but it isn’t the whole story.\u003c/p\u003e\u003cp\u003e“We see XDR as embodying a set of capabilities that, when taken together, raise the bar for mainstream threat detection and response. However, misconceptions can abound as vendors are presently clamoring to define their specific approach or technology as true XDR. Much as the EDR acronym came to define a certain class of endpoint detection and response technologies that emerged nearly 10 years ago. Even today many products claim ‘EDR’ but vary widely in implementation and, thus, effectiveness at delivering desired security outcomes.” \u003c/p\u003e\u003cp\u003e\u003cem\u003e— Marc Brawner, managing director and global head of managed services, Kroll Cyber Risk practice\u003c/em\u003e\u003c/p\u003e","image_alt_text":"Marc Brawner","caption":"","image_credits":"Source: Marc Brawner"},{"image":{"uid":"blt61be63cbbe713c30","created_at":"2021-11-17T14:47:37.501Z","updated_at":"2021-11-17T14:47:37.501Z","created_by":"blt36bec842c46f38f6","updated_by":"blt36bec842c46f38f6","content_type":"image/jpeg","file_size":"60214","tags":[],"filename":"WillMendez2.jpg","url":"https://eu-images.contentstack.com/v3/assets/blt66983808af36a8ef/blt61be63cbbe713c30/61951609fdebb0753acf2a5f/WillMendez2.jpg","ACL":{},"is_dir":false,"parent_uid":null,"_version":1,"title":"WillMendez2.jpg","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-11-17T17:00:00.139Z","user":"blt36bec842c46f38f6"}},"_metadata":{"uid":"cs2c32c4fcbc208444"},"title":"Marketing Term for Evolution of SOC Toolchain","description":"\u003cp\u003e“I think [XDR IS] a marketing term to describe something that was already being done. If you look at companies with mature security programs, especially those that have implemented a robust monitoring strategy through a security operations center (SOC), the key elements of XDR have always been there. \u003c/p\u003e\u003cp\u003e“These companies collect information from various sources, such as endpoints, cloud services, and network telemetry. They combine that information with human elements — security analysts — and quickly detect suspicious or malicious activity to initiate an effective and appropriate response. It’s just now there is an official name for it which can be marketed.”\u003c/p\u003e\u003cp\u003e\u003cem\u003e— William Mendez, managing director of operations, CyZen, A Friedman LLP Company\u003c/em\u003e\u003c/p\u003e","image_alt_text":"William Mendez","caption":"","image_credits":"Source: William Mendez"}],"sponsored_content":[],"sponsored_content_settings":{"is_sponsor_article":false,"sponsor_name":""},"summary":"Security experts weigh in on the value and pitfalls of extended detection and response (XDR), offering consideration and advice on this growing new category.","tags":[],"term_selector":{"historyOfPrimaryTerm":["endpoint"],"primaryTerm":"endpoint","primaryTermInRealText":"Endpoint","primaryCategoryBelonged":"endpoint","secondaryTerm":["analytics","application-security","attacks-breaches","cloud","vulnerabilities-threats"]},"title":"Is XDR Overhyped?","updated_at":"2021-11-17T21:55:12.044Z","updated_by":"blt36bec842c46f38f6","url":"/is-xdr-overhyped-","_content_type_uid":"dr_slideshow","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-11-17T21:55:16.921Z","user":"blt36bec842c46f38f6"}},{"_content_type_uid":"dr_article","_version":12,"locale":"en-us","uid":"blt76659cf2aaf225e9","ACL":{},"_in_progress":false,"article_label":[{"uid":"bltb75c0271fde42422","_content_type_uid":"dr_article_label"}],"author_page":[{"title":"Jai Vijayan","url":"/author/jai-vijayan","author_name":"Jai Vijayan","portrait":{"uid":"blt02d79fb9a44a4258","created_at":"2021-05-29T07:14:37.963Z","updated_at":"2021-05-29T07:14:37.963Z","created_by":"blt9a0fc67c46c47dd7","updated_by":"blt9a0fc67c46c47dd7","content_type":"image/jpeg","file_size":"7323","tags":[],"filename":"Jai-Vijayan.jpeg","url":"https://eu-images.contentstack.com/v3/assets/blt66983808af36a8ef/blt02d79fb9a44a4258/60b1e9dd2a25046b35110696/Jai-Vijayan.jpeg","ACL":{},"is_dir":false,"_version":1,"title":"Jai-Vijayan.jpeg","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-05-29T07:14:39.032Z","user":"blt9a0fc67c46c47dd7"}},"author_role":"Contributing Writer","author_description":"\u003cp\u003eJai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year career at Computerworld, Jai also covered a variety of other technology topics including Big Data, Hadoop, Internet of Things, E-voting and data analytics. Prior to Computerworld, Jai covered technology issues for The Economic Times in Bangalore, India. Jai has a Master's degree in Statistics and lives in Naperville, IL.\u003c/p\u003e","author_email":"jaikumar.vijayan@gmail.com","social_links":{"twitter_link":{"title":"@jaivijayan","href":"https://twitter.com/jaivijayan","uuid":42},"linkedin_link":{"title":"Jaikumar Vijayan","href":"https://www.linkedin.com/in/jaivijayan/","uuid":43}},"tags":["freelance writers"],"locale":"en-us","uid":"blt0f8adf907869ef41","created_by":"blt9a0fc67c46c47dd7","updated_by":"blt4803a6d08ed14a6e","created_at":"2021-05-29T07:26:14.122Z","updated_at":"2021-09-06T01:54:57.241Z","_content_type_uid":"dr_author","ACL":{},"_version":3,"_in_progress":false,"image_alt_text":"Jai Vijayan","author_label":{"author_label_background_color":"000000","author_label_text":"","author_label_text_color":"ffffff","display_author_label":false},"author_page_tagline":"","hidden_email":false,"member_since":"","seo":{"canonical_url":"","meta_description":"","meta_keywords":"","meta_title":""},"specialisms":[],"publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-09-08T22:55:19.593Z","user":"blt36bec842c46f38f6"}}],"body":"\u003cp\u003eThe US this week handed down indictments against two Iranian nationals for election interference and intimidation in the latest indication that Russian actors are not the only ones behind cyber-enabled disinformation campaigns.\u003c/p\u003e\u003cp\u003eMohammad Hosein Musa Kazemi, aka Hosein Zamani, 24, and Sajjad Kashian, aka Kiarash Nabavi, 27, both of Iran, were charged in a federal court in New York Thursday for allegedly illegally accessing confidential US voter information from at least one state election website. Other charges against them include allegedly sending threatening email messages to voters in an apparent bid to intimidate them; creating and distributing video containing false information about vulnerabilities in the election infrastructure; and accessing a media company's network and attempting to use it to spread false information. In addition, Kazemi and Zamani are accused of attempting to illegally access voting-relating websites of multiple states.\u003c/p\u003e\u003cp\u003e\"This indictment details how two Iran-based actors waged a targeted, coordinated campaign to erode confidence in the integrity of the U.S. electoral system and to sow discord among Americans,\" Assistant Attorney General Matthew Olsen of the Justice Department’s National Security Division said in a \u003ca href=\"https://www.justice.gov/opa/pr/two-iranian-nationals-charged-cyber-enabled-disinformation-and-threat-campaign-designed\" target=\"_blank\"\u003estatement\u003c/a\u003e. \"The allegations illustrate how foreign disinformation campaigns operate and seek to influence the American public.\" \u003c/p\u003e\u003cp\u003e\u003cstrong\u003eSeasoned Hackers\u003c/strong\u003e\u003cbr/\u003eThe DoJ described Kazemi and Kashian as experienced Iranian hackers who worked for Emennet Pasargad, an Iran-based company that purportedly provides cybersecurity services. The firm is known to have provided service to the Iranian government and its 12-member Guardian Council, the DoJ said.\u003c/p\u003e\u003cp\u003eThe \u003ca href=\"https://www.justice.gov/opa/press-release/file/1449226/download\" target=\"_blank\"\u003eindictment\u003c/a\u003e marks the second time this week when news has surfaced of non-Russian actors being involved in disinformation campaigns — particularly those related to elections. On Tuesday, researchers at Mandiant released a report that \u003ca href=\"https://www.darkreading.com/attacks-breaches/report-identifies-belarus-involvement-in-big-european-disinformation-campaign\" target=\"_blank\"\u003elinked the government in Belarus\u003c/a\u003e to a long-running disinformation campaign in Europe called Ghostwriter that many had previously assumed was the handiwork of operatives working for Russia's foreign intelligence service. Mandiant's investigation showed that the disinformation campaign was more aligned with Belarusian than Russian interests and that operatives of the threat group providing operational support to Ghostwriter were based in Minsk, not Moscow.\u003c/p\u003e\u003cp\u003eRussia has been the target of most accusations until now — by the US and other governments — regarding cyber-enabled election interference in recent years. But the news this week of Iranian and Belarusian actors being engaged in such activity would suggest that cyber missions to sow dissent and disinformation have spread beyond Russia.\u003c/p\u003e\u003cp\u003e\u003cstrong\u003eVoter Website Hacked\u003c/strong\u003e\u003c/p\u003e\u003cp\u003eAccording to the US DoJ, Kazemi and Kashian were part of a coordinated effort by Iranian actors to undermine trust and confidence in the 2020 presidential election. In September and October 2020, the two indicted individuals allegedly attempted to compromise some 11 state voter websites that included voter registration and voter information websites. One such effort resulted in the breach of one state voter website and the illegal downloading of information belonging to more than 100,000 registered voters.\u003c/p\u003e\u003cp\u003eIn October 2020, Kazemi and Kashian with other conspirators claimed to be a group of volunteers associated with the far-right Proud Boys group. They sent messages and emails to Republican lawmakers and individuals associated with former President Trump's presidential campaign claiming to reveal a Democratic Party plan to exploit vulnerabilities in state voter registration websites to edit mail-in ballots and register nonexistent voters. They even sent in a video with a Proud Boys logo purporting to show an individual hacking into state voter websites and using stolen information to create fake absentee ballots — using the voter information they had previously accessed from one state website.\u003c/p\u003e\u003cp\u003eIn the month before the election, the two Iranians and their unnamed conspirators allegedly sent threatening emails to tens of thousands of registered Democratic voters. The emails purported to be from the Proud Boys and threatened recipients with physical harm if they did not change party affiliations. \u003c/p\u003e\u003cp\u003eOne day after the general election\u003cstrong\u003e,\u003c/strong\u003e the group for whom Kazemi and Kashian worked for allegedly attempted to take advantage of access they had previously gained on a media company's site to try and disseminate fake news regarding the elections. But the media company, acting on an FBI tip, had already mitigated the intrusion, the DoJ said.\u003c/p\u003e","byline":"","created_at":"2021-11-19T20:29:30.405Z","created_by":"blt7e4fac778c192b55","featured_image":{"uid":"blt1287c7e59edb10a0","created_at":"2021-11-19T20:28:50.238Z","updated_at":"2021-11-19T20:28:50.238Z","created_by":"blt7e4fac778c192b55","updated_by":"blt7e4fac778c192b55","content_type":"image/jpeg","file_size":"581124","tags":[],"filename":"iran_Bobica10_shutterstock.jpg","url":"https://eu-images.contentstack.com/v3/assets/blt66983808af36a8ef/blt1287c7e59edb10a0/619809026dd8700f4c61e67d/iran_Bobica10_shutterstock.jpg","ACL":[],"is_dir":false,"parent_uid":null,"_version":1,"title":"iran_Bobica10_shutterstock.jpg","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-11-19T21:01:25.975Z","user":"blt603b94c5f23c042e"}},"featured_image_caption":"","featured_image_credit":"Source: Bobica10 via Shutterstock","image_alt_text":"Iran flag and computer keyboard in the background","keywords":[],"old_url":"","published_date":"2021-11-19T08:40:00.000Z","seo":{"meta_title":"","meta_description":"","meta_keywords":"","canonical_url":""},"sponsored_content_settings":{"is_sponsor_article":false,"sponsor_name":""},"summary":"Among other things, the pair pretended to be Proud Boys volunteers and sent in a fake video and emails to Republican lawmakers purporting to show Democratic Party attempts to subvert the 2020 presidential elections.","tags":[],"term_selector":{"historyOfPrimaryTerm":["attacks-breaches"],"primaryTerm":"attacks-breaches","primaryTermInRealText":"Attacks/Breaches","primaryCategoryBelonged":"attacks-breaches","secondaryTerm":["threat-intelligence","vulnerabilities-threats"]},"title":"US Indicts Iranian Nationals for Cyber-Enabled Election Interference","updated_at":"2021-11-19T20:59:46.421Z","updated_by":"blt603b94c5f23c042e","url":"/us-indicts-iranian-nationals-for-cyber-enabled-election-interference","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-11-19T21:01:25.997Z","user":"blt603b94c5f23c042e"}},{"_version":6,"locale":"en-us","uid":"blt5de7c58c4a8bf4d7","ACL":{},"_in_progress":false,"article_label":[{"uid":"blt610cb37ce61b4a29","_content_type_uid":"dr_article_label"}],"author_page":[{"_version":1,"locale":"en-us","uid":"bltdff76e35fd8c479f","ACL":{},"_in_progress":false,"author_description":"Steve Durbin is CEO of the \u003ca href=\"https://www.securityforum.org/\" target=\"_blank\"\u003eInformation Security Forum\u003c/a\u003e, an independent, not-for-profit dedicated to investigating, clarifying and resolving key issues in information security and risk management. He is a frequent speaker on the Board's role in cybersecurity and technology. Contact: steve.durbin@securityforum.org","author_email":"steve.durbin@securityforum.org","author_name":"Steve Durbin","author_role":"CEO of the Information Security Forum","created_at":"2021-05-29T07:26:40.860Z","created_by":"blt9a0fc67c46c47dd7","portrait":{"uid":"blt39152de54cb3fced","created_at":"2021-05-29T07:09:11.735Z","updated_at":"2021-05-29T07:09:11.735Z","created_by":"blt9a0fc67c46c47dd7","updated_by":"blt9a0fc67c46c47dd7","content_type":"image/png","file_size":"70036","tags":[],"filename":"SteveDurbin.PNG","url":"https://eu-images.contentstack.com/v3/assets/blt66983808af36a8ef/blt39152de54cb3fced/60b1e897ea3fca5648ef4cda/SteveDurbin.PNG","ACL":{},"is_dir":false,"_version":1,"title":"SteveDurbin.PNG","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-05-29T07:09:12.992Z","user":"blt9a0fc67c46c47dd7"}},"social_links":{"twitter_link":{"title":"@stevedurbin","href":"https://twitter.com/stevedurbin"},"linkedin_link":{"title":"Steve Durbin","href":"http://uk.linkedin.com/in/stevedurbin"}},"tags":[],"title":"Steve Durbin","updated_at":"2021-05-29T07:26:40.860Z","updated_by":"blt9a0fc67c46c47dd7","url":"/author/steve-durbin","_content_type_uid":"dr_author","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-05-29T07:54:26.297Z","user":"blt9a0fc67c46c47dd7"}}],"body":"\u003cp\u003e\u003cspan style=\"font-family:\u0026quot;undefined\u0026quot;;\"\u003eZero trust is the latest buzzword thrown around by security vendors, consultants, and policymakers as the panacea to all cybersecurity problems. Some \u003c/span\u003e\u003ca href=\"https://www.statista.com/statistics/1228254/zero-trust-it-model-adoption/#statisticContainer\" target=\"_blank\"\u003e\u003cspan style=\"color:rgb(17, 85, 204);font-family:\u0026quot;undefined\u0026quot;;\"\u003e42%\u003c/span\u003e\u003c/a\u003e\u003cspan style=\"font-family:\u0026quot;undefined\u0026quot;;\"\u003e of global organizations say they have plans in place to adopt zero trust. The Biden administration also \u003c/span\u003e\u003ca href=\"https://www.nextgov.com/cybersecurity/2021/09/biden-administration-releases-draft-zero-trust-guidance/185166/\" target=\"_blank\"\u003e\u003cspan style=\"color:rgb(17, 85, 204);font-family:\u0026quot;undefined\u0026quot;;\"\u003eoutlined\u003c/span\u003e\u003c/a\u003e\u003cspan style=\"font-family:\u0026quot;undefined\u0026quot;;\"\u003e the need for federal networks and systems to adopt a zero-trust architecture. At a time when ransomware continues to make headlines and \u003c/span\u003e\u003ca href=\"https://www.computerweekly.com/news/252505116/Ransomware-demands-and-payments-hit-new-records\" target=\"_blank\"\u003e\u003cspan style=\"color:rgb(17, 85, 204);font-family:\u0026quot;undefined\u0026quot;;\"\u003ebreak new records\u003c/span\u003e\u003c/a\u003e\u003cu\u003e,\u003c/u\u003e\u003cspan style=\"font-family:\u0026quot;undefined\u0026quot;;\"\u003e could zero trust be the answer to ransomware woes? Before we answer this question, let's first understand zero trust and its core components.\u003c/span\u003e\u003c/p\u003e\n\u003cp\u003e\u003cstrong\u003eWhat Is Zero Trust?\u003c/strong\u003e\u003cbr\u003e\u003cspan style=\"font-family:\u0026quot;undefined\u0026quot;;\"\u003eThe concept of zero trust has been around awhile and is most likely an extension of \u003c/span\u003e\u003ca href=\"https://www.forbes.com/sites/firewall/2010/04/09/teach-your-boss-to-speak-security-least-privilege/?sh=3f1668e04ac9\" target=\"_blank\"\u003e\u003cspan style=\"color:rgb(17, 85, 204);font-family:\u0026quot;undefined\u0026quot;;\"\u003eleast privilege access\u003c/span\u003e\u003c/a\u003e\u003cspan style=\"font-family:\u0026quot;undefined\u0026quot;;\"\u003e. Zero trust helps to minimize the lateral movement of attackers (i.e., techniques used by intruders to scout networks) through the principle of \"never trust, always verify.\" In a zero-trust world, there is no implicit trust granted to you (regardless of where you're logging in from or the resources you are trying to access) just because you're behind the corporate firewall. Only authorized individuals gain access to select resources as needed. The idea is to shift the focus from a perimeter-based (reactive) approach to a data-centric (proactive) one.\u003c/span\u003e\u003c/p\u003e\n\u003cp\u003e\u003cstrong\u003eCore Components of Zero Trust\u003c/strong\u003e\u003cbr\u003e\u003cspan style=\"font-family:\u0026quot;undefined\u0026quot;;\"\u003eTo effectively implement zero trust, organizations must understand its three core components:\u003c/span\u003e\u003c/p\u003e\u003col\u003e\u003cli\u003e\u003cstrong\u003eGuiding principles:\u003c/strong\u003e\u003cspan style=\"font-family:\u0026quot;undefined\u0026quot;;\"\u003e Four guiding principles serve as a foundational element to a zero-trust strategy. These include defining business outcomes(organizations can only defend themselves effectively once they know what they are trying to protect and where they are); designing from the inside out (identifying resources that need protection at the granular level and building security controls that work in close proximity with those resources); outlining identity access requirements (providing a more granular level of access control management to users and devices); and inspecting and logging all traffic (comparing authenticated identities against predefined policies, historical data, and context of their access request).\u003c/span\u003e\u003c/li\u003e\u003cli\u003e\u003cstrong\u003eZero-trust network architecture: \u003c/strong\u003e\u003cspan style=\"font-family:\u0026quot;undefined\u0026quot;;\"\u003eZTNA is made up of the protect surface (data, assets, applications, and services resources that are most valuable to the company); microperimeters (granular protection that protects a resource rather than the network environment as a whole); microsegmentation (segregating the network environment into discrete zones or sectors based on different functions of the business); and context-specific least privilege access (resources are granted access in line with the job role and associated activities as well as through enactment of the \u003c/span\u003e\u003ca href=\"https://us-cert.cisa.gov/bsi/articles/knowledge/principles/least-privilege#:~:text=The%20Principle%20of%20Least%20Privilege%20states%20that%20a%20subject%20should,control%20the%20assignment%20of%20rights.\" target=\"_blank\"\u003e\u003cspan style=\"color:rgb(17, 85, 204);font-family:\u0026quot;undefined\u0026quot;;\"\u003eprinciple of least privilege\u003c/span\u003e\u003c/a\u003e\u003cu\u003e)\u003c/u\u003e\u003cspan style=\"font-family:\u0026quot;undefined\u0026quot;;\"\u003e.\u003c/span\u003e\u003c/li\u003e\u003cli\u003e\u003cstrong\u003eTechnologies enabling zero trust: \u003c/strong\u003e\u003cspan style=\"font-family:\u0026quot;undefined\u0026quot;;\"\u003eThere isn't a single solution that enables zero trust. Having said that, technologies such as identity access management, multifactor authentication, single sign-on, software-defined perimeter, user and entity behavior analytics, next-generation firewalls, endpoint detection and response, and data leakage prevention can help you get started on zero trust\u003c/span\u003e\u003cstrong\u003e.\u003c/strong\u003e\u003c/li\u003e\u003c/ol\u003e\n\u003cp\u003e\u003cstrong\u003eZero Trust and the Ransomware Problem\u003c/strong\u003e\u003cbr\u003e\u003cspan style=\"font-family:\u0026quot;undefined\u0026quot;;\"\u003eZero trust isn't a silver bullet for ransomware, but if implemented well, it can help create a much more robust security defense against ransomware attacks. This is because, fundamentally,\u003c/span\u003e\u003cspan style=\"font-family:\u0026quot;undefined\u0026quot;;\"\u003e \u003c/span\u003e\u003ca href=\"https://blog.usecure.io/the-role-of-human-error-in-successful-cyber-security-breaches#:~:text=According%20to%20a%20study%20by,have%20taken%20place%20at%20all!\" target=\"_blank\"\u003e\u003cspan style=\"font-family:\u0026quot;undefined\u0026quot;;\"\u003ehuman error\u003c/span\u003e\u003c/a\u003e\u003cspan style=\"font-family:\u0026quot;undefined\u0026quot;;\"\u003e is the root cause of all cyberattacks, and zero trust puts the spotlight back on user identity and access management. Zero trust also helps reduce the attack surface significantly as internal and external users only have access to limited resources and all other resources are completely hidden away. Additionally, zero trust provides monitoring, detection, and threat inspection capabilities, which are necessary to prevent ransomware attacks and exfiltration of sensitive data.\u003c/span\u003e\u003c/p\u003e\n\u003cp\u003e\u003cspan style=\"font-family:\u0026quot;undefined\u0026quot;;\"\u003eThere are also some misconceptions surrounding zero trust that must also be highlighted:\u003c/span\u003e\u003c/p\u003e\u003col\u003e\u003cli\u003e\u003cspan style=\"font-family:\u0026quot;undefined\u0026quot;;\"\u003eZero trust will not eliminate the ransomware threat in its entirety, though it will significantly reduce its possibility.\u003c/span\u003e\u003c/li\u003e\u003cli\u003e\u003cspan style=\"font-family:\u0026quot;undefined\u0026quot;;\"\u003eNo single technological solution can help you achieve absolute zero trust. Many vendors will try to sell you one, but this is not in your best interest.\u003c/span\u003e\u003c/li\u003e\u003cli\u003e\u003cspan style=\"font-family:\u0026quot;undefined\u0026quot;;\"\u003eZero trust isn't designed to solve all your security problems. It's designed to reduce the probability of security incidents, limit lateral movement, and minimize damage in case of a security incident like ransomware.\u003c/span\u003e\u003c/li\u003e\u003cli\u003e\u003cspan style=\"font-family:\u0026quot;undefined\u0026quot;;\"\u003eSegmentation of users and resources sounds great in theory, but it's quite difficult to implement. Zero trust isn't a quick fix but a well-thought-out, long-term security approach.\u003c/span\u003e\u003c/li\u003e\u003c/ol\u003e\n\u003cp\u003e\u003cspan style=\"font-family:\u0026quot;undefined\u0026quot;;\"\u003eZero trust is a strategy much like digital transformation. It needs a commitment from the entire organization (not just IT teams); it requires a change in mindset and a radical shift in architectural approach; it needs to be executed with care and a great deal of thought, keeping a long-term perspective in mind; and, finally, it must be a perpetual, evolving process that changes in line with the evolving threat landscape. Nearly \u003c/span\u003e\u003cspan style=\"color:windowtext;font-family:\u0026quot;undefined\u0026quot;;\"\u003e\u003c/span\u003e\u003ca href=\"https://www.globenewswire.com/news-release/2020/02/04/1979531/0/en/Survey-Reveals-72-of-Organizations-Plan-to-Implement-Zero-Trust-Capabilities-in-2020-Yet-Nearly-Half-of-Cyber-Security-Professionals-Lack-Confidence-Applying-the-Model.html\" target=\"_blank\"\u003ehalf\u003c/a\u003e\u003cspan style=\"font-family:\u0026quot;undefined\u0026quot;;\"\u003e of cybersecurity professionals still lack confidence in applying the zero-trust model and rightfully so — one wrong move can leave the organization in a worse position. That said, businesses that implement zero trust successfully will be in a much stronger position to combat evolving threats like ransomware and emerge as a truly cyber-resilient organization.\u003c/span\u003e\u003c/p\u003e","byline":"","created_at":"2021-11-12T20:35:23.363Z","created_by":"blt603b94c5f23c042e","featured_image":{"uid":"blt6576c7282a2fd7e1","created_at":"2021-11-19T14:54:37.518Z","updated_at":"2021-11-19T14:54:37.518Z","created_by":"blt603b94c5f23c042e","updated_by":"blt603b94c5f23c042e","content_type":"image/jpeg","file_size":"311537","tags":[],"filename":"Ransomware_Ton_Snoei_Alamy.jpg","url":"https://eu-images.contentstack.com/v3/assets/blt66983808af36a8ef/blt6576c7282a2fd7e1/6197baad01638259ffd7230a/Ransomware_Ton_Snoei_Alamy.jpg","ACL":[],"is_dir":false,"parent_uid":null,"_version":1,"title":"Ransomware_Ton_Snoei_Alamy.jpg","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-11-19T14:55:41.101Z","user":"blt603b94c5f23c042e"}},"featured_image_caption":"","featured_image_credit":"Source: Ton Snoei via Alamy Stock Photo","image_alt_text":"Skull and crossbones on a digital background","keywords":[],"old_url":"","published_date":"2021-11-19T15:00:00.000Z","seo":{"meta_title":"","meta_description":"","meta_keywords":"","canonical_url":""},"sponsored_content_settings":{"is_sponsor_article":false,"sponsor_name":""},"summary":"Zero trust isn't a silver bullet, but if implemented well it can help create a much more robust security defense.","tags":[],"term_selector":{"historyOfPrimaryTerm":["vulnerabilities-threats"],"primaryTerm":"vulnerabilities-threats","primaryTermInRealText":"Vulnerabilities/Threats","primaryCategoryBelonged":"vulnerabilities-threats","secondaryTerm":["attacks-breaches","vulnerability-management"]},"title":"Zero Trust: An Answer to the Ransomware Menace?","updated_at":"2021-11-19T14:55:21.351Z","updated_by":"blt603b94c5f23c042e","url":"/zero-trust-an-answer-to-the-ransomware-menace-","_content_type_uid":"dr_article","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-11-19T16:02:48.639Z","user":"blt603b94c5f23c042e"}},{"_version":20,"locale":"en-us","uid":"blt35dfefb0c938d927","ACL":{},"_in_progress":false,"article_label":[{"uid":"bltb75c0271fde42422","_content_type_uid":"dr_article_label"}],"author_page":[{"title":"Jai Vijayan","url":"/author/jai-vijayan","author_name":"Jai Vijayan","portrait":{"uid":"blt02d79fb9a44a4258","created_at":"2021-05-29T07:14:37.963Z","updated_at":"2021-05-29T07:14:37.963Z","created_by":"blt9a0fc67c46c47dd7","updated_by":"blt9a0fc67c46c47dd7","content_type":"image/jpeg","file_size":"7323","tags":[],"filename":"Jai-Vijayan.jpeg","url":"https://eu-images.contentstack.com/v3/assets/blt66983808af36a8ef/blt02d79fb9a44a4258/60b1e9dd2a25046b35110696/Jai-Vijayan.jpeg","ACL":{},"is_dir":false,"_version":1,"title":"Jai-Vijayan.jpeg","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-05-29T07:14:39.032Z","user":"blt9a0fc67c46c47dd7"}},"author_role":"Contributing Writer","author_description":"\u003cp\u003eJai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year career at Computerworld, Jai also covered a variety of other technology topics including Big Data, Hadoop, Internet of Things, E-voting and data analytics. Prior to Computerworld, Jai covered technology issues for The Economic Times in Bangalore, India. Jai has a Master's degree in Statistics and lives in Naperville, IL.\u003c/p\u003e","author_email":"jaikumar.vijayan@gmail.com","social_links":{"twitter_link":{"title":"@jaivijayan","href":"https://twitter.com/jaivijayan","uuid":42},"linkedin_link":{"title":"Jaikumar Vijayan","href":"https://www.linkedin.com/in/jaivijayan/","uuid":43}},"tags":["freelance writers"],"locale":"en-us","uid":"blt0f8adf907869ef41","created_by":"blt9a0fc67c46c47dd7","updated_by":"blt4803a6d08ed14a6e","created_at":"2021-05-29T07:26:14.122Z","updated_at":"2021-09-06T01:54:57.241Z","_content_type_uid":"dr_author","ACL":{},"_version":3,"_in_progress":false,"image_alt_text":"Jai Vijayan","author_label":{"author_label_background_color":"000000","author_label_text":"","author_label_text_color":"ffffff","display_author_label":false},"author_page_tagline":"","hidden_email":false,"member_since":"","seo":{"canonical_url":"","meta_description":"","meta_keywords":"","meta_title":""},"specialisms":[],"publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-09-08T22:55:19.593Z","user":"blt36bec842c46f38f6"}}],"body":"\u003cp\u003eA phishing kit that has been used in thousands of attacks worldwide has been active for significantly longer than previously thought — and it continues to pose a potent threat to organizations across multiple sectors, new analysis shows.\u003c/p\u003e\n\u003cp\u003eThe kit, named PerSwaysion, is designed to give cybercriminals a way to launch a phishing campaign relatively easily and with little up-front effort. The most notable aspect about the threat is its use of Microsoft file-sharing services, such as Sway, SharePoint, and OneNote, to lure users to credential-stealing sites.\u0026nbsp;\u003c/p\u003e\n\u003cp\u003eDavid Pearson, co-founder and CEO of newly launched SeclarityIO, says his company's analysis of data on PerSwaysion shows the campaign, in fact, launched as far back as at least October 2017 and is currently active despite public disclosure of the group's phishing kit and TTPs.\u0026nbsp;\u003c/p\u003e\n\u003cp\u003eAn analysis of data from URLscan showed that over the last 18 months alone, some 7,403 people from across 14 industry sectors landed on 444 unique PerSwaysion phishing portals at some point. Victims came from organizations within the US government, financial services, pharmaceutical, healthcare, aerospace, engineering, technology, and other sectors. Pearson estimates the number of organizations impacted by the campaign since May 2020 to be, at least, in the high hundreds.\u003cbr\u003e\u003c/p\u003e\n\u003cp\u003e\"Realistically, this has gone on for so long it is likely that just about [every sector] is impacted,\" Pearson says. \"This is a phishing kit that has customers all over the world, and [attackers] are targeting whoever they want.\"\u003c/p\u003e\n\u003cp\u003eSecurity vendor Group-IB gave the campaign its name last year after observing how extensively it abused the Sway service as part of the attack chain. In an \u003ca href=\"https://blog.group-ib.com/perswaysion\" target=\"_blank\"\u003eApril 2020 report\u003c/a\u003e, Group-IB described PerSwaysion as a collection of small but targeted phishing attacks executed by multiple criminal groups mainly against small and midsize financial services companies, real estate groups and law firms.\u0026nbsp;\u003c/p\u003e\n\u003cp\u003eThe security vendor had assessed the PerSwaysion campaign had been ongoing since 2019 and had successfully compromised email accounts belonging to at least 156 high-ranking officials at multiple organizations located mainly in the US and Canada, and to a lesser number in global financial hubs in Germany, the UK, the Netherlands, and Hong Kong.\u003cbr\u003e\u003cbr\u003ePrevious reporting on PerSwaysion by Group-IB and others had described attackers as deploying a three-phase operation to lure users to credential-grabbing phishing sites. According to Group-IB, the first phase involves potential victims receiving a well-crafted spear-phishing email with a non-malicious PDF attachment purporting to be a Microsoft file-sharing notification.\u0026nbsp;\u003c/p\u003e\n\u003cp\u003eUsers who click on the \"Read Now\" hyperlink in the notification are directed to a file hosted on Microsoft Sway or — less often — another Microsoft file-sharing service. The page is designed to look exactly like an authentic Microsoft file-sharing site except when users click on the Read Now link, they are directed to a credential-harvesting site designed to look like an account sign-on page.\u003c/p\u003e\n\u003cp\u003e\u003cstrong\u003eDrag-and-Drop Op\u003c/strong\u003e\u003c/p\u003e\n\u003cp\u003ePearson says his \u003ca href=\"https://seclarity.io/resources/blog/the-art-of-perswaysion-phishing-kit/\" target=\"_blank\"\u003eanalysis of PerSwaysion\u003c/a\u003e shows the kit essentially makes deploying a phishing portal a drag-and-drop operation for attackers. The kit contains templates for spoofing account login pages belonging to eight trusted brands, including Microsoft, Google, Facebook, Twitter, and — as an indication of just how long the kit has been around — some older brands like Hotmail and AOL.\u003c/p\u003e\n\u003cp\u003eThe kit's attack infrastructure itself consists of a front-end phishing portal that victims land on when they click through the URL links, a template hosting site, a redirector site that ensures the appropriate template is served up to the victim, and the credential collection site itself.\u003c/p\u003e\n\u003cp\u003e\u003cstrong\u003eFresh Insight\u003c/strong\u003e\u003cbr\u003ePearson says SeclarityIO was also able to uncover fresh insight into the attack vectors that different threat actors used to initially deliver the PerSwaysion kit to potential victims thanks to its network interpreter technology. \u003c/p\u003e\n\u003cp\u003eThe platform allows organizations to upload any kind of traffic flow format to understand, for example, who might have communicated with whom on the network, how many packets were sent and received, and other metrics. \u003c/p\u003e\n\u003cp\u003e\"We don't look at any payload information,\" Pearson says. \"We just look at the flow of information, and we have 30 or so categories that we group traffic into.\" \u003c/p\u003e\n\u003cp\u003eSeclarityIO categorizes communication to any port on any site, he adds, to help organizations identify malicious activity, like command-and-control (C2) traffic. The technology works with an organization's network flows and helps security analysts visualize what vectors an attacker might have used to evade defenses, how a user might have interacted with the site, and whether that interaction requires remediation, Pearson notes.\u003c/p\u003e\n\u003cp\u003eSeclarityIO's platform helped show that in some PerSwaysion attacks, threat actors used URL shorteners, such as bit.ly and tiny.cc, to try and bypass email filters and to make malicious URLs appear more legitimate. In other instances, attackers used email platforms such as sendgrid.net to deliver their phishing lures straight to user email inboxes. Other tactics included luring users to legitimate but compromised websites, redirects through online ads, and open redirects to reroute users to a different site from which they intended to go.\u003c/p\u003e\n\u003cp\u003ePearson says SeclarityIO has been unable to determine how the PerSwaysion kit is marketed. They have also been unable to dig up any more information on who might have developed the kit beyond what Group-IB already revealed last year: that\u0026nbsp;the operators likely are Vietnamese-speaking.\u003c/p\u003e","byline":"","created_at":"2021-11-18T01:06:43.977Z","created_by":"blt7e4fac778c192b55","featured_image":{"uid":"blt16ac83cd5549bacd","created_at":"2021-11-18T01:06:13.352Z","updated_at":"2021-11-18T01:06:13.352Z","created_by":"blt7e4fac778c192b55","updated_by":"blt7e4fac778c192b55","content_type":"image/jpeg","file_size":"570368","tags":[],"filename":"spearphish_Artur_Szczybylo_shutterstock.jpg","url":"https://eu-images.contentstack.com/v3/assets/blt66983808af36a8ef/blt16ac83cd5549bacd/6195a70573c3bf5a0a3386d1/spearphish_Artur_Szczybylo_shutterstock.jpg","ACL":[],"is_dir":false,"parent_uid":null,"_version":1,"title":"spearphish_Artur_Szczybylo_shutterstock.jpg","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-11-18T13:09:06.949Z","user":"blt36bec842c46f38f6"}},"featured_image_caption":"","featured_image_credit":"Source: Artur Szczybylo via Shutterstock","image_alt_text":"","keywords":[],"old_url":"","published_date":"2021-11-18T13:01:00.000Z","seo":{"meta_title":"","meta_description":"","meta_keywords":"","canonical_url":""},"sponsored_content_settings":{"is_sponsor_article":false,"sponsor_name":""},"summary":"Research shows that multiple attack groups have been using the Microsoft file-sharing service - leveraging phishing kit for much longer than previously thought.","tags":[],"term_selector":{"historyOfPrimaryTerm":["vulnerabilities-threats"],"primaryTerm":"vulnerabilities-threats","primaryTermInRealText":"Vulnerabilities/Threats","primaryCategoryBelonged":"vulnerabilities-threats","secondaryTerm":["attacks-breaches","threat-intelligence","vulnerabilities-threats"]},"title":"'PerSwaysion' Phishing Campaign Still Ongoing, and Pervasive","updated_at":"2021-11-18T16:08:43.935Z","updated_by":"blt31bd4bcd14669cc0","url":"/-perswaysion-phishing-campaign-continues-to-be-an-active-threat-for-organizations","_content_type_uid":"dr_article","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-11-18T16:08:55.665Z","user":"blt31bd4bcd14669cc0"}}],"tags":["editors' choice"],"title":"Editors' Choice","updated_at":"2021-11-22T19:51:57.156Z","updated_by":"blt603b94c5f23c042e","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-11-22T19:52:02.877Z","user":"blt603b94c5f23c042e"}},"newsletterSubscribe":{"message":"Keep up with the latest cybersecurity threats, newly-discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.","open_subscribe_link_on_new_tab":true,"subscribe_link":{"title":"Subscribe","href":"https://www.darkreading.com/newsletter-signup/?_mc=dr_eoa"}},"bibblio":{"_version":1,"locale":"en-us","uid":"blt66dbf3f683541905","ACL":{},"_in_progress":false,"created_at":"2021-05-29T07:26:04.261Z","created_by":"blt9a0fc67c46c47dd7","tags":[],"title":"Recommended Reading:","updated_at":"2021-05-29T07:26:04.261Z","updated_by":"blt9a0fc67c46c47dd7","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-05-29T07:53:53.525Z","user":"blt9a0fc67c46c47dd7"}},"moreInsights":{"title":"More Insights","heading":"More Insights","system":{"uid":"blt5ee3e0ba340bf613","__typename":"EntrySystemField"},"smartboxConnection":{"edges":[{"node":{"title":"White Papers","ordinal":3,"hidden":false,"system":{"uid":"blt1192837947494c5f","__typename":"EntrySystemField"},"feed":{"title":"White Papers","href":"http://smartbox.techweb.com/smartbox/externalsmartbox?site_id=162801002\u0026taxonomy_ids=\u0026num_display=\u0026article_type=whitepaper\u0026output_type=xml","__typename":"Link"},"read_more_link":{"title":"More White Papers","href":"https://www.informationweek.com/whitepaper/Security","__typename":"Link"},"__typename":"DrSmartbox","articles":[{"title":["2021 Ransomware Threat Report"],"link":["https://www.informationweek.com/whitepaper/cybersecurity/security-monitoring/2021-ransomware-threat-report/432943?cid=smartbox_techweb_whitepaper_14.500004727\u0026_mc=smartbox_techweb_whitepaper_14.500004727"],"publishedSite":[""],"publishedSiteURL":[""]},{"title":["2021 Cyberthreat Defense Report"],"link":["https://www.informationweek.com/whitepaper/cloud-security/cybersecurity/2021-cyberthreat-defense-report/429393?cid=smartbox_techweb_whitepaper_14.500004710\u0026_mc=smartbox_techweb_whitepaper_14.500004710"],"publishedSite":[""],"publishedSiteURL":[""]},{"title":["Defending Critical Infrastructure Against Ransomware"],"link":["https://www.informationweek.com/whitepaper/cloud-infrastructure/cybersecurity/defending-critical-infrastructure-against-ransomware/432973?cid=smartbox_techweb_whitepaper_14.500004729\u0026_mc=smartbox_techweb_whitepaper_14.500004729"],"publishedSite":[""],"publishedSiteURL":[""]},{"title":["Simple Solutions for Continuous Visibility to Active Directory Exposures \u0026 Live Attacks"],"link":["https://www.informationweek.com/whitepaper/cybersecurity/network-and-perimeter-security/simple-solutions-for-continuous-visibility-to-active-directory-exposures-and-live-attacks-/431143?cid=smartbox_techweb_whitepaper_14.500004716\u0026_mc=smartbox_techweb_whitepaper_14.500004716"],"publishedSite":[""],"publishedSiteURL":[""]},{"title":["4 Steps to Achieving Comprehensive Kubernetes Security"],"link":["https://www.informationweek.com/whitepaper/cybersecurity/cloud-services/4-steps-to-achieving-comprehensive-kubernetes-security/424343?cid=smartbox_techweb_whitepaper_14.500004681\u0026_mc=smartbox_techweb_whitepaper_14.500004681"],"publishedSite":[""],"publishedSiteURL":[""]}]},"__typename":"DrMoreInsightsSmartboxEdge"},{"node":{"title":"Webinars","ordinal":1,"hidden":false,"system":{"uid":"blt8f82585c522cc0f5","__typename":"EntrySystemField"},"feed":{"title":"Webinars","href":"https://smartbox.techweb.com/smartbox/externalsmartbox?site_id=162801002\u0026taxonomy_ids=\u0026num_display=5\u0026article_type=webcast\u0026output_type=xml","__typename":"Link"},"read_more_link":{"title":"More Webinars","href":"https://www.darkreading.com/upcoming-webinars","__typename":"Link"},"__typename":"DrSmartbox","articles":[{"title":["Cybersecurity Forecast 2022: Snowpocalypse or cloudy with a chance of rain?"],"link":["https://webinar.darkreading.com/930906?keycode=sbx\u0026cid=smartbox_techweb_webcast_8.500001115\u0026_mc=smartbox_techweb_webcast_8.500001115"],"publishedSite":[""],"eventDate":["Dec 09, 2021"],"publishedSiteURL":[""],"description":["Does the year ahead hold significant promise for IT and Security teams, or does the upheaval caused by COVID-19 and the spike in cyberattacks continue well into 2022? As threat actors continue to evolve, what should security teams look out for and how should security executives prepare to ensure their organization doesn't become the subject of the next news headline? Please join Qualys CISO, Ben Carr and Director of Malware Threat Research, Travis Smith for a discussion covering emerging trends."]},{"title":["Preventing Attackers from Navigating Your Enterprise Systems"],"link":["https://webinar.darkreading.com/951852?keycode=sbx\u0026cid=smartbox_techweb_webcast_8.500001114\u0026_mc=smartbox_techweb_webcast_8.500001114"],"publishedSite":[""],"eventDate":["Dec 15, 2021"],"publishedSiteURL":[""],"description":["Over the past few years, cyber attackers have favored exploits in which they steal a legitimate user's credentials and then navigate enterprise defenses as a trusted end user. This \"lateral movement\" enables the attacker to quickly gain access to a wide variety of applications and data, and can lead to a major data breach. In this webinar, experts discuss methods for recognizing anomalous and unauthorized behavior among trusted users, and how to prevent those \"users\" from gaining access to critical information. You'll also learn how to limit trusted users from accessing systems or gaining privileges that their roles don't require them to have."]},{"title":["Protecting Enterprise Data from Malicious Insiders"],"link":["https://webinar.darkreading.com/945057?keycode=sbx\u0026cid=smartbox_techweb_webcast_8.500001107\u0026_mc=smartbox_techweb_webcast_8.500001107"],"publishedSite":[""],"eventDate":["Dec 14, 2021"],"publishedSiteURL":[""],"description":["It's a sad truth: not all employees are nice. Corporate espionage, sabotage and other security incidents could be committed or aided by any insider with something to gain. How do you know when a once-trustworthy employee is about to do something malicious? How can you identify anomalous behavior among your users? Most of all, how can you prevent employees from taking cyber actions that might hurt your enterprise's business? In this webinar, experts discuss methods for detecting and mitigating malicious insider threats, and for preventing users from using their trusted positions to threaten your data."]},{"title":["Beyond Patch Management: Next-Generation Approaches to Finding and Fixing Vulnerable Code"],"link":["https://webinar.darkreading.com/950051?keycode=sbx\u0026cid=smartbox_techweb_webcast_8.500001105\u0026_mc=smartbox_techweb_webcast_8.500001105"],"publishedSite":[""],"eventDate":["Dec 07, 2021"],"publishedSiteURL":[""],"description":["A good patch management process can help make your enterprise data more secure. But what does it do for vulnerabilities that haven't been patched? Attackers are increasingly manipulating open-source, third-party components in software -- do you have a process to find and repair those bugs? In this webinar, top experts will update you on the latest critical applications vulnerabilities and provide advice on how you can scan, detect, and remediate new vulns on an ongoing basis."]},{"title":["The ROI Story: Identifying \u0026 Justifying Disruptive Technology"],"link":["https://webinar.informationweek.com/5876?keycode=sbx\u0026cid=smartbox_techweb_webcast_8.500000934\u0026_mc=smartbox_techweb_webcast_8.500000934"],"publishedSite":[""],"eventDate":["Mar 25, 2020"],"publishedSiteURL":[""],"description":["This webinar will assist anyone interested in how to use financial analysis as a framework to optimize strategic decision-making."]}]},"__typename":"DrMoreInsightsSmartboxEdge"},{"node":{"title":"Reports","ordinal":null,"hidden":true,"system":{"uid":"blt5145c70334f61d02","__typename":"EntrySystemField"},"feed":{"title":"Reports","href":"http://smartbox.techweb.com/smartbox/externalsmartbox?site_id=162801002\u0026taxonomy_ids=\u0026num_display=10\u0026article_type=analytics\u0026output_type=xml","__typename":"Link"},"read_more_link":{"title":"More Reports","href":"https://www.darkreading.com/archives.asp?section_id=315","__typename":"Link"},"__typename":"DrSmartbox","articles":[{"title":["10 Hot Talks From Black Hat USA 2021"],"link":["https://www.informationweek.com/whitepaper/cybersecurity/security-monitoring/10-hot-talks-from-black-hat-usa-2021/431873?cid=smartbox_techweb_analytics_7.300005915\u0026_mc=smartbox_techweb_analytics_7.300005915"],"publishedSite":[""],"publishedSiteURL":[""]},{"title":["Enterprise Cybersecurity Plans in a Post-Pandemic World"],"link":["https://www.informationweek.com/whitepaper/risk-management-security/security-monitoring/enterprise-cybersecurity-plans-in-a-post-pandemic-world/430493?cid=smartbox_techweb_analytics_7.300005913\u0026_mc=smartbox_techweb_analytics_7.300005913"],"publishedSite":[""],"publishedSiteURL":[""],"description":["As the COVID-19 pandemic eases, IT security threats and the challenges involved in responding to them are trending upward. Security leaders expect that cyberattacks like ransomware, phishing, and malware will increase even as the pandemic eventually recedes.\r\n\r\nDownload the Dark Reading and Omdia Research Report Enterprise Cybersecurity Plans in a Post-Pandemic World to understand how security leaders are maintaining pace with pandemic-related challenges, and where there is room for improvement."]},{"title":["The State of Malware Threats"],"link":["https://www.informationweek.com/whitepaper/cybersecurity/risk-management-security/the-state-of-malware-threats/428693?cid=smartbox_techweb_analytics_7.300005894\u0026_mc=smartbox_techweb_analytics_7.300005894"],"publishedSite":[""],"publishedSiteURL":[""]},{"title":["How Enterprises are Attacking the Cybersecurity Problem"],"link":["https://www.informationweek.com/whitepaper/cybersecurity/security-monitoring/how-enterprises-are-attacking-the-cybersecurity-problem/432103?cid=smartbox_techweb_analytics_7.300005916\u0026_mc=smartbox_techweb_analytics_7.300005916"],"publishedSite":[""],"publishedSiteURL":[""],"description":["Concerns over supply chain vulnerabilities and attack visibility drove some significant changes in enterprise cybersecurity strategies over the past year. Dark Reading's 2021 Strategic Security Survey showed that many organizations are staying the course regarding the use of a mix of attack prevention and threat detection technologies and practices for dealing with cyber threats. "]},{"title":["State of DevOps 2021"],"link":["https://www.informationweek.com/whitepaper/application-acceleration/enterprise/state-of-devops-2021/429973?cid=smartbox_techweb_analytics_7.300005911\u0026_mc=smartbox_techweb_analytics_7.300005911"],"publishedSite":[""],"publishedSiteURL":[""],"description":["The chaos of the pandemic and increasing cyberattacks meant that organizations put some DevOps adoption plans on hold temporarily. However, teams that had already embraced the approach saw efficiency and application improvements. Find out more today!"]},{"title":["Incident Readiness and Building Response Playbook"],"link":["https://www.informationweek.com/whitepaper/cybersecurity/security-monitoring/incident-readiness-and-building-response-playbook/429723?cid=smartbox_techweb_analytics_7.300005908\u0026_mc=smartbox_techweb_analytics_7.300005908"],"publishedSite":[""],"publishedSiteURL":[""]},{"title":["Defending Against Critical Threats"],"link":["https://www.informationweek.com/whitepaper/cybersecurity/endpoint-security/defending-against-critical-threats/429033?cid=smartbox_techweb_analytics_7.300005906\u0026_mc=smartbox_techweb_analytics_7.300005906"],"publishedSite":[""],"publishedSiteURL":[""]},{"title":["Increased Cooperation Between Access Brokers, Ransomware Operators Reviewed"],"link":["https://www.informationweek.com/whitepaper/cybersecurity/risk-management-security/increased-cooperation-between-access-brokers,-ransomware-operators-reviewed/429153?cid=smartbox_techweb_analytics_7.300005903\u0026_mc=smartbox_techweb_analytics_7.300005903"],"publishedSite":[""],"publishedSiteURL":[""]},{"title":["Intel 471 Breach Report"],"link":["https://www.informationweek.com/whitepaper/cybersecurity/risk-management-security/intel-471-breach-report/429143?cid=smartbox_techweb_analytics_7.300005902\u0026_mc=smartbox_techweb_analytics_7.300005902"],"publishedSite":[""],"publishedSiteURL":[""]},{"title":["CVE Weaponization Report"],"link":["https://www.informationweek.com/whitepaper/cybersecurity/risk-management-security/cve-weaponization-report/429173?cid=smartbox_techweb_analytics_7.300005901\u0026_mc=smartbox_techweb_analytics_7.300005901"],"publishedSite":[""],"publishedSiteURL":[""]}]},"__typename":"DrMoreInsightsSmartboxEdge"}],"__typename":"DrMoreInsightsSmartboxConnection"},"__typename":"DrMoreInsights","smartbox":[{"title":"White Papers","ordinal":3,"hidden":false,"system":{"uid":"blt1192837947494c5f","__typename":"EntrySystemField"},"feed":{"title":"White Papers","href":"http://smartbox.techweb.com/smartbox/externalsmartbox?site_id=162801002\u0026taxonomy_ids=\u0026num_display=\u0026article_type=whitepaper\u0026output_type=xml","__typename":"Link"},"read_more_link":{"title":"More White Papers","href":"https://www.informationweek.com/whitepaper/Security","__typename":"Link"},"__typename":"DrSmartbox","articles":[{"title":["2021 Ransomware Threat Report"],"link":["https://www.informationweek.com/whitepaper/cybersecurity/security-monitoring/2021-ransomware-threat-report/432943?cid=smartbox_techweb_whitepaper_14.500004727\u0026_mc=smartbox_techweb_whitepaper_14.500004727"],"publishedSite":[""],"publishedSiteURL":[""]},{"title":["2021 Cyberthreat Defense Report"],"link":["https://www.informationweek.com/whitepaper/cloud-security/cybersecurity/2021-cyberthreat-defense-report/429393?cid=smartbox_techweb_whitepaper_14.500004710\u0026_mc=smartbox_techweb_whitepaper_14.500004710"],"publishedSite":[""],"publishedSiteURL":[""]},{"title":["Defending Critical Infrastructure Against Ransomware"],"link":["https://www.informationweek.com/whitepaper/cloud-infrastructure/cybersecurity/defending-critical-infrastructure-against-ransomware/432973?cid=smartbox_techweb_whitepaper_14.500004729\u0026_mc=smartbox_techweb_whitepaper_14.500004729"],"publishedSite":[""],"publishedSiteURL":[""]},{"title":["Simple Solutions for Continuous Visibility to Active Directory Exposures \u0026 Live Attacks"],"link":["https://www.informationweek.com/whitepaper/cybersecurity/network-and-perimeter-security/simple-solutions-for-continuous-visibility-to-active-directory-exposures-and-live-attacks-/431143?cid=smartbox_techweb_whitepaper_14.500004716\u0026_mc=smartbox_techweb_whitepaper_14.500004716"],"publishedSite":[""],"publishedSiteURL":[""]},{"title":["4 Steps to Achieving Comprehensive Kubernetes Security"],"link":["https://www.informationweek.com/whitepaper/cybersecurity/cloud-services/4-steps-to-achieving-comprehensive-kubernetes-security/424343?cid=smartbox_techweb_whitepaper_14.500004681\u0026_mc=smartbox_techweb_whitepaper_14.500004681"],"publishedSite":[""],"publishedSiteURL":[""]}]},{"title":"Webinars","ordinal":1,"hidden":false,"system":{"uid":"blt8f82585c522cc0f5","__typename":"EntrySystemField"},"feed":{"title":"Webinars","href":"https://smartbox.techweb.com/smartbox/externalsmartbox?site_id=162801002\u0026taxonomy_ids=\u0026num_display=5\u0026article_type=webcast\u0026output_type=xml","__typename":"Link"},"read_more_link":{"title":"More Webinars","href":"https://www.darkreading.com/upcoming-webinars","__typename":"Link"},"__typename":"DrSmartbox","articles":[{"title":["Cybersecurity Forecast 2022: Snowpocalypse or cloudy with a chance of rain?"],"link":["https://webinar.darkreading.com/930906?keycode=sbx\u0026cid=smartbox_techweb_webcast_8.500001115\u0026_mc=smartbox_techweb_webcast_8.500001115"],"publishedSite":[""],"eventDate":["Dec 09, 2021"],"publishedSiteURL":[""],"description":["Does the year ahead hold significant promise for IT and Security teams, or does the upheaval caused by COVID-19 and the spike in cyberattacks continue well into 2022? As threat actors continue to evolve, what should security teams look out for and how should security executives prepare to ensure their organization doesn't become the subject of the next news headline? Please join Qualys CISO, Ben Carr and Director of Malware Threat Research, Travis Smith for a discussion covering emerging trends."]},{"title":["Preventing Attackers from Navigating Your Enterprise Systems"],"link":["https://webinar.darkreading.com/951852?keycode=sbx\u0026cid=smartbox_techweb_webcast_8.500001114\u0026_mc=smartbox_techweb_webcast_8.500001114"],"publishedSite":[""],"eventDate":["Dec 15, 2021"],"publishedSiteURL":[""],"description":["Over the past few years, cyber attackers have favored exploits in which they steal a legitimate user's credentials and then navigate enterprise defenses as a trusted end user. This \"lateral movement\" enables the attacker to quickly gain access to a wide variety of applications and data, and can lead to a major data breach. In this webinar, experts discuss methods for recognizing anomalous and unauthorized behavior among trusted users, and how to prevent those \"users\" from gaining access to critical information. You'll also learn how to limit trusted users from accessing systems or gaining privileges that their roles don't require them to have."]},{"title":["Protecting Enterprise Data from Malicious Insiders"],"link":["https://webinar.darkreading.com/945057?keycode=sbx\u0026cid=smartbox_techweb_webcast_8.500001107\u0026_mc=smartbox_techweb_webcast_8.500001107"],"publishedSite":[""],"eventDate":["Dec 14, 2021"],"publishedSiteURL":[""],"description":["It's a sad truth: not all employees are nice. Corporate espionage, sabotage and other security incidents could be committed or aided by any insider with something to gain. How do you know when a once-trustworthy employee is about to do something malicious? How can you identify anomalous behavior among your users? Most of all, how can you prevent employees from taking cyber actions that might hurt your enterprise's business? In this webinar, experts discuss methods for detecting and mitigating malicious insider threats, and for preventing users from using their trusted positions to threaten your data."]},{"title":["Beyond Patch Management: Next-Generation Approaches to Finding and Fixing Vulnerable Code"],"link":["https://webinar.darkreading.com/950051?keycode=sbx\u0026cid=smartbox_techweb_webcast_8.500001105\u0026_mc=smartbox_techweb_webcast_8.500001105"],"publishedSite":[""],"eventDate":["Dec 07, 2021"],"publishedSiteURL":[""],"description":["A good patch management process can help make your enterprise data more secure. But what does it do for vulnerabilities that haven't been patched? Attackers are increasingly manipulating open-source, third-party components in software -- do you have a process to find and repair those bugs? In this webinar, top experts will update you on the latest critical applications vulnerabilities and provide advice on how you can scan, detect, and remediate new vulns on an ongoing basis."]},{"title":["The ROI Story: Identifying \u0026 Justifying Disruptive Technology"],"link":["https://webinar.informationweek.com/5876?keycode=sbx\u0026cid=smartbox_techweb_webcast_8.500000934\u0026_mc=smartbox_techweb_webcast_8.500000934"],"publishedSite":[""],"eventDate":["Mar 25, 2020"],"publishedSiteURL":[""],"description":["This webinar will assist anyone interested in how to use financial analysis as a framework to optimize strategic decision-making."]}]},{"title":"Reports","ordinal":null,"hidden":true,"system":{"uid":"blt5145c70334f61d02","__typename":"EntrySystemField"},"feed":{"title":"Reports","href":"http://smartbox.techweb.com/smartbox/externalsmartbox?site_id=162801002\u0026taxonomy_ids=\u0026num_display=10\u0026article_type=analytics\u0026output_type=xml","__typename":"Link"},"read_more_link":{"title":"More Reports","href":"https://www.darkreading.com/archives.asp?section_id=315","__typename":"Link"},"__typename":"DrSmartbox","articles":[{"title":["10 Hot Talks From Black Hat USA 2021"],"link":["https://www.informationweek.com/whitepaper/cybersecurity/security-monitoring/10-hot-talks-from-black-hat-usa-2021/431873?cid=smartbox_techweb_analytics_7.300005915\u0026_mc=smartbox_techweb_analytics_7.300005915"],"publishedSite":[""],"publishedSiteURL":[""]},{"title":["Enterprise Cybersecurity Plans in a Post-Pandemic World"],"link":["https://www.informationweek.com/whitepaper/risk-management-security/security-monitoring/enterprise-cybersecurity-plans-in-a-post-pandemic-world/430493?cid=smartbox_techweb_analytics_7.300005913\u0026_mc=smartbox_techweb_analytics_7.300005913"],"publishedSite":[""],"publishedSiteURL":[""],"description":["As the COVID-19 pandemic eases, IT security threats and the challenges involved in responding to them are trending upward. Security leaders expect that cyberattacks like ransomware, phishing, and malware will increase even as the pandemic eventually recedes.\r\n\r\nDownload the Dark Reading and Omdia Research Report Enterprise Cybersecurity Plans in a Post-Pandemic World to understand how security leaders are maintaining pace with pandemic-related challenges, and where there is room for improvement."]},{"title":["The State of Malware Threats"],"link":["https://www.informationweek.com/whitepaper/cybersecurity/risk-management-security/the-state-of-malware-threats/428693?cid=smartbox_techweb_analytics_7.300005894\u0026_mc=smartbox_techweb_analytics_7.300005894"],"publishedSite":[""],"publishedSiteURL":[""]},{"title":["How Enterprises are Attacking the Cybersecurity Problem"],"link":["https://www.informationweek.com/whitepaper/cybersecurity/security-monitoring/how-enterprises-are-attacking-the-cybersecurity-problem/432103?cid=smartbox_techweb_analytics_7.300005916\u0026_mc=smartbox_techweb_analytics_7.300005916"],"publishedSite":[""],"publishedSiteURL":[""],"description":["Concerns over supply chain vulnerabilities and attack visibility drove some significant changes in enterprise cybersecurity strategies over the past year. Dark Reading's 2021 Strategic Security Survey showed that many organizations are staying the course regarding the use of a mix of attack prevention and threat detection technologies and practices for dealing with cyber threats. "]},{"title":["State of DevOps 2021"],"link":["https://www.informationweek.com/whitepaper/application-acceleration/enterprise/state-of-devops-2021/429973?cid=smartbox_techweb_analytics_7.300005911\u0026_mc=smartbox_techweb_analytics_7.300005911"],"publishedSite":[""],"publishedSiteURL":[""],"description":["The chaos of the pandemic and increasing cyberattacks meant that organizations put some DevOps adoption plans on hold temporarily. However, teams that had already embraced the approach saw efficiency and application improvements. Find out more today!"]},{"title":["Incident Readiness and Building Response Playbook"],"link":["https://www.informationweek.com/whitepaper/cybersecurity/security-monitoring/incident-readiness-and-building-response-playbook/429723?cid=smartbox_techweb_analytics_7.300005908\u0026_mc=smartbox_techweb_analytics_7.300005908"],"publishedSite":[""],"publishedSiteURL":[""]},{"title":["Defending Against Critical Threats"],"link":["https://www.informationweek.com/whitepaper/cybersecurity/endpoint-security/defending-against-critical-threats/429033?cid=smartbox_techweb_analytics_7.300005906\u0026_mc=smartbox_techweb_analytics_7.300005906"],"publishedSite":[""],"publishedSiteURL":[""]},{"title":["Increased Cooperation Between Access Brokers, Ransomware Operators Reviewed"],"link":["https://www.informationweek.com/whitepaper/cybersecurity/risk-management-security/increased-cooperation-between-access-brokers,-ransomware-operators-reviewed/429153?cid=smartbox_techweb_analytics_7.300005903\u0026_mc=smartbox_techweb_analytics_7.300005903"],"publishedSite":[""],"publishedSiteURL":[""]},{"title":["Intel 471 Breach Report"],"link":["https://www.informationweek.com/whitepaper/cybersecurity/risk-management-security/intel-471-breach-report/429143?cid=smartbox_techweb_analytics_7.300005902\u0026_mc=smartbox_techweb_analytics_7.300005902"],"publishedSite":[""],"publishedSiteURL":[""]},{"title":["CVE Weaponization Report"],"link":["https://www.informationweek.com/whitepaper/cybersecurity/risk-management-security/cve-weaponization-report/429173?cid=smartbox_techweb_analytics_7.300005901\u0026_mc=smartbox_techweb_analytics_7.300005901"],"publishedSite":[""],"publishedSiteURL":[""]}]}]},"tagManagerArgs":{"dataLayer":{"pageTitle":"Google Chrome Polishes Its First Security Update","pageID":"bltb8b51aa64bdcf847","pageType":"article","pagePrimaryCategory":"risk","termSelector":{"primaryTerm":"risk","primaryTermInRealText":"Risk","primaryCategoryBelonged":"risk"},"contentLabel":"Commentary","adUnit":"3834/darkreading.home/article/risk","canonicalUrl":"","canonicalPath":"","hostname":"","contentAuthor":"George V. Hulme","contentPubDate":"Sep 09, 2008","event":"pageLoad","pageIsSponsored":false,"pageSponsor":"","byline":"","keyword":[]},"dataLayerName":"dataLayer"},"globalData":{"footer":{"_version":6,"locale":"en-us","uid":"blt2f72369f0f41c8be","ACL":{},"_in_progress":false,"copyright":{"text":"Informa PLC Informa UK Limited is a company registered in England and Wales with company number 1072954 whose registered office is 5 Howick Place, London, SW1P 1WG."},"created_at":"2021-05-29T07:25:34.562Z","created_by":"blt9a0fc67c46c47dd7","horizontal_navigation":{"link":[{"title":"Home","href":"https://tech.informa.com/"},{"title":"Cookies","href":"https://tech.informa.com/cookie-policy"},{"title":"Privacy","href":"https://tech.informa.com/privacy-policy"},{"title":"Terms","href":"https://tech.informa.com/terms-and-conditions"}]},"logo":{"image":{"uid":"blt3edeb23396a4b5dc","created_at":"2021-05-29T07:17:14.517Z","updated_at":"2021-05-29T07:17:14.517Z","created_by":"blt9a0fc67c46c47dd7","updated_by":"blt9a0fc67c46c47dd7","content_type":"image/png","file_size":"7774","tags":[],"filename":"Whitelogo_1.png","url":"https://eu-images.contentstack.com/v3/assets/blt66983808af36a8ef/blt3edeb23396a4b5dc/60b1ea7a9afdef577986633e/Whitelogo_1.png","ACL":{},"is_dir":false,"_version":1,"title":"Whitelogo_1.png","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-05-29T07:17:15.797Z","user":"blt9a0fc67c46c47dd7"}},"image_alt_text":"Informatech Logo"},"nav_links":{"link":[{"title":"Home","href":"/"},{"title":"About","href":"/about"},{"title":"Contact","href":"/contact"},{"title":"Blog","href":"/blog"}]},"one_column_navigation":{"link":[{"title":"About Us","href":"https://www.darkreading.com/about-us"},{"title":"Advertise","href":"https://www.darkreading.com/advertise"},{"title":"Reprints","href":"https://info.wrightsmedia.com/informa-licensing-reprints-request"}],"title":"Working With Us"},"social_networks":{"social_network":[{"link":{"title":"Rss","href":"https://www.darkreading.com/rss.xml"},"_metadata":{"uid":"csc2779b70d6e03c3a"},"icon_class":"fas fa-rss","active":true},{"link":{"title":"Twitter","href":"https://twitter.com/DarkReading"},"_metadata":{"uid":"csd24262af0f251c9b"},"icon_class":"fab fa-twitter","active":true},{"link":{"title":"Linkedin","href":"https://www.linkedin.com/company/dark-reading/"},"_metadata":{"uid":"cse75c5c0ea8c72705"},"icon_class":"fab fa-linkedin-in","active":true},{"link":{"title":"Facebook","href":"https://www.facebook.com/darkreadingcom"},"_metadata":{"uid":"csdbb1b7d09b01bb09"},"icon_class":"fab fa-facebook-f","active":true}],"title":"Follow Dark Reading On Social"},"tags":[],"title":"Footer","two_columns_navigation":{"link":[{"title":"Interop","href":"https://www.interop.com/"},{"title":"InformationWeek","href":"https://www.informationweek.com/"},{"title":"Network Computing","href":"https://www.networkcomputing.com/"},{"title":"ITPro Today","href":"https://www.itprotoday.com/"},{"title":"Data Center Knowledge","href":"https://www.datacenterknowledge.com/"},{"title":"Black Hat","href":"https://www.blackhat.com/"},{"title":"Omdia","href":"http://www.omdia.com/"}],"title":"Discover More From Informa Tech"},"updated_at":"2021-10-14T11:58:57.254Z","updated_by":"blt9488f204761710b3","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-10-14T11:59:04.694Z","user":"blt9488f204761710b3"}},"siteSettings":{"_version":60,"locale":"en-us","uid":"blt03ce54293658c8bc","ACL":{},"_in_progress":false,"content_type_icons":[{"content_type":"Article","icon":{"uid":"blt27dca7fd9a7ec07d","created_at":"2021-06-29T03:51:02.199Z","updated_at":"2021-06-29T03:51:02.199Z","created_by":"blt871c9fa65adba4f6","updated_by":"blt871c9fa65adba4f6","content_type":"image/svg+xml","file_size":"3327","tags":[],"filename":"Article.svg","url":"https://eu-images.contentstack.com/v3/assets/blt66983808af36a8ef/blt27dca7fd9a7ec07d/60da98a6537dbc26a0e2a2d3/Article.svg","ACL":[],"is_dir":false,"_version":1,"title":"Article.svg","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-06-29T03:51:31.680Z","user":"blt871c9fa65adba4f6"}},"_metadata":{"uid":"cs6bc72e5d7fe8d645"}},{"content_type":"Slideshow","icon":{"uid":"bltc31af506fe1f1ef3","created_at":"2021-06-23T03:08:44.113Z","updated_at":"2021-06-23T03:08:44.113Z","created_by":"blt986fc66e34c7b415","updated_by":"blt986fc66e34c7b415","content_type":"image/svg+xml","file_size":"3960","tags":[],"filename":"Vector.svg","url":"https://eu-images.contentstack.com/v3/assets/blt66983808af36a8ef/bltc31af506fe1f1ef3/60d2a5bcdd40a179d073b802/Vector.svg","ACL":{},"is_dir":false,"_version":1,"title":"Vector.svg","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-07-15T11:44:06.452Z","user":"blt986fc66e34c7b415"}},"_metadata":{"uid":"cs9b26d7221b48f0e9"}},{"content_type":"Video","icon":{"uid":"blt73d712bb4508bdd2","created_at":"2021-07-06T07:22:25.803Z","updated_at":"2021-07-06T07:22:25.803Z","created_by":"bltb064b71641a544b9","updated_by":"bltb064b71641a544b9","content_type":"image/svg+xml","file_size":"3593","tags":[],"filename":"Vector.svg","url":"https://eu-images.contentstack.com/v3/assets/blt66983808af36a8ef/blt73d712bb4508bdd2/60e404b17625b62c25ba2a74/Vector.svg","ACL":[],"is_dir":false,"_version":1,"title":"Vector.svg","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-08-09T19:11:32.637Z","user":"blt9488f204761710b3"}},"_metadata":{"uid":"csee3d099c523785a7"}}],"cookie_banner":"\u003cp data-children-count=\"0\"\u003eThis site uses cookies to provide you with the best user experience possible. By using \u003cstrong\u003eDark Reading\u003c/strong\u003e, you accept \u003ca href=\"https://tech.informa.com/cookie-policy\" target=\"_blank\"\u003eour use of cookies.\u003c/a\u003e\u003c/p\u003e","created_at":"2021-05-29T07:25:08.958Z","created_by":"blt9a0fc67c46c47dd7","homepage_seo_settings":{"meta_description":"Cyber security's comprehensive news site is now an online community for security professionals, outlining cyber threats and the technologies for defending against them.","meta_title":"Dark Reading | Security | Protect The Business"},"open_subscribe_link_on_new_tab":true,"placeholder_image":{"article":{"uid":"bltc1378ee892fc2b03","created_at":"2021-10-22T09:00:01.060Z","updated_at":"2021-10-22T09:00:01.060Z","created_by":"blt986fc66e34c7b415","updated_by":"blt986fc66e34c7b415","content_type":"image/jpeg","file_size":"19176","tags":[],"filename":"dr-logo.jpg","url":"https://eu-images.contentstack.com/v3/assets/blt66983808af36a8ef/bltc1378ee892fc2b03/61727d918e52444950791daf/dr-logo.jpg","ACL":[],"is_dir":false,"_version":1,"title":"dr-logo.jpg","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-10-22T09:00:16.437Z","user":"blt986fc66e34c7b415"}},"author":{"uid":"bltc1378ee892fc2b03","created_at":"2021-10-22T09:00:01.060Z","updated_at":"2021-10-22T09:00:01.060Z","created_by":"blt986fc66e34c7b415","updated_by":"blt986fc66e34c7b415","content_type":"image/jpeg","file_size":"19176","tags":[],"filename":"dr-logo.jpg","url":"https://eu-images.contentstack.com/v3/assets/blt66983808af36a8ef/bltc1378ee892fc2b03/61727d918e52444950791daf/dr-logo.jpg","ACL":[],"is_dir":false,"_version":1,"title":"dr-logo.jpg","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-10-22T09:00:16.437Z","user":"blt986fc66e34c7b415"}}},"site_wide_style":{"font":null,"module_style":{"heading_color":""},"navigation_style":{"color_1":"","color_2":"","gradient":false}},"social_networks":{"social_network":[{"link":{"title":"Rss","href":"https://www.darkreading.com/rss.xml"},"_metadata":{"uid":"cs1b60c654a4c98515"},"icon_class":"fas fa-rss","open_new_tab":true,"active":true},{"link":{"title":"Twitter","href":"https://twitter.com/DarkReading"},"_metadata":{"uid":"csb40560d5b45c67c0"},"icon_class":"fab fa-twitter","open_new_tab":true,"active":true},{"link":{"title":"Linkedin","href":"https://www.linkedin.com/company/dark-reading/"},"_metadata":{"uid":"csb7b068ffddb2508a"},"icon_class":"fab fa-linkedin-in","open_new_tab":true,"active":true},{"link":{"title":"Facebook","href":"https://www.facebook.com/darkreadingcom/"},"_metadata":{"uid":"cs1c83b83e0ac18d5d"},"icon_class":"fab fa-facebook-f","open_new_tab":true,"active":true}],"title":"Follow DR:"},"subscribe_link":{"title":"Subscribe","href":"https://www.darkreading.com/newsletter-signup/?_mc=dr_header"},"switch_board":{"iris_recommendation":false},"tags":[],"title":"Dark Reading | Security | Protect The Business","updated_at":"2021-10-22T09:00:05.958Z","updated_by":"blt986fc66e34c7b415","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-10-22T09:00:16.448Z","user":"blt986fc66e34c7b415"}},"announcements":[[{"_version":2,"locale":"en-us","uid":"blt2603ce5ebe5ffc1e","_in_progress":false,"active":true,"content":"Cybersecurity Outlook 2022 | A FREE Dark Reading \u0026 Black Hat Virtual Event | December 8, 2021 \u003cREGISTER NOW\u003e","created_at":"2021-11-19T19:20:06.726Z","created_by":"blt86eeaee2e17f91dc","link":{"title":"Get Your Passs","href":"https://vts.informaengage.com/cybersecurity_outlook_2022/?keycode=drsitebell"},"open_in_new_tab":true,"tags":["cybersecurity","black hat","dark reading","threats"],"title":"Cyber 12/8 Event","type_of_announcement":"Event","updated_at":"2021-11-19T19:23:38.555Z","updated_by":"blt86eeaee2e17f91dc","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-11-19T19:23:47.608Z","user":"blt86eeaee2e17f91dc"}},{"_version":1,"locale":"en-us","uid":"blt519da728790c0f5c","ACL":{},"_in_progress":false,"active":true,"content":"Check out our NEW section called \"DR Tech\" for comprehensive coverage of new \u0026 emerging cybersecurity technology.","created_at":"2021-10-26T13:22:21.425Z","created_by":"blt86eeaee2e17f91dc","link":{"title":"Read More","href":"https://www.darkreading.com/dr-tech"},"open_in_new_tab":true,"tags":["cybersecurity","technology","darktrace"],"title":"DR Tech","type_of_announcement":"Alert","updated_at":"2021-10-26T13:22:21.425Z","updated_by":"blt86eeaee2e17f91dc","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-10-26T13:22:41.276Z","user":"blt86eeaee2e17f91dc"}}]],"navigation":{"site_information":{"left_column":{"description":"Dark Reading is part of the Informa Tech Division of Informa PLC","links":[{"link":{"href":"https://informa.com/About-Us/","title":"About Us","__typename":"Link"},"open_new_tab":true,"__typename":"DrNavigationV2SiteInformationLeftColumnLinks"},{"link":{"href":"https://informa.com/","title":"Informa PLC","__typename":"Link"},"open_new_tab":true,"__typename":"DrNavigationV2SiteInformationLeftColumnLinks"},{"link":{"href":"https://informa.com/Investors/","title":"Investor Relations","__typename":"Link"},"open_new_tab":true,"__typename":"DrNavigationV2SiteInformationLeftColumnLinks"},{"link":{"href":"https://informa.com/Talent/","title":"Talent","__typename":"Link"},"open_new_tab":true,"__typename":"DrNavigationV2SiteInformationLeftColumnLinks"}],"__typename":"DrNavigationV2SiteInformationLeftColumn"},"right_column":{"description":"This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.","__typename":"DrNavigationV2SiteInformationRightColumn"},"__typename":"DrNavigationV2SiteInformation"},"search":{"link":{"href":"https://www.darkreading.com/about-us/d/d-id/1113937","title":"Search","__typename":"Link"},"open_new_tab":true,"__typename":"DrNavigationV2Search"},"reports":{"enabled":true,"navigation_link_title":"Resources","links":[{"link":"https://www.informationweek.com/whitepaper/Security","link_text":"White Papers \u003e","open_in_new_tab":true,"__typename":"DrNavigationV2ReportsLinks"},{"link":"https://www.darkreading.com/archives.asp?section_id=315","link_text":"Reports \u003e","open_in_new_tab":true,"__typename":"DrNavigationV2ReportsLinks"},{"link":"https://www.darkreading.com/current-issues","link_text":"Issues \u003e","open_in_new_tab":true,"__typename":"DrNavigationV2ReportsLinks"},{"link":"https://www.informationweek.com/whitepaper","link_text":"Tech Library \u003e","open_in_new_tab":true,"__typename":"DrNavigationV2ReportsLinks"},{"link":"/latest/slideshow","link_text":"Slideshows \u003e","open_in_new_tab":true,"__typename":"DrNavigationV2ReportsLinks"},{"link":"https://www.darkreading.com/videos.asp","link_text":"Videos \u003e","open_in_new_tab":true,"__typename":"DrNavigationV2ReportsLinks"}],"__typename":"DrNavigationV2Reports"},"logo":{"logo_title":"DR","image_alt_text":"Dark Reading Logo","site_mobile_logoConnection":{"edges":[{"node":{"url":"https://eu-images.contentstack.com/v3/assets/blt66983808af36a8ef/blt4ff4a7f9bc8e31f7/619f4fb0a0cb8076d613e3ba/Dark_Reading_Logo.svg","__typename":"SysAsset"},"__typename":"SysAssetEdge"}],"__typename":"SysAssetConnection"},"logo_imageConnection":{"edges":[{"node":{"url":"https://eu-images.contentstack.com/v3/assets/blt66983808af36a8ef/blt4ff4a7f9bc8e31f7/619f4fb0a0cb8076d613e3ba/Dark_Reading_Logo.svg","__typename":"SysAsset"},"__typename":"SysAssetEdge"}],"__typename":"SysAssetConnection"},"__typename":"DrNavigationV2Logo"},"feature_links":[{"enabled":true,"display_as_link":true,"navigation_link_title":"Featured","navigation_links":[{"navigation_link_title":"The Edge","text_link":"/edge","navigation_link_background_color":"#9f110d","__typename":"DrNavigationV2FeatureLinksNavigationLinks"},{"navigation_link_title":"DR Tech","text_link":"/dr-tech","navigation_link_background_color":"#9f110d","__typename":"DrNavigationV2FeatureLinksNavigationLinks"}],"links":[{"brand_logoConnection":{"edges":[{"node":{"url":"https://eu-images.contentstack.com/v3/assets/blt66983808af36a8ef/blt0242302270d4c8c5/616053aef0756e7ad17a2766/TheEdge-Logo-K.png","__typename":"SysAsset"},"__typename":"SysAssetEdge"}],"__typename":"SysAssetConnection"},"image_alt_text":"The Edge Logo","link_text":"The Edge","link":"/edge","open_in_new_tab":true,"__typename":"DrNavigationV2FeatureLinksLinks"},{"brand_logoConnection":{"edges":[{"node":{"url":"https://eu-images.contentstack.com/v3/assets/blt66983808af36a8ef/blt13a7bb63bbc84ea1/615573a9486c9a5b53694fea/DR_Technology_Logo_Black.png","__typename":"SysAsset"},"__typename":"SysAssetEdge"}],"__typename":"SysAssetConnection"},"image_alt_text":"DR Technology Logo","link_text":"DR Technology","link":"/dr-tech","open_in_new_tab":true,"__typename":"DrNavigationV2FeatureLinksLinks"}],"__typename":"DrNavigationV2FeatureLinks"}],"events":{"enabled":true,"navigation_link_title":"Events","smartbox":[{"smartbox_entryConnection":{"edges":[{"node":{"type":"Live Events","title":"Events","system":{"uid":"blt8b6a33909c49602f","__typename":"EntrySystemField"},"__typename":"DrSmartbox"},"__typename":"DrNavigationV2EventsSmartboxSmartboxEntryEdge"}],"__typename":"DrNavigationV2EventsSmartboxSmartboxEntryConnection"},"__typename":"DrNavigationV2EventsSmartbox"},{"smartbox_entryConnection":{"edges":[{"node":{"type":"Webinars","title":"Webinars","system":{"uid":"blt8f82585c522cc0f5","__typename":"EntrySystemField"},"__typename":"DrSmartbox"},"__typename":"DrNavigationV2EventsSmartboxSmartboxEntryEdge"}],"__typename":"DrNavigationV2EventsSmartboxSmartboxEntryConnection"},"__typename":"DrNavigationV2EventsSmartbox"}],"__typename":"DrNavigationV2Events"},"topics":{"enabled":true,"navigation_link_title":"Sections","casual_links":{"topic_linkConnection":{"edges":[{"node":{"title":"Breaches","expanded_title":"Attacks / Breaches","url":"/attacks-breaches","system":{"uid":"blt785557489e965a0e","__typename":"EntrySystemField"},"__typename":"DrTopicPrimary"},"__typename":"DrNavigationV2TopicsCasualLinksTopicLinkEdge"},{"node":{"title":"Cloud","expanded_title":"Cloud","url":"/cloud","system":{"uid":"blte0b20eea18da92ac","__typename":"EntrySystemField"},"__typename":"DrTopicPrimary"},"__typename":"DrNavigationV2TopicsCasualLinksTopicLinkEdge"},{"node":{"title":"IoT","expanded_title":"IoT","url":"/iot","system":{"uid":"blt015364f303d8cd5c","__typename":"EntrySystemField"},"__typename":"DrTopicPrimary"},"__typename":"DrNavigationV2TopicsCasualLinksTopicLinkEdge"},{"node":{"title":"Physical","expanded_title":"Physical Security","url":"/physical-security","system":{"uid":"blt67964a3f25e5e5bc","__typename":"EntrySystemField"},"__typename":"DrTopicPrimary"},"__typename":"DrNavigationV2TopicsCasualLinksTopicLinkEdge"},{"node":{"title":"Perimeter","expanded_title":"Perimeter","url":"/perimeter","system":{"uid":"bltdad7410202520cf3","__typename":"EntrySystemField"},"__typename":"DrTopicPrimary"},"__typename":"DrNavigationV2TopicsCasualLinksTopicLinkEdge"},{"node":{"title":"Analytics","expanded_title":"Analytics","url":"/analytics","system":{"uid":"blt77fe1b1ed6a4cb2b","__typename":"EntrySystemField"},"__typename":"DrTopicPrimary"},"__typename":"DrNavigationV2TopicsCasualLinksTopicLinkEdge"},{"node":{"title":"App Sec","expanded_title":"App Sec","url":"/application-security","system":{"uid":"blt5becbd3781fc8e16","__typename":"EntrySystemField"},"__typename":"DrTopicPrimary"},"__typename":"DrNavigationV2TopicsCasualLinksTopicLinkEdge"},{"node":{"title":"Risk","expanded_title":"Risk","url":"/risk","system":{"uid":"bltb4fa098465367813","__typename":"EntrySystemField"},"__typename":"DrTopicPrimary"},"__typename":"DrNavigationV2TopicsCasualLinksTopicLinkEdge"},{"node":{"title":"Threat Intel","expanded_title":"Threat Intelligence","url":"/threat-intelligence","system":{"uid":"blta3feccd65c5cd514","__typename":"EntrySystemField"},"__typename":"DrTopicPrimary"},"__typename":"DrNavigationV2TopicsCasualLinksTopicLinkEdge"},{"node":{"title":"Endpoint","expanded_title":"Endpoint","url":"/endpoint","system":{"uid":"bltca5b5d25e0e89c28","__typename":"EntrySystemField"},"__typename":"DrTopicPrimary"},"__typename":"DrNavigationV2TopicsCasualLinksTopicLinkEdge"},{"node":{"title":"Vulns / Threats","expanded_title":"Vulnerabilities / Threats","url":"/vulnerabilities-threats","system":{"uid":"blt7299bec9b19d3040","__typename":"EntrySystemField"},"__typename":"DrTopicPrimary"},"__typename":"DrNavigationV2TopicsCasualLinksTopicLinkEdge"},{"node":{"title":"Ops","expanded_title":"Operations","url":"/operations","system":{"uid":"blt30a5d434863af8a0","__typename":"EntrySystemField"},"__typename":"DrTopicPrimary"},"__typename":"DrNavigationV2TopicsCasualLinksTopicLinkEdge"}],"__typename":"DrNavigationV2TopicsCasualLinksTopicLinkConnection"},"__typename":"DrNavigationV2TopicsCasualLinks"},"__typename":"DrNavigationV2Topics"},"connect":{"brand_engagement_section":{"brand_engagement_moduleConnection":{"edges":[{"node":{"system":{"uid":"bltfd75a966494c9e3c","__typename":"EntrySystemField"},"section_1":{"cta_button_link":"https://www.darkreading.com/?ngAction=register","cta_button_text":"REGISTER","link_target":"Open in new window","section_description":"\u003cul\u003e\u003cli\u003eGain full access to resources (events, white paper, webinars, reports, etc.)\u003c/li\u003e\u003cli\u003eSingle sign-on to all Informa products\u003c/li\u003e\u003c/ul\u003e","section_eyebrow":"Register for a","section_title":"Dark Reading Account","__typename":"DrBrandEngagementSection1"},"section_2":{"cta_button_link":"https://www.darkreading.com/newsletter-signup/?_mc=dr_header","cta_button_text":"SUBSCRIBE","link_target":"Open in new window","section_description":"\u003cp\u003eGet daily Dark Reading top stories every morning straight into your inbox\u003c/p\u003e","section_eyebrow":"Subscribe to the","section_title":"Dark Reading newsletter","__typename":"DrBrandEngagementSection2"},"section_3":{"cta_button_link":"/facebook","cta_button_text":"Facebook","link_target":"Open in new window","section_description":"\u003cp\u003eFollow us @darkreading to stay up-to-date with the latest news \u0026 insider information about events \u0026 more\u003c/p\u003e","section_eyebrow":"Follow us","section_title":"@DarkReading","__typename":"DrBrandEngagementSection3"},"include_social_links_in_section_3":"Yes","__typename":"DrBrandEngagement"},"__typename":"DrNavigationV2ConnectBrandEngagementSectionBrandEngagementModuleEdge"}],"__typename":"DrNavigationV2ConnectBrandEngagementSectionBrandEngagementModuleConnection"},"__typename":"DrNavigationV2ConnectBrandEngagementSection"},"enabled":false,"navigation_link_title":"Connect","our_network_section":{"enabled":true,"label":"Our Network:","links":[{"brand_logoConnection":{"edges":[{"node":{"url":"https://eu-images.contentstack.com/v3/assets/blt66983808af36a8ef/blt365fc6c2647d15e5/60b1e96052bd6156414f3422/bh_logo_black_1.png","__typename":"SysAsset"},"__typename":"SysAssetEdge"}],"__typename":"SysAssetConnection"},"link":"https://www.blackhat.com/","link_text":"Black Hat","open_new_tab":false,"image_alt_text":"","__typename":"DrNavigationV2ConnectOurNetworkSectionLinks"},{"brand_logoConnection":{"edges":[{"node":{"url":"https://eu-images.contentstack.com/v3/assets/blt66983808af36a8ef/blt5e638427fb7992eb/60b9b81d1ffed8575f140e47/OMDIA_LOGO_BLACK_2_with_extra_height.png","__typename":"SysAsset"},"__typename":"SysAssetEdge"}],"__typename":"SysAssetConnection"},"link":"https://omdia.tech.informa.com/topic-pages/cybersecurity?promo=OmdiaDR","link_text":"OMDIA","open_new_tab":true,"image_alt_text":"","__typename":"DrNavigationV2ConnectOurNetworkSectionLinks"},{"brand_logoConnection":{"edges":[{"node":{"url":"https://eu-images.contentstack.com/v3/assets/blt66983808af36a8ef/blt621a6404bafa0c4d/60b1e8c8d64f195504537b9a/IWK-Color_heigh_adjusted.png","__typename":"SysAsset"},"__typename":"SysAssetEdge"}],"__typename":"SysAssetConnection"},"link":"https://www.informationweek.com","link_text":"InformationWeek","open_new_tab":true,"image_alt_text":"","__typename":"DrNavigationV2ConnectOurNetworkSectionLinks"}],"__typename":"DrNavigationV2ConnectOurNetworkSection"},"links":[{"link":"/about-us","link_text":"About us","open_in_new_tab":true,"__typename":"DrNavigationV2ConnectLinks"},{"link":"https://www.darkreading.com/advertise","link_text":"Advertise with us","open_in_new_tab":true,"__typename":"DrNavigationV2ConnectLinks"},{"link":"https://info.wrightsmedia.com/informa-licensing-reprints-request","link_text":"Reprints","open_in_new_tab":true,"__typename":"DrNavigationV2ConnectLinks"}],"__typename":"DrNavigationV2Connect"},"__typename":"DrNavigationV2"},"navPromotedTopics":{"topics":{"promoted_links":{"topic_linkConnection":{"edges":[{"node":{"title":"Black Hat news","url":"https://www.darkreading.com/black-hat.asp","system":{"uid":"blt58877ad235079f24","__typename":"EntrySystemField"},"__typename":"DrTopicOthers"},"__typename":"DrNavigationV2TopicsPromotedLinksTopicLinkEdge"},{"node":{"title":"Omdia Research","url":"https://www.darkreading.com/omdia.asp","system":{"uid":"blt7757a7dced09e4cc","__typename":"EntrySystemField"},"__typename":"DrTopicOthers"},"__typename":"DrNavigationV2TopicsPromotedLinksTopicLinkEdge"},{"node":{"title":"Security Now","url":"https://www.darkreading.com/security-now.asp","system":{"uid":"blt62de504b94f13f55","__typename":"EntrySystemField"},"__typename":"DrTopicOthers"},"__typename":"DrNavigationV2TopicsPromotedLinksTopicLinkEdge"}],"__typename":"DrNavigationV2TopicsPromotedLinksTopicLinkConnection"},"__typename":"DrNavigationV2TopicsPromotedLinks"},"__typename":"DrNavigationV2Topics"},"__typename":"DrNavigationV2"},"navFeaturedTopics":{"topics":{"featured_sections":{"enabled":true,"topic_linkConnection":{"edges":[{"node":{"title":"The Edge","name":"The Edge","url":"/edge","system":{"uid":"blt1ac900de55b45e3b","__typename":"EntrySystemField"},"__typename":"DrTopicSecondary"},"__typename":"DrNavigationV2TopicsFeaturedSectionsTopicLinkEdge"},{"node":{"title":"Dr Tech","name":"Dark Reading Technology","url":"/dr-tech","system":{"uid":"blta9155e90e5f8030b","__typename":"EntrySystemField"},"__typename":"DrTopicSecondary"},"__typename":"DrNavigationV2TopicsFeaturedSectionsTopicLinkEdge"}],"__typename":"DrNavigationV2TopicsFeaturedSectionsTopicLinkConnection"},"__typename":"DrNavigationV2TopicsFeaturedSections"},"__typename":"DrNavigationV2Topics"},"__typename":"DrNavigationV2"},"topicsWithChild":[{"title":"Omdia","url":"/omdia","expanded_title":"Omdia","topics_secondary":[],"seo":{"meta_title":"","meta_description":"","meta_keywords":"","canonical_url":""},"tags":[],"locale":"en-us","uid":"bltcbdbf86a0551d8bb","created_by":"blta3dd47a38c602549","updated_by":"blta3dd47a38c602549","created_at":"2021-09-29T10:56:10.231Z","updated_at":"2021-09-29T10:56:10.231Z","ACL":{},"_version":1,"_in_progress":false,"publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-09-29T10:57:01.003Z","user":"blta3dd47a38c602549"},"_owner":{"uid":"blta3dd47a38c602549","created_at":"2021-05-21T10:05:50.070Z","updated_at":"2021-11-11T17:07:02.196Z","email":"john.ely@informa.com","username":"john_blt665706a5","first_name":"John","last_name":"Ely","org_uid":[],"shared_org_uid":["blt5948195ac13977b0"],"mobile_number":"07877953454","country_code":"44","tfa_status":"verified","authy_id":"378049479","active":true,"profile_type":"business","failed_attempts":0,"settings":{"preferences":{"global":[],"stack":[]}}}},{"title":"Vulns / Threats","url":"/vulnerabilities-threats","topics_secondary":[{"_version":6,"locale":"en-us","uid":"bltc0595d7ad0a824f9","ACL":{},"_in_progress":false,"created_at":"2021-05-29T07:24:46.154Z","created_by":"blt9a0fc67c46c47dd7","name":"Advanced Threats","seo":{"meta_title":"Advanced Threats","meta_description":"Advanced Threats","meta_keywords":"","canonical_url":""},"tags":[],"title":"[Vulnerabilities / Threats] Advanced Threats","updated_at":"2021-07-20T13:53:43.004Z","updated_by":"blta3dd47a38c602549","url":"/advanced-threats","_content_type_uid":"dr_topic_secondary","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-07-20T13:53:45.886Z","user":"blta3dd47a38c602549"}},{"_version":2,"locale":"en-us","uid":"blt48c537ccb149ce69","ACL":{},"_in_progress":false,"created_at":"2021-05-29T07:24:36.088Z","created_by":"blt9a0fc67c46c47dd7","name":"Insider Threats","seo":{"meta_title":"Insider Threats","meta_description":"Insider Threats","meta_keywords":"","canonical_url":""},"tags":[],"title":"[Vulnerabilities / Threats] Insider Threats","updated_at":"2021-07-20T13:50:08.841Z","updated_by":"blta3dd47a38c602549","url":"/insider-threats","_content_type_uid":"dr_topic_secondary","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-07-20T13:52:54.877Z","user":"blta3dd47a38c602549"}},{"_version":2,"locale":"en-us","uid":"blt841a890c83604b92","ACL":{},"_in_progress":false,"created_at":"2021-05-29T07:24:37.215Z","created_by":"blt9a0fc67c46c47dd7","name":"Vulnerability Management","seo":{"meta_title":"Vulnerability Management","meta_description":"Vulnerability Management","meta_keywords":"","canonical_url":""},"tags":[],"title":"[Vulnerabilities / Threats] Vulnerability Management","updated_at":"2021-07-20T13:49:38.788Z","updated_by":"blta3dd47a38c602549","url":"/vulnerability-management","_content_type_uid":"dr_topic_secondary","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-07-20T13:49:41.689Z","user":"blta3dd47a38c602549"}}],"seo":{"meta_title":"Vulnerabilities / Threats","meta_description":"Vulnerabilities / Threats","meta_keywords":"","canonical_url":""},"tags":[],"locale":"en-us","ACL":{},"expanded_title":"Vulnerabilities / Threats","uid":"blt7299bec9b19d3040","created_by":"blt9a0fc67c46c47dd7","updated_by":"blt441f3cf9519ce96f","created_at":"2021-05-29T07:24:52.174Z","updated_at":"2021-09-28T06:59:11.602Z","_version":8,"_in_progress":false,"publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-09-28T10:32:40.219Z","user":"blta3dd47a38c602549"}},{"_version":6,"locale":"en-us","uid":"blt30a5d434863af8a0","ACL":{},"_in_progress":false,"created_at":"2021-05-29T07:24:50.221Z","created_by":"blt9a0fc67c46c47dd7","expanded_title":"Operations","seo":{"meta_title":"Operations","meta_description":"Operations","meta_keywords":"","canonical_url":""},"tags":[],"title":"Ops","topics_secondary":[{"_version":2,"locale":"en-us","uid":"bltc66bc15dc564597f","ACL":{},"_in_progress":false,"created_at":"2021-05-29T07:24:45.214Z","created_by":"blt9a0fc67c46c47dd7","name":"Identity \u0026 Access Management","seo":{"meta_title":"Identity \u0026 Access Management","meta_description":"Identity \u0026 Access Management","meta_keywords":"","canonical_url":""},"tags":[],"title":"[Operations] Identity \u0026 Access Management","updated_at":"2021-07-20T13:49:05.230Z","updated_by":"blta3dd47a38c602549","url":"/identity-and-access-management","_content_type_uid":"dr_topic_secondary","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-07-20T13:49:08.073Z","user":"blta3dd47a38c602549"}},{"_version":11,"locale":"en-us","uid":"blte7df9c155852d974","ACL":{},"_in_progress":false,"created_at":"2021-05-29T07:24:47.100Z","created_by":"blt9a0fc67c46c47dd7","name":"Careers \u0026 People","seo":{"meta_title":"Careers \u0026 People","meta_description":"Careers \u0026 People","meta_keywords":"","canonical_url":""},"tags":[],"title":"[Operations] Careers \u0026 People","updated_at":"2021-07-20T12:08:28.689Z","updated_by":"blt986fc66e34c7b415","url":"/careers-and-people","_content_type_uid":"dr_topic_secondary","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-07-20T12:09:57.002Z","user":"blt986fc66e34c7b415"}}],"updated_at":"2021-07-21T15:26:00.567Z","updated_by":"blta3dd47a38c602549","url":"/operations","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-07-21T15:26:04.309Z","user":"blta3dd47a38c602549"}},{"_version":4,"locale":"en-us","uid":"blt015364f303d8cd5c","ACL":{},"_in_progress":false,"created_at":"2021-05-29T07:24:48.288Z","created_by":"blt9a0fc67c46c47dd7","expanded_title":"IoT","seo":{"meta_title":"IoT","meta_description":"IoT","meta_keywords":"","canonical_url":""},"tags":[],"title":"IoT","topics_secondary":[],"updated_at":"2021-07-20T13:40:09.253Z","updated_by":"blta3dd47a38c602549","url":"/iot","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-07-20T13:40:13.450Z","user":"blta3dd47a38c602549"}},{"_version":3,"locale":"en-us","uid":"blt5becbd3781fc8e16","ACL":{},"_in_progress":false,"created_at":"2021-05-29T07:24:49.312Z","created_by":"blt9a0fc67c46c47dd7","expanded_title":"App Sec","seo":{"meta_title":"Application Security","meta_description":"Application Security","meta_keywords":"","canonical_url":""},"tags":[],"title":"App Sec","topics_secondary":[{"_version":2,"locale":"en-us","uid":"blte50120ff0518141d","ACL":{},"_in_progress":false,"created_at":"2021-05-29T07:24:40.692Z","created_by":"blt9a0fc67c46c47dd7","name":"Database Security","seo":{"meta_title":"Database Security","meta_description":"Database Security","meta_keywords":"","canonical_url":""},"tags":[],"title":"[App Sec] Database Security","updated_at":"2021-07-20T13:57:36.610Z","updated_by":"blta3dd47a38c602549","url":"/database-security","_content_type_uid":"dr_topic_secondary","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-07-20T13:57:39.438Z","user":"blta3dd47a38c602549"}}],"updated_at":"2021-07-20T13:39:48.018Z","updated_by":"blta3dd47a38c602549","url":"/application-security","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-07-20T13:39:51.054Z","user":"blta3dd47a38c602549"}},{"_version":3,"locale":"en-us","uid":"blt8edc1edf78525eb9","ACL":{},"_in_progress":false,"created_at":"2021-05-29T07:25:00.989Z","created_by":"blt9a0fc67c46c47dd7","expanded_title":"The Edge","seo":{"meta_title":"The Edge","meta_description":"The Edge","meta_keywords":"","canonical_url":""},"tags":[],"title":"The Edge","topics_secondary":[],"updated_at":"2021-07-20T13:38:58.206Z","updated_by":"blta3dd47a38c602549","url":"/edge","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-07-20T13:39:02.803Z","user":"blta3dd47a38c602549"}},{"_version":3,"locale":"en-us","uid":"blt77fe1b1ed6a4cb2b","ACL":{},"_in_progress":false,"created_at":"2021-05-29T07:24:59.745Z","created_by":"blt9a0fc67c46c47dd7","expanded_title":"Analytics","seo":{"meta_title":"Security Analytics","meta_description":"Security Analytics","meta_keywords":"","canonical_url":""},"tags":[],"title":"Analytics","topics_secondary":[{"_version":2,"locale":"en-us","uid":"blta62ac100505a8b0e","ACL":{},"_in_progress":false,"created_at":"2021-05-29T07:24:38.443Z","created_by":"blt9a0fc67c46c47dd7","name":"Security Monitoring","seo":{"meta_title":"Security Monitoring","meta_description":"Security Monitoring","meta_keywords":"","canonical_url":""},"tags":[],"title":"[Analytics] Security Monitoring","updated_at":"2021-07-20T13:56:52.288Z","updated_by":"blta3dd47a38c602549","url":"/security-monitoring","_content_type_uid":"dr_topic_secondary","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-07-20T13:56:55.022Z","user":"blta3dd47a38c602549"}}],"updated_at":"2021-07-20T13:33:48.424Z","updated_by":"blta3dd47a38c602549","url":"/analytics","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-07-20T13:33:51.625Z","user":"blta3dd47a38c602549"}},{"_version":3,"locale":"en-us","uid":"bltdad7410202520cf3","ACL":{},"_in_progress":false,"created_at":"2021-05-29T07:24:56.377Z","created_by":"blt9a0fc67c46c47dd7","expanded_title":"Perimeter","seo":{"meta_title":"Network Perimeter Security","meta_description":"Network Perimeter Security","meta_keywords":"","canonical_url":""},"tags":[],"title":"Perimeter","topics_secondary":[],"updated_at":"2021-07-20T13:33:14.890Z","updated_by":"blta3dd47a38c602549","url":"/perimeter","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-07-20T13:33:17.858Z","user":"blta3dd47a38c602549"}},{"_version":3,"locale":"en-us","uid":"bltb4fa098465367813","ACL":{},"_in_progress":false,"created_at":"2021-05-29T07:24:54.324Z","created_by":"blt9a0fc67c46c47dd7","expanded_title":"Risk","seo":{"meta_title":"Risk Management","meta_description":"Risk Management","meta_keywords":"","canonical_url":""},"tags":[],"title":"Risk","topics_secondary":[{"_version":2,"locale":"en-us","uid":"bltb0f5be1fbdfcb41a","ACL":{},"_in_progress":false,"created_at":"2021-05-29T07:24:44.181Z","created_by":"blt9a0fc67c46c47dd7","name":"Compliance","seo":{"meta_title":"Compliance","meta_description":"Compliance","meta_keywords":"","canonical_url":""},"tags":[],"title":"[Risk] Compliance","updated_at":"2021-07-20T13:55:48.317Z","updated_by":"blta3dd47a38c602549","url":"/compliance","_content_type_uid":"dr_topic_secondary","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-07-20T13:55:51.514Z","user":"blta3dd47a38c602549"}}],"updated_at":"2021-07-20T13:32:29.960Z","updated_by":"blta3dd47a38c602549","url":"/risk","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-07-20T13:32:33.370Z","user":"blta3dd47a38c602549"}},{"_version":3,"locale":"en-us","uid":"bltca5b5d25e0e89c28","ACL":{},"_in_progress":false,"created_at":"2021-05-29T07:24:55.338Z","created_by":"blt9a0fc67c46c47dd7","expanded_title":"Endpoint","seo":{"meta_title":"Endpoint Security","meta_description":"Endpoint Security","meta_keywords":"","canonical_url":""},"tags":[],"title":"Endpoint","topics_secondary":[{"_version":2,"locale":"en-us","uid":"bltfe4d91925f7db0e1","ACL":{},"_in_progress":false,"created_at":"2021-05-29T07:24:39.671Z","created_by":"blt9a0fc67c46c47dd7","name":"Authentication","seo":{"meta_title":"Authentication","meta_description":"Authentication","meta_keywords":"","canonical_url":""},"tags":[],"title":"[Endpoint] Authentication","updated_at":"2021-07-20T13:54:16.648Z","updated_by":"blta3dd47a38c602549","url":"/authentication","_content_type_uid":"dr_topic_secondary","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-07-20T13:54:19.302Z","user":"blta3dd47a38c602549"}},{"_version":2,"locale":"en-us","uid":"bltbce9bffab0b743c9","ACL":{},"_in_progress":false,"created_at":"2021-05-29T07:24:42.861Z","created_by":"blt9a0fc67c46c47dd7","name":"Mobile Security","seo":{"meta_title":"Mobile Security","meta_description":"Mobile Security","meta_keywords":"","canonical_url":""},"tags":[],"title":"[Endpoint] Mobile","updated_at":"2021-07-20T13:55:17.618Z","updated_by":"blta3dd47a38c602549","url":"/mobile","_content_type_uid":"dr_topic_secondary","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-07-20T13:55:20.835Z","user":"blta3dd47a38c602549"}},{"_version":2,"locale":"en-us","uid":"bltd4b54e4cff686e47","ACL":{},"_in_progress":false,"created_at":"2021-05-29T07:24:41.940Z","created_by":"blt9a0fc67c46c47dd7","name":"Privacy","seo":{"meta_title":"Privacy","meta_description":"Privacy","meta_keywords":"","canonical_url":""},"tags":[],"title":"[Endpoint] Privacy","updated_at":"2021-07-20T13:54:46.246Z","updated_by":"blta3dd47a38c602549","url":"/privacy","_content_type_uid":"dr_topic_secondary","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-07-20T13:54:49.414Z","user":"blta3dd47a38c602549"}}],"updated_at":"2021-07-20T13:32:03.273Z","updated_by":"blta3dd47a38c602549","url":"/endpoint","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-07-20T13:32:06.396Z","user":"blta3dd47a38c602549"}},{"_version":3,"locale":"en-us","uid":"blt67964a3f25e5e5bc","ACL":{},"_in_progress":false,"created_at":"2021-05-29T07:24:53.196Z","created_by":"blt9a0fc67c46c47dd7","expanded_title":"Physical Security","seo":{"meta_title":"Physical Security","meta_description":"Physical Security","meta_keywords":"","canonical_url":""},"tags":[],"title":"Physical","topics_secondary":[],"updated_at":"2021-07-20T13:30:47.664Z","updated_by":"blta3dd47a38c602549","url":"/physical-security","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-07-20T13:30:50.834Z","user":"blta3dd47a38c602549"}},{"_version":6,"locale":"en-us","uid":"blta3feccd65c5cd514","ACL":{},"_in_progress":false,"created_at":"2021-05-29T07:24:51.151Z","created_by":"blt9a0fc67c46c47dd7","expanded_title":"Threat Intelligence","seo":{"meta_title":"Threat Intel","meta_description":"Threat Intel","meta_keywords":"","canonical_url":""},"tags":[],"title":"Threat Intel","topics_secondary":[],"updated_at":"2021-07-20T13:26:19.607Z","updated_by":"blta3dd47a38c602549","url":"/threat-intelligence","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-07-20T13:26:22.770Z","user":"blta3dd47a38c602549"}},{"_version":3,"locale":"en-us","uid":"blte0b20eea18da92ac","ACL":{},"_in_progress":false,"created_at":"2021-05-29T07:24:58.718Z","created_by":"blt9a0fc67c46c47dd7","expanded_title":"Cloud","seo":{"meta_title":"Cloud","meta_description":"Cloud","meta_keywords":"","canonical_url":""},"tags":[],"title":"Cloud","topics_secondary":[],"updated_at":"2021-07-20T12:12:46.726Z","updated_by":"blta3dd47a38c602549","url":"/cloud","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-07-20T12:12:50.045Z","user":"blta3dd47a38c602549"}},{"_version":3,"locale":"en-us","uid":"blt785557489e965a0e","ACL":{},"_in_progress":false,"created_at":"2021-05-29T07:24:57.504Z","created_by":"blt9a0fc67c46c47dd7","expanded_title":"Attacks / Breaches","seo":{"meta_title":"Attacks / Breaches","meta_description":"Attacks / Breaches","meta_keywords":"","canonical_url":""},"tags":[],"title":"Breaches","topics_secondary":[],"updated_at":"2021-07-20T12:11:31.270Z","updated_by":"blta3dd47a38c602549","url":"/attacks-breaches","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-07-20T12:11:34.853Z","user":"blta3dd47a38c602549"}},{"title":"Topic primary 1","url":"/topic-primary-1","expanded_title":"topic primary 1","topics_secondary":[{"_version":11,"locale":"en-us","uid":"blte7df9c155852d974","ACL":{},"_in_progress":false,"created_at":"2021-05-29T07:24:47.100Z","created_by":"blt9a0fc67c46c47dd7","name":"Careers \u0026 People","seo":{"meta_title":"Careers \u0026 People","meta_description":"Careers \u0026 People","meta_keywords":"","canonical_url":""},"tags":[],"title":"[Operations] Careers \u0026 People","updated_at":"2021-07-20T12:08:28.689Z","updated_by":"blt986fc66e34c7b415","url":"/careers-and-people","_content_type_uid":"dr_topic_secondary","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-07-20T12:09:57.002Z","user":"blt986fc66e34c7b415"}},{"_version":6,"locale":"en-us","uid":"bltc0595d7ad0a824f9","ACL":{},"_in_progress":false,"created_at":"2021-05-29T07:24:46.154Z","created_by":"blt9a0fc67c46c47dd7","name":"Advanced Threats","seo":{"meta_title":"Advanced Threats","meta_description":"Advanced Threats","meta_keywords":"","canonical_url":""},"tags":[],"title":"[Vulnerabilities / Threats] Advanced Threats","updated_at":"2021-07-20T13:53:43.004Z","updated_by":"blta3dd47a38c602549","url":"/advanced-threats","_content_type_uid":"dr_topic_secondary","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-07-20T13:53:45.886Z","user":"blta3dd47a38c602549"}},{"_version":2,"locale":"en-us","uid":"bltc66bc15dc564597f","ACL":{},"_in_progress":false,"created_at":"2021-05-29T07:24:45.214Z","created_by":"blt9a0fc67c46c47dd7","name":"Identity \u0026 Access Management","seo":{"meta_title":"Identity \u0026 Access Management","meta_description":"Identity \u0026 Access Management","meta_keywords":"","canonical_url":""},"tags":[],"title":"[Operations] Identity \u0026 Access Management","updated_at":"2021-07-20T13:49:05.230Z","updated_by":"blta3dd47a38c602549","url":"/identity-and-access-management","_content_type_uid":"dr_topic_secondary","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-07-20T13:49:08.073Z","user":"blta3dd47a38c602549"}},{"_version":2,"locale":"en-us","uid":"bltb0f5be1fbdfcb41a","ACL":{},"_in_progress":false,"created_at":"2021-05-29T07:24:44.181Z","created_by":"blt9a0fc67c46c47dd7","name":"Compliance","seo":{"meta_title":"Compliance","meta_description":"Compliance","meta_keywords":"","canonical_url":""},"tags":[],"title":"[Risk] Compliance","updated_at":"2021-07-20T13:55:48.317Z","updated_by":"blta3dd47a38c602549","url":"/compliance","_content_type_uid":"dr_topic_secondary","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-07-20T13:55:51.514Z","user":"blta3dd47a38c602549"}},{"_version":2,"locale":"en-us","uid":"bltbce9bffab0b743c9","ACL":{},"_in_progress":false,"created_at":"2021-05-29T07:24:42.861Z","created_by":"blt9a0fc67c46c47dd7","name":"Mobile Security","seo":{"meta_title":"Mobile Security","meta_description":"Mobile Security","meta_keywords":"","canonical_url":""},"tags":[],"title":"[Endpoint] Mobile","updated_at":"2021-07-20T13:55:17.618Z","updated_by":"blta3dd47a38c602549","url":"/mobile","_content_type_uid":"dr_topic_secondary","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-07-20T13:55:20.835Z","user":"blta3dd47a38c602549"}},{"_version":2,"locale":"en-us","uid":"bltd4b54e4cff686e47","ACL":{},"_in_progress":false,"created_at":"2021-05-29T07:24:41.940Z","created_by":"blt9a0fc67c46c47dd7","name":"Privacy","seo":{"meta_title":"Privacy","meta_description":"Privacy","meta_keywords":"","canonical_url":""},"tags":[],"title":"[Endpoint] Privacy","updated_at":"2021-07-20T13:54:46.246Z","updated_by":"blta3dd47a38c602549","url":"/privacy","_content_type_uid":"dr_topic_secondary","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-07-20T13:54:49.414Z","user":"blta3dd47a38c602549"}}],"seo":{"meta_title":"","meta_description":"","meta_keywords":"","canonical_url":""},"tags":[],"locale":"en-us","uid":"blt7b335051f439bf6d","created_by":"blt986fc66e34c7b415","updated_by":"blt986fc66e34c7b415","created_at":"2021-07-13T09:41:01.186Z","updated_at":"2021-07-13T09:41:01.186Z","ACL":{},"_version":1,"_in_progress":false,"publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-07-14T09:45:45.870Z","user":"blt8d6e4671551ab970"},"_owner":{"uid":"blt986fc66e34c7b415","created_at":"2021-05-21T10:05:50.073Z","updated_at":"2021-11-24T13:46:06.762Z","email":"thao.pham@xpondigital.com","username":"thao_blt340f44d8","first_name":"Thao","last_name":"Pham","org_uid":[],"shared_org_uid":["blt5948195ac13977b0"],"mobile_number":"932225058","country_code":"84","tfa_status":"verified","authy_id":"378405624","active":true,"profile_type":"developer","failed_attempts":0,"settings":{"preferences":{"global":[],"stack":[]}}}}],"categories":[{"_version":10,"locale":"en-us","uid":"blt0db4b40b15bb3ca2","ACL":{},"_in_progress":false,"branding":{"image_alt_text":"Dark Reading Technology Logo","hub_page_color":"000000","hub_page_description_with_hyperlink":"\u003cp\u003eTech News and Analysis\u003c/p\u003e","hub_page_logo":{"uid":"blte2d0d4f2e812b871","created_at":"2021-09-30T08:22:01.619Z","updated_at":"2021-09-30T08:22:01.619Z","created_by":"blta3dd47a38c602549","updated_by":"blta3dd47a38c602549","content_type":"image/png","file_size":"8009","tags":[],"filename":"DR_Technology_Logo_White.png","url":"https://eu-images.contentstack.com/v3/assets/blt66983808af36a8ef/blte2d0d4f2e812b871/615573a972a0487ccb343d41/DR_Technology_Logo_White.png","ACL":[],"is_dir":false,"parent_uid":"blt966fbf792d032939","_version":1,"title":"DR_Technology_Logo_White.png","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-10-01T12:34:45.120Z","user":"blta3dd47a38c602549"}}},"created_at":"2021-09-10T17:46:13.387Z","created_by":"blta3dd47a38c602549","display_options":"Modular View","icon":null,"image_alt_text":"DarkTrace Sponsor Logo","modules":{"module_blocks":[{"uid":"blt2bf72304a6aba7a2","_content_type_uid":"dr_featured_content"},{"uid":"blt81cfb8f03ba8dbbd","_content_type_uid":"dr_module_article_promo"},{"uid":"blt60343bf2d91f1598","_content_type_uid":"dr_module_article_promo"},{"uid":"bltb2833b9c1bc25adc","_content_type_uid":"dr_module_latest_content"}]},"over_the_edge":[],"secondary_categories":[{"title":"[DR-TECH] The Cyber Future","secondary_category_name":"The Cyber Future","slug":"the-cyber-future","shown_in_header":true,"branding":{"hub_page_logo":null,"image_alt_text":"","hub_page_description":"","hub_page_color":""},"sponsor_text":"","sponsor_logo":null,"image_alt_text":"","over_the_edge":[],"display_options":"Standard View","modules":{"module_blocks":[]},"seo":{"meta_title":"","meta_description":"","meta_keywords":"","canonical_url":""},"icon":null,"topic_page_description":"","tags":[],"locale":"en-us","uid":"bltc11ff98f98398512","created_by":"blta3dd47a38c602549","updated_by":"blta3dd47a38c602549","created_at":"2021-09-10T17:49:59.274Z","updated_at":"2021-09-10T17:49:59.274Z","_content_type_uid":"dr_category_secondary","ACL":{},"_version":1,"_in_progress":false,"publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-10-01T12:34:45.095Z","user":"blta3dd47a38c602549"}},{"_version":1,"locale":"en-us","uid":"bltb60f3c528a3177f8","ACL":{},"_in_progress":false,"branding":{"hub_page_logo":null,"image_alt_text":"","hub_page_description":"","hub_page_color":""},"created_at":"2021-09-10T17:49:23.472Z","created_by":"blta3dd47a38c602549","display_options":"Standard View","icon":null,"image_alt_text":"","modules":{"module_blocks":[]},"over_the_edge":[],"secondary_category_name":"Emerging Tech","seo":{"meta_title":"","meta_description":"","meta_keywords":"","canonical_url":""},"shown_in_header":true,"slug":"emerging-tech","sponsor_logo":null,"sponsor_text":"","tags":[],"title":"[DR-TECH] Emerging Tech","topic_page_description":"","updated_at":"2021-09-10T17:49:23.472Z","updated_by":"blta3dd47a38c602549","_content_type_uid":"dr_category_secondary","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-10-01T14:12:01.048Z","user":"blta3dd47a38c602549"}},{"title":"[DR-TECH] Tech Talks","secondary_category_name":"Tech Talks","slug":"tech-talks","shown_in_header":true,"branding":{"hub_page_logo":null,"image_alt_text":"","hub_page_description":"","hub_page_color":""},"sponsor_text":"","sponsor_logo":null,"image_alt_text":"","over_the_edge":[],"display_options":"Standard View","modules":{"module_blocks":[]},"seo":{"meta_title":"","meta_description":"","meta_keywords":"","canonical_url":""},"icon":null,"topic_page_description":"","tags":[],"locale":"en-us","uid":"bltb9fce7117e1d3083","created_by":"blta3dd47a38c602549","updated_by":"blta3dd47a38c602549","created_at":"2021-09-10T17:48:56.310Z","updated_at":"2021-09-10T17:48:56.310Z","_content_type_uid":"dr_category_secondary","ACL":{},"_version":1,"_in_progress":false,"publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-10-01T12:34:45.102Z","user":"blta3dd47a38c602549"}},{"title":"[DR-TECH] Tech Trends","secondary_category_name":"Tech Trends","slug":"tech-trends","shown_in_header":true,"branding":{"hub_page_logo":null,"image_alt_text":"","hub_page_description":"","hub_page_color":""},"sponsor_text":"","sponsor_logo":null,"image_alt_text":"","over_the_edge":[],"display_options":"Standard View","modules":{"module_blocks":[]},"seo":{"meta_title":"","meta_description":"","meta_keywords":"","canonical_url":""},"icon":null,"topic_page_description":"","tags":[],"locale":"en-us","uid":"blt54beaadb3c555193","created_by":"blta3dd47a38c602549","updated_by":"blta3dd47a38c602549","created_at":"2021-09-10T17:48:10.159Z","updated_at":"2021-09-10T17:48:10.159Z","_content_type_uid":"dr_category_secondary","ACL":{},"_version":1,"_in_progress":false,"publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-10-01T12:34:45.114Z","user":"blta3dd47a38c602549"}}],"seo":{"meta_title":"","meta_description":"","meta_keywords":"","canonical_url":""},"slug":"dr-tech","sponsor_logo":{"uid":"bltd370140258da7318","created_at":"2021-09-29T10:24:20.334Z","updated_at":"2021-09-29T10:24:20.334Z","created_by":"blta3dd47a38c602549","updated_by":"blta3dd47a38c602549","content_type":"image/png","file_size":"495532","tags":[],"filename":"Logo_PNG_transparent_for_light_backgrounds_(6).png","url":"https://eu-images.contentstack.com/v3/assets/blt66983808af36a8ef/bltd370140258da7318/61543ed4486c9a5b53694d9c/Logo_PNG_transparent_for_light_backgrounds_(6).png","ACL":[],"is_dir":false,"_version":1,"title":"Logo_PNG_transparent_for_light_backgrounds_(6).png","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-10-01T12:34:45.126Z","user":"blta3dd47a38c602549"}},"sponsor_text":"Brought to you by","tags":[],"title":"DR Tech","topic_page_description":"","updated_at":"2021-10-27T16:40:52.427Z","updated_by":"blt7639e1b0bae9533a","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-10-27T17:57:22.105Z","user":"blt7639e1b0bae9533a"},"_owner":{"uid":"blta3dd47a38c602549","created_at":"2021-05-21T10:05:50.070Z","updated_at":"2021-11-11T17:07:02.196Z","email":"john.ely@informa.com","username":"john_blt665706a5","first_name":"John","last_name":"Ely","org_uid":[],"shared_org_uid":["blt5948195ac13977b0"],"mobile_number":"07877953454","country_code":"44","tfa_status":"verified","authy_id":"378049479","active":true,"profile_type":"business","failed_attempts":0,"settings":{"preferences":{"global":[],"stack":[]}}}},{"_version":25,"locale":"en-us","uid":"blt47ebc4f3a45cfe48","ACL":{},"_in_progress":false,"branding":{"hub_page_color":"000000","image_alt_text":"Omdia Logo","hub_page_description_with_hyperlink":"\u003cp\u003eEnterprise cybersecurity technology\u003c/p\u003e\n\u003cp\u003eresearch that connects the dots \u003cstrong\u003e|\u003c/strong\u003e\u0026nbsp;\u003ca href=\"https://omdia.tech.informa.com/\" target=\"_blank\"\u003eLearn more\u003c/a\u003e\u003c/p\u003e","hub_page_logo":{"uid":"blt41661bfd68149993","created_at":"2021-09-23T02:34:37.142Z","updated_at":"2021-09-23T02:34:37.142Z","created_by":"blt986fc66e34c7b415","updated_by":"blt986fc66e34c7b415","content_type":"image/png","file_size":"9803","tags":[],"filename":"Vector.png","url":"https://eu-images.contentstack.com/v3/assets/blt66983808af36a8ef/blt41661bfd68149993/614be7bd6db99f25817e6c21/Vector.png","ACL":[],"is_dir":false,"_version":1,"title":"Vector.png","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-10-25T13:38:23.525Z","user":"blt9488f204761710b3"}}},"created_at":"2021-06-16T21:12:18.733Z","created_by":"blt9488f204761710b3","display_options":"Modular View","icon":null,"image_alt_text":"","modules":{"module_blocks":[{"uid":"blt7ef981a3c49f83e4","_content_type_uid":"dr_module_article_promo"},{"uid":"blt06b0e4fcb74a2904","_content_type_uid":"dr_module_jobs"},{"uid":"bltb08e2126c3aea60b","_content_type_uid":"dr_modular_external_link"},{"uid":"blt74c7a7dbe5919173","_content_type_uid":"dr_module_article_promo"},{"uid":"bltf0145cf743710573","_content_type_uid":"dr_module_latest_content_grid"}]},"over_the_edge":[],"secondary_categories":[],"seo":{"canonical_url":"","meta_description":"","meta_keywords":"","meta_title":""},"slug":"omdia","sponsor_logo":null,"sponsor_text":"","tags":[],"title":"Omdia","topic_page_description":"","updated_at":"2021-10-25T14:47:52.644Z","updated_by":"blt9488f204761710b3","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-10-25T14:48:02.732Z","user":"blt9488f204761710b3"},"_owner":{"uid":"blt9488f204761710b3","created_at":"2021-05-21T10:05:50.071Z","updated_at":"2021-11-22T13:07:40.552Z","email":"roma.nowak@informa.com","username":"roma_blt4d352a9b","first_name":"roma","last_name":"nowak","org_uid":[],"shared_org_uid":["blt5948195ac13977b0"],"mobile_number":"5167901481","country_code":"1","tfa_status":"verified","authy_id":"375656345","active":true,"profile_type":"business","failed_attempts":0,"settings":{"preferences":{"global":[],"stack":[]}}}},{"_version":147,"locale":"en-us","uid":"blt7a29bd8a29d3130b","ACL":{},"_in_progress":false,"branding":{"hub_page_color":"000000","image_alt_text":"Edge Logo","hub_page_description_with_hyperlink":"\u003cp\u003eCybersecurity In-Depth\u003c/p\u003e","hub_page_logo":{"uid":"blt482d47e4fd046239","created_at":"2021-10-08T14:20:30.584Z","updated_at":"2021-10-08T14:20:30.584Z","created_by":"blta3dd47a38c602549","updated_by":"blta3dd47a38c602549","content_type":"image/png","file_size":"4884","tags":[],"filename":"TheEdge-Logo-0.png","url":"https://eu-images.contentstack.com/v3/assets/blt66983808af36a8ef/blt482d47e4fd046239/616053ae5cf2461e097404d8/TheEdge-Logo-0.png","ACL":[],"is_dir":false,"parent_uid":"blt966fbf792d032939","_version":1,"title":"TheEdge-Logo-0.png","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-10-08T14:21:25.169Z","user":"blta3dd47a38c602549"}}},"created_at":"2021-05-29T07:25:25.978Z","created_by":"blt9a0fc67c46c47dd7","display_options":"Modular View","icon":{"uid":"blt71d0c82ac88e4a31","created_at":"2021-07-06T15:42:02.848Z","updated_at":"2021-07-06T15:42:02.848Z","created_by":"blt6fb043d513578596","updated_by":"blt6fb043d513578596","content_type":"image/svg+xml","file_size":"2063","tags":[],"filename":"edge-icon.svg","url":"https://eu-images.contentstack.com/v3/assets/blt66983808af36a8ef/blt71d0c82ac88e4a31/60e479ca8a827b2db9435744/edge-icon.svg","ACL":[],"is_dir":false,"_version":1,"title":"edge-icon.svg","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-07-15T10:42:31.929Z","user":"blt986fc66e34c7b415"}},"image_alt_text":"Cisco Secure Logo","modules":{"module_blocks":[{"uid":"blt0a4a76389ec40ec6","_content_type_uid":"dr_featured_content"},{"uid":"blt2a13fe94a98405cd","_content_type_uid":"dr_module_article_promo"},{"uid":"bltefdbbe29deef8414","_content_type_uid":"dr_module_article_promo"},{"uid":"blt801b94c10208828e","_content_type_uid":"dr_module_latest_content"}]},"over_the_edge":[],"secondary_categories":[{"title":"[Edge] Edge Articles","secondary_category_name":"Edge Articles","slug":"edge-articles","shown_in_header":true,"tags":[],"locale":"en-us","ACL":{},"uid":"bltb7711dfcd24f1fc0","created_by":"blt9a0fc67c46c47dd7","updated_by":"bltd42a02bbb36b3e5a","created_at":"2021-05-29T07:25:49.625Z","updated_at":"2021-08-16T14:14:55.417Z","_content_type_uid":"dr_category_secondary","_version":38,"_in_progress":false,"display_options":"Standard View","seo":{"canonical_url":"","meta_description":"In-Depth feature articles, analysis, and commentary on cybersecurity trends and best practices.","meta_keywords":"","meta_title":"Edge Articles"},"branding":{"hub_page_color":"000000","hub_page_description":"Cybersecurity In-Depth","hub_page_logo":{"uid":"blt2bc2d9dd689b0def","created_at":"2021-06-07T21:43:29.490Z","updated_at":"2021-06-07T21:43:29.490Z","created_by":"bltfcb3d125bf8c49ee","updated_by":"bltfcb3d125bf8c49ee","content_type":"image/png","file_size":"4813","tags":[],"filename":"TheEdge-Logo.png","url":"https://eu-images.contentstack.com/v3/assets/blt66983808af36a8ef/blt2bc2d9dd689b0def/60be930173c30c216ca2a004/TheEdge-Logo.png","ACL":{},"is_dir":false,"_version":1,"title":"TheEdge-Logo.png","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-07-15T11:49:43.071Z","user":"blt986fc66e34c7b415"}},"image_alt_text":""},"over_the_edge":[],"icon":{"uid":"bltf050bd5685cd6a94","created_at":"2021-07-06T15:53:38.409Z","updated_at":"2021-07-06T15:53:38.409Z","created_by":"blt6fb043d513578596","updated_by":"blt6fb043d513578596","content_type":"image/svg+xml","file_size":"3222","tags":[],"filename":"edge-article-icon.svg","url":"https://eu-images.contentstack.com/v3/assets/blt66983808af36a8ef/bltf050bd5685cd6a94/60e47c8244e9812aec444767/edge-article-icon.svg","ACL":[],"is_dir":false,"_version":1,"title":"edge-article-icon.svg","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-07-15T11:54:17.246Z","user":"blt986fc66e34c7b415"}},"modules":{"module_blocks":[{"uid":"blt55f69db552b42fc5","_content_type_uid":"dr_featured_content"},{"uid":"blt801b94c10208828e","_content_type_uid":"dr_module_latest_content"},{"uid":"blt9f39009ce8b52f70","_content_type_uid":"dr_module_resources"},{"uid":"bltd7445f1ff824a078","_content_type_uid":"dr_module_resources"},{"uid":"bltf1ee7bc225dd915b","_content_type_uid":"dr_section_promo"},{"uid":"blt4725d57fc3584241","_content_type_uid":"dr_module_article_promo"}]},"sponsor_logo":{"uid":"blt9530bed6d2dcb64c","created_at":"2021-06-28T08:17:36.843Z","updated_at":"2021-08-02T07:04:21.820Z","created_by":"blta3dd47a38c602549","updated_by":"blt986fc66e34c7b415","content_type":"image/png","file_size":"23612","tags":[],"filename":"CiscoSecureLogo_1500x400_cropped.png","url":"https://eu-images.contentstack.com/v3/assets/blt66983808af36a8ef/blt9530bed6d2dcb64c/60d985a074c5412532fcc5b3/CiscoSecureLogo_1500x400_cropped.png","ACL":[],"is_dir":false,"parent_uid":null,"_version":2,"title":"CiscoSecureLogo_1500x400_cropped.png","description":"Cisco Secure Logo","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-08-17T12:06:36.931Z","user":"blt986fc66e34c7b415"},"permanent_url":"https://eu-images.contentstack.com/v3/assets/blt66983808af36a8ef/blt9530bed6d2dcb64c/CiscoSecureLogo_1500x400_cropped.png"},"sponsor_text":"Brought to you by","topic_page_description":"In-Depth feature articles, analysis, and commentary on cybersecurity trends and best practices.","image_alt_text":"","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-08-17T12:06:36.918Z","user":"blt986fc66e34c7b415"}},{"_version":38,"locale":"en-us","uid":"blt3a5a059746d0ef60","ACL":{},"_in_progress":false,"branding":{"hub_page_color":"","hub_page_description":"","hub_page_logo":null},"created_at":"2021-05-29T07:25:48.749Z","created_by":"blt9a0fc67c46c47dd7","display_options":"Standard View","icon":null,"modules":{"module_blocks":[{"uid":"blt0a4a76389ec40ec6","_content_type_uid":"dr_featured_content"},{"uid":"bltefdbbe29deef8414","_content_type_uid":"dr_module_article_promo"},{"uid":"blt2a13fe94a98405cd","_content_type_uid":"dr_module_article_promo"},{"uid":"blt801b94c10208828e","_content_type_uid":"dr_module_latest_content"}]},"over_the_edge":[],"secondary_category_name":"Edge Ask the Experts","seo":{"canonical_url":"","meta_description":"A forum for cybersecurity professionals to ask questions and get answers about IT security threats and best practices.","meta_keywords":"","meta_title":"Edge Ask the Experts"},"shown_in_header":true,"slug":"edge-ask-the-experts","sponsor_logo":null,"sponsor_text":"","tags":[],"title":"[Edge] Edge Ask the Experts","topic_page_description":"A forum for cybersecurity professionals to ask questions and get answers about IT security threats and best practices.","updated_at":"2021-07-21T02:55:50.043Z","updated_by":"blt986fc66e34c7b415","_content_type_uid":"dr_category_secondary","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-07-21T02:55:54.234Z","user":"blt986fc66e34c7b415"}},{"title":"[Edge] Edge Slideshows","secondary_category_name":"Edge Slideshows","slug":"edge-slideshows","shown_in_header":true,"tags":[],"locale":"en-us","ACL":{},"uid":"blt224b0dfefd4bcafa","created_by":"blt9a0fc67c46c47dd7","updated_by":"bltfcb3d125bf8c49ee","created_at":"2021-05-29T07:25:38.968Z","updated_at":"2021-09-22T15:29:57.373Z","_content_type_uid":"dr_category_secondary","_version":11,"_in_progress":false,"branding":{"hub_page_color":"000000","hub_page_description":"Cybersecurity In-Depth","hub_page_logo":{"uid":"blt2bc2d9dd689b0def","created_at":"2021-06-07T21:43:29.490Z","updated_at":"2021-06-07T21:43:29.490Z","created_by":"bltfcb3d125bf8c49ee","updated_by":"bltfcb3d125bf8c49ee","content_type":"image/png","file_size":"4813","tags":[],"filename":"TheEdge-Logo.png","url":"https://eu-images.contentstack.com/v3/assets/blt66983808af36a8ef/blt2bc2d9dd689b0def/60be930173c30c216ca2a004/TheEdge-Logo.png","ACL":{},"is_dir":false,"_version":1,"title":"TheEdge-Logo.png","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-07-15T11:49:43.071Z","user":"blt986fc66e34c7b415"}},"image_alt_text":""},"display_options":"Standard View","icon":null,"modules":{"module_blocks":[]},"over_the_edge":[],"seo":{"canonical_url":"","meta_description":"Images, illustrations, and graphics describing emerging cybersecurity threats and best practices.","meta_keywords":"","meta_title":"Edge Slideshows | Dark Reading"},"sponsor_logo":{"uid":"blt9530bed6d2dcb64c","created_at":"2021-06-28T08:17:36.843Z","updated_at":"2021-08-02T07:04:21.820Z","created_by":"blta3dd47a38c602549","updated_by":"blt986fc66e34c7b415","content_type":"image/png","file_size":"23612","tags":[],"filename":"CiscoSecureLogo_1500x400_cropped.png","url":"https://eu-images.contentstack.com/v3/assets/blt66983808af36a8ef/blt9530bed6d2dcb64c/60d985a074c5412532fcc5b3/CiscoSecureLogo_1500x400_cropped.png","ACL":[],"is_dir":false,"parent_uid":null,"_version":2,"title":"CiscoSecureLogo_1500x400_cropped.png","description":"Cisco Secure Logo","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-08-17T12:06:36.931Z","user":"blt986fc66e34c7b415"},"permanent_url":"https://eu-images.contentstack.com/v3/assets/blt66983808af36a8ef/blt9530bed6d2dcb64c/CiscoSecureLogo_1500x400_cropped.png"},"sponsor_text":"Brought to you by","topic_page_description":"Images, illustrations, and graphics describing emerging cybersecurity threats and best practices.","image_alt_text":"","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-09-28T11:07:16.170Z","user":"blt986fc66e34c7b415"}},{"_version":14,"locale":"en-us","uid":"bltcda9b1fc00b570f2","ACL":{},"_in_progress":false,"branding":{"hub_page_color":"000000","hub_page_description":"Cybersecurity In-Depth","hub_page_logo":{"uid":"blt2bc2d9dd689b0def","created_at":"2021-06-07T21:43:29.490Z","updated_at":"2021-06-07T21:43:29.490Z","created_by":"bltfcb3d125bf8c49ee","updated_by":"bltfcb3d125bf8c49ee","content_type":"image/png","file_size":"4813","tags":[],"filename":"TheEdge-Logo.png","url":"https://eu-images.contentstack.com/v3/assets/blt66983808af36a8ef/blt2bc2d9dd689b0def/60be930173c30c216ca2a004/TheEdge-Logo.png","ACL":{},"is_dir":false,"_version":1,"title":"TheEdge-Logo.png","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-07-15T11:49:43.071Z","user":"blt986fc66e34c7b415"}}},"created_at":"2021-05-29T07:25:51.768Z","created_by":"blt9a0fc67c46c47dd7","display_options":"Standard View","icon":null,"modules":{"module_blocks":[]},"over_the_edge":[],"secondary_category_name":"Edge Threat Monitor","seo":{"canonical_url":"","meta_description":"Graphic data and analysis of emerging cybersecurity attacks, threats, and trends.","meta_keywords":"","meta_title":"Edge Threat Monitor"},"shown_in_header":true,"slug":"edge-threat-monitor","sponsor_logo":{"uid":"blt9530bed6d2dcb64c","created_at":"2021-06-28T08:17:36.843Z","updated_at":"2021-08-02T07:04:21.820Z","created_by":"blta3dd47a38c602549","updated_by":"blt986fc66e34c7b415","content_type":"image/png","file_size":"23612","tags":[],"filename":"CiscoSecureLogo_1500x400_cropped.png","url":"https://eu-images.contentstack.com/v3/assets/blt66983808af36a8ef/blt9530bed6d2dcb64c/60d985a074c5412532fcc5b3/CiscoSecureLogo_1500x400_cropped.png","ACL":[],"is_dir":false,"parent_uid":null,"_version":2,"title":"CiscoSecureLogo_1500x400_cropped.png","description":"Cisco Secure Logo","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-08-17T12:06:36.931Z","user":"blt986fc66e34c7b415"},"permanent_url":"https://eu-images.contentstack.com/v3/assets/blt66983808af36a8ef/blt9530bed6d2dcb64c/CiscoSecureLogo_1500x400_cropped.png"},"sponsor_text":"Brought to you by","tags":[],"title":"[Edge] Edge Threat Monitor","topic_page_description":"Graphic data and analysis of emerging cybersecurity attacks, threats, and trends.","updated_at":"2021-07-15T12:00:28.715Z","updated_by":"blta3dd47a38c602549","_content_type_uid":"dr_category_secondary","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-07-15T12:00:31.469Z","user":"blta3dd47a38c602549"}}],"seo":{"canonical_url":"","meta_description":"Dark Reading’s Features section, offering in-depth perspectives on cybersecurity threats, vulnerabilities, and best practices for enterprise IT professionals.","meta_keywords":"","meta_title":"Edge"},"slug":"edge","sponsor_logo":{"uid":"blt9530bed6d2dcb64c","created_at":"2021-06-28T08:17:36.843Z","updated_at":"2021-08-02T07:04:21.820Z","created_by":"blta3dd47a38c602549","updated_by":"blt986fc66e34c7b415","content_type":"image/png","file_size":"23612","tags":[],"filename":"CiscoSecureLogo_1500x400_cropped.png","url":"https://eu-images.contentstack.com/v3/assets/blt66983808af36a8ef/blt9530bed6d2dcb64c/60d985a074c5412532fcc5b3/CiscoSecureLogo_1500x400_cropped.png","ACL":[],"is_dir":false,"parent_uid":null,"_version":2,"title":"CiscoSecureLogo_1500x400_cropped.png","description":"Cisco Secure Logo","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-08-17T12:06:36.931Z","user":"blt986fc66e34c7b415"},"permanent_url":"https://eu-images.contentstack.com/v3/assets/blt66983808af36a8ef/blt9530bed6d2dcb64c/CiscoSecureLogo_1500x400_cropped.png"},"sponsor_text":"Brought to you by","tags":[],"title":"Edge","topic_page_description":"Dark Reading’s Features section, offering in-depth perspectives on cybersecurity threats, vulnerabilities, and best practices for enterprise IT professionals.","updated_at":"2021-10-08T14:21:19.572Z","updated_by":"blta3dd47a38c602549","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-10-08T14:21:25.180Z","user":"blta3dd47a38c602549"}},{"_version":21,"locale":"en-us","uid":"blt2ad9c5595f143d37","ACL":{},"_in_progress":false,"branding":{"hub_page_color":"000000","hub_page_description":"","hub_page_logo":[]},"created_at":"2021-05-29T07:25:16.736Z","created_by":"blt9a0fc67c46c47dd7","display_options":"Standard View","icon":null,"modules":{"module_blocks":[]},"over_the_edge":[],"secondary_categories":[],"seo":{"canonical_url":"","meta_description":"IoT","meta_keywords":"","meta_title":"IoT"},"slug":"iot","sponsor_logo":null,"sponsor_text":"","tags":[],"title":"IoT","topic_page_description":"","updated_at":"2021-07-20T11:41:57.386Z","updated_by":"blta3dd47a38c602549","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-07-20T11:42:00.184Z","user":"blta3dd47a38c602549"}},{"_version":5,"locale":"en-us","uid":"blta6cab0108fb2fe2d","ACL":{},"_in_progress":false,"branding":{"hub_page_color":"000000","hub_page_description":"","hub_page_logo":[]},"created_at":"2021-05-29T07:25:21.501Z","created_by":"blt9a0fc67c46c47dd7","display_options":"Standard View","icon":null,"modules":{"module_blocks":[]},"over_the_edge":[],"secondary_categories":[{"_version":2,"locale":"en-us","uid":"blt3a07a5f6f122df83","ACL":{},"_in_progress":false,"branding":{"hub_page_color":"","hub_page_description":"","hub_page_logo":null},"created_at":"2021-05-29T07:25:45.829Z","created_by":"blt9a0fc67c46c47dd7","display_options":"Standard View","icon":null,"modules":{"module_blocks":[]},"over_the_edge":[],"secondary_category_name":"Advanced Threats","seo":{"canonical_url":"","meta_description":"Advanced Threats","meta_keywords":"","meta_title":"Advanced Threats"},"shown_in_header":true,"slug":"advanced-threats","sponsor_logo":null,"sponsor_text":"","tags":[],"title":"[Vulnerabilities/Threats] Advanced Threats","topic_page_description":"","updated_at":"2021-07-16T11:10:36.838Z","updated_by":"blta3dd47a38c602549","_content_type_uid":"dr_category_secondary","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-07-20T11:43:56.836Z","user":"blta3dd47a38c602549"}},{"_version":2,"locale":"en-us","uid":"blt2e8d75e7e5494295","ACL":{},"_in_progress":false,"branding":{"hub_page_color":"","hub_page_description":"","hub_page_logo":null},"created_at":"2021-05-29T07:25:44.920Z","created_by":"blt9a0fc67c46c47dd7","display_options":"Standard View","icon":null,"modules":{"module_blocks":[]},"over_the_edge":[],"secondary_category_name":"Insider Threats","seo":{"canonical_url":"","meta_description":"Insider Threats","meta_keywords":"","meta_title":"Insider Threats"},"shown_in_header":true,"slug":"insider-threats","sponsor_logo":null,"sponsor_text":"","tags":[],"title":"[Vulnerabilities/Threats] Insider Threats","topic_page_description":"","updated_at":"2021-07-16T11:07:19.341Z","updated_by":"blta3dd47a38c602549","_content_type_uid":"dr_category_secondary","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-07-20T11:43:31.039Z","user":"blta3dd47a38c602549"}},{"_version":3,"locale":"en-us","uid":"blteb326d2311783787","ACL":{},"_in_progress":false,"branding":{"hub_page_color":"","hub_page_description":"","hub_page_logo":null},"created_at":"2021-05-29T07:25:47.773Z","created_by":"blt9a0fc67c46c47dd7","display_options":"Standard View","icon":null,"modules":{"module_blocks":[]},"over_the_edge":[],"secondary_category_name":"Vulnerability Management","seo":{"canonical_url":"","meta_description":"Vulnerability Management","meta_keywords":"","meta_title":"Vulnerability Management"},"shown_in_header":true,"slug":"vulnerability-management","sponsor_logo":null,"sponsor_text":"","tags":[],"title":"{Vulnerabilities/Threats] Vulnerability Management","topic_page_description":"","updated_at":"2021-07-20T08:20:16.855Z","updated_by":"blt986fc66e34c7b415","_content_type_uid":"dr_category_secondary","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-07-20T11:42:56.421Z","user":"blta3dd47a38c602549"}}],"seo":{"canonical_url":"","meta_description":"Vulnerabilities / Threats","meta_keywords":"","meta_title":"Vulnerabilities / Threats"},"slug":"vulnerabilities-threats","sponsor_logo":null,"sponsor_text":"","tags":[],"title":"Vulnerabilities/Threats","topic_page_description":"","updated_at":"2021-07-20T11:30:24.817Z","updated_by":"blta3dd47a38c602549","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-07-20T11:32:28.239Z","user":"blta3dd47a38c602549"},"_version_name":{"title":"Version 5","updated_by":"bltfcb3d125bf8c49ee","updated_at":"2021-07-20T12:03:44.253Z"}},{"_version":3,"locale":"en-us","uid":"bltd1eb4d6946b90153","ACL":{},"_in_progress":false,"branding":{"hub_page_color":"000000","hub_page_description":"","hub_page_logo":[]},"created_at":"2021-05-29T07:25:27.087Z","created_by":"blt9a0fc67c46c47dd7","display_options":"Standard View","icon":null,"modules":{"module_blocks":[]},"over_the_edge":[],"secondary_categories":[],"seo":{"canonical_url":"","meta_description":"Careers \u0026 People","meta_keywords":"","meta_title":"Careers \u0026 People"},"slug":"careers-and-people","sponsor_logo":null,"sponsor_text":"","tags":[],"title":"Careers \u0026 People","topic_page_description":"","updated_at":"2021-07-19T18:30:55.801Z","updated_by":"blta3dd47a38c602549","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-07-20T11:35:40.733Z","user":"blta3dd47a38c602549"}},{"_version":3,"locale":"en-us","uid":"bltf294cb1507e8f8f0","ACL":{},"_in_progress":false,"branding":{"hub_page_color":"000000","hub_page_description":"","hub_page_logo":[]},"created_at":"2021-05-29T07:25:23.818Z","created_by":"blt9a0fc67c46c47dd7","display_options":"Standard View","icon":null,"modules":{"module_blocks":[]},"over_the_edge":[],"secondary_categories":[],"seo":{"canonical_url":"","meta_description":"Mobile","meta_keywords":"","meta_title":"Mobile"},"slug":"mobile","sponsor_logo":null,"sponsor_text":"","tags":[],"title":"Mobile","topic_page_description":"","updated_at":"2021-07-19T18:30:30.396Z","updated_by":"blta3dd47a38c602549","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-07-20T11:45:35.614Z","user":"blta3dd47a38c602549"}},{"_version":4,"locale":"en-us","uid":"blta96d37f2f5d942cf","ACL":{},"_in_progress":false,"branding":{"hub_page_color":"000000","hub_page_description":"","hub_page_logo":[]},"created_at":"2021-05-29T07:25:15.618Z","created_by":"blt9a0fc67c46c47dd7","display_options":"Standard View","icon":null,"modules":{"module_blocks":[]},"over_the_edge":[],"secondary_categories":[],"seo":{"canonical_url":"","meta_description":"Perimeter","meta_keywords":"","meta_title":"Perimeter"},"slug":"perimeter","sponsor_logo":null,"sponsor_text":"","tags":[],"title":"Perimeter","topic_page_description":"Network Perimeter Security - News \u0026 Commentary","updated_at":"2021-07-19T12:41:47.657Z","updated_by":"blta3dd47a38c602549","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-07-20T11:39:42.868Z","user":"blta3dd47a38c602549"}},{"_version":3,"locale":"en-us","uid":"blt153276da84f3050e","ACL":{},"_in_progress":false,"branding":{"hub_page_color":"000000","hub_page_description":"","hub_page_logo":[]},"created_at":"2021-05-29T07:25:24.935Z","created_by":"blt9a0fc67c46c47dd7","display_options":"Standard View","icon":null,"modules":{"module_blocks":[]},"over_the_edge":[],"secondary_categories":[{"title":"[App-Sec] Database Security","secondary_category_name":"Database Security","slug":"database-security","shown_in_header":true,"tags":[],"locale":"en-us","ACL":{},"uid":"blt185c79bc5185685f","created_by":"blt9a0fc67c46c47dd7","updated_by":"blta3dd47a38c602549","created_at":"2021-05-29T07:25:42.038Z","updated_at":"2021-07-16T11:21:34.290Z","_content_type_uid":"dr_category_secondary","_version":2,"_in_progress":false,"branding":{"hub_page_color":"","hub_page_description":"","hub_page_logo":null},"display_options":"Standard View","icon":null,"modules":{"module_blocks":[]},"over_the_edge":[],"seo":{"canonical_url":"","meta_description":"Database Security","meta_keywords":"","meta_title":"Database Security"},"sponsor_logo":null,"sponsor_text":"","topic_page_description":"","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-07-20T11:41:13.664Z","user":"blta3dd47a38c602549"}}],"seo":{"canonical_url":"","meta_description":"Application Security","meta_keywords":"","meta_title":"Application Security"},"slug":"application-security","sponsor_logo":null,"sponsor_text":"","tags":[],"title":"Application Security","topic_page_description":"","updated_at":"2021-07-16T10:07:06.182Z","updated_by":"blta3dd47a38c602549","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-07-20T11:41:13.672Z","user":"blta3dd47a38c602549"}},{"_version":4,"locale":"en-us","uid":"blt318dca99b92ea6b7","ACL":{},"_in_progress":false,"branding":{"hub_page_color":"000000","hub_page_description":"","hub_page_logo":[]},"created_at":"2021-05-29T07:25:13.674Z","created_by":"blt9a0fc67c46c47dd7","display_options":"Standard View","icon":{"uid":"blt3d2f1b31077569d1","created_at":"2021-06-28T08:46:03.401Z","updated_at":"2021-06-28T08:46:03.401Z","created_by":"blt6fb043d513578596","updated_by":"blt6fb043d513578596","content_type":"image/png","file_size":"818","tags":[],"filename":"cloud-icon.png","url":"https://eu-images.contentstack.com/v3/assets/blt66983808af36a8ef/blt3d2f1b31077569d1/60d98c4b537dbc26a0e2a03d/cloud-icon.png","ACL":[],"is_dir":false,"_version":1,"title":"cloud-icon.png","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-07-20T11:40:42.692Z","user":"blta3dd47a38c602549"}},"modules":{"module_blocks":[]},"over_the_edge":[],"secondary_categories":[],"seo":{"canonical_url":"","meta_description":"Cloud","meta_keywords":"","meta_title":"Cloud"},"slug":"cloud","sponsor_logo":null,"sponsor_text":"","tags":[],"title":"Cloud","topic_page_description":"","updated_at":"2021-07-16T10:06:15.698Z","updated_by":"blta3dd47a38c602549","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-07-20T11:40:42.702Z","user":"blta3dd47a38c602549"}},{"_version":4,"locale":"en-us","uid":"bltf8dd78a4e0baf1e3","ACL":{},"_in_progress":false,"branding":{"hub_page_color":"000000","hub_page_description":"","hub_page_logo":[]},"created_at":"2021-05-29T07:25:12.643Z","created_by":"blt9a0fc67c46c47dd7","display_options":"Standard View","icon":null,"modules":{"module_blocks":[]},"over_the_edge":[],"secondary_categories":[{"_version":6,"locale":"en-us","uid":"blt510176d85efe2f04","ACL":{},"_in_progress":false,"branding":{"hub_page_color":"","hub_page_description":"","hub_page_logo":null},"created_at":"2021-05-29T07:25:39.882Z","created_by":"blt9a0fc67c46c47dd7","display_options":"Standard View","icon":null,"modules":{"module_blocks":[]},"over_the_edge":[],"secondary_category_name":"Security Monitoring","seo":{"canonical_url":"","meta_description":"Security Monitoring","meta_keywords":"","meta_title":"Security Monitoring"},"shown_in_header":true,"slug":"security-monitoring","sponsor_logo":null,"sponsor_text":"Sponsor Text","tags":[],"title":"[Analytics] Security Monitoring","topic_page_description":"","updated_at":"2021-07-20T11:46:58.515Z","updated_by":"blta3dd47a38c602549","_content_type_uid":"dr_category_secondary","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-07-20T11:47:01.191Z","user":"blta3dd47a38c602549"}}],"seo":{"canonical_url":"","meta_description":"Analytics","meta_keywords":"","meta_title":"Analytics"},"slug":"analytics","sponsor_logo":null,"sponsor_text":"","tags":[],"title":"Analytics","topic_page_description":"","updated_at":"2021-07-16T10:03:50.534Z","updated_by":"blta3dd47a38c602549","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-07-20T11:40:10.489Z","user":"blta3dd47a38c602549"}},{"_version":3,"locale":"en-us","uid":"blta1a9507fc4e576e5","ACL":{},"_in_progress":false,"branding":{"hub_page_color":"000000","hub_page_description":"","hub_page_logo":[]},"created_at":"2021-05-29T07:25:14.614Z","created_by":"blt9a0fc67c46c47dd7","display_options":"Standard View","icon":null,"modules":{"module_blocks":[]},"over_the_edge":[],"secondary_categories":[],"seo":{"canonical_url":"","meta_description":"Attacks / Breaches","meta_keywords":"","meta_title":"Attacks / Breaches"},"slug":"attacks-breaches","sponsor_logo":null,"sponsor_text":"","tags":[],"title":"Attacks/Breaches","topic_page_description":"","updated_at":"2021-07-16T10:02:47.377Z","updated_by":"blta3dd47a38c602549","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-07-20T11:38:54.847Z","user":"blta3dd47a38c602549"}},{"_version":3,"locale":"en-us","uid":"blt7095e7265cf0f380","ACL":{},"_in_progress":false,"branding":{"hub_page_color":"000000","hub_page_description":"","hub_page_logo":[]},"created_at":"2021-05-29T07:25:22.491Z","created_by":"blt9a0fc67c46c47dd7","display_options":"Standard View","icon":null,"modules":{"module_blocks":[]},"over_the_edge":[],"secondary_categories":[{"_version":2,"locale":"en-us","uid":"blt9d07d0a4c0d8cb54","ACL":{},"_in_progress":false,"branding":{"hub_page_color":"","hub_page_description":"","hub_page_logo":null},"created_at":"2021-05-29T07:25:43.070Z","created_by":"blt9a0fc67c46c47dd7","display_options":"Standard View","icon":null,"modules":{"module_blocks":[]},"over_the_edge":[],"secondary_category_name":"Compliance","seo":{"canonical_url":"","meta_description":"Compliance","meta_keywords":"","meta_title":"Compliance"},"shown_in_header":true,"slug":"compliance","sponsor_logo":null,"sponsor_text":"","tags":[],"title":"[Risk] Compliance","topic_page_description":"","updated_at":"2021-07-16T11:20:24.692Z","updated_by":"blta3dd47a38c602549","_content_type_uid":"dr_category_secondary","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-07-20T11:46:22.899Z","user":"blta3dd47a38c602549"}}],"seo":{"canonical_url":"","meta_description":"Risk","meta_keywords":"","meta_title":"Risk"},"slug":"risk","sponsor_logo":null,"sponsor_text":"","tags":[],"title":"Risk","topic_page_description":"","updated_at":"2021-07-16T10:01:56.765Z","updated_by":"blta3dd47a38c602549","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-07-20T11:38:13.957Z","user":"blta3dd47a38c602549"}},{"_version":3,"locale":"en-us","uid":"bltaebee183784263bf","ACL":{},"_in_progress":false,"branding":{"hub_page_color":"000000","hub_page_description":"","hub_page_logo":[]},"created_at":"2021-05-29T07:25:18.693Z","created_by":"blt9a0fc67c46c47dd7","display_options":"Standard View","icon":null,"modules":{"module_blocks":[]},"over_the_edge":[],"secondary_categories":[],"seo":{"canonical_url":"","meta_description":"Physical Security","meta_keywords":"","meta_title":"Physical Security"},"slug":"physical-security","sponsor_logo":null,"sponsor_text":"","tags":[],"title":"Physical Security","topic_page_description":"","updated_at":"2021-07-16T10:00:24.760Z","updated_by":"blta3dd47a38c602549","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-07-20T11:36:23.082Z","user":"blta3dd47a38c602549"}},{"_version":3,"locale":"en-us","uid":"bltdeb10b926a7ccf5c","ACL":{},"_in_progress":false,"branding":{"hub_page_color":"000000","hub_page_description":"","hub_page_logo":[]},"created_at":"2021-05-29T07:25:17.673Z","created_by":"blt9a0fc67c46c47dd7","display_options":"Standard View","icon":null,"modules":{"module_blocks":[]},"over_the_edge":[],"secondary_categories":[],"seo":{"canonical_url":"","meta_description":"Threat Intelligence","meta_keywords":"","meta_title":"Threat Intelligence"},"slug":"threat-intelligence","sponsor_logo":null,"sponsor_text":"","tags":[],"title":"Threat Intelligence","topic_page_description":"","updated_at":"2021-07-16T09:59:19.523Z","updated_by":"blta3dd47a38c602549","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-07-20T11:33:56.608Z","user":"blta3dd47a38c602549"}},{"_version":3,"locale":"en-us","uid":"blt072b989d237a00d2","ACL":{},"_in_progress":false,"branding":{"hub_page_color":"000000","hub_page_description":"","hub_page_logo":[]},"created_at":"2021-05-29T07:25:19.615Z","created_by":"blt9a0fc67c46c47dd7","display_options":"Standard View","icon":null,"modules":{"module_blocks":[]},"over_the_edge":[],"secondary_categories":[{"_version":4,"locale":"en-us","uid":"blt1922da536f26f75a","ACL":{},"_in_progress":false,"branding":{"hub_page_color":"","hub_page_description":"","hub_page_logo":null},"created_at":"2021-05-29T07:25:46.834Z","created_by":"blt9a0fc67c46c47dd7","display_options":"Standard View","icon":null,"modules":{"module_blocks":[]},"over_the_edge":[],"secondary_category_name":"Identity \u0026 Access Management","seo":{"canonical_url":"","meta_description":"Identity \u0026 Access Management","meta_keywords":"","meta_title":"Identity \u0026 Access Management"},"shown_in_header":true,"slug":"identity-and-access-management","sponsor_logo":null,"sponsor_text":"","tags":[],"title":"[Operations] Identity \u0026 Access Management","topic_page_description":"","updated_at":"2021-07-20T12:02:06.708Z","updated_by":"blt986fc66e34c7b415","_content_type_uid":"dr_category_secondary","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-07-20T12:09:06.252Z","user":"blt986fc66e34c7b415"}}],"seo":{"canonical_url":"","meta_description":"Operations","meta_keywords":"","meta_title":"Operations"},"slug":"operations","sponsor_logo":null,"sponsor_text":"","tags":[],"title":"Operations","topic_page_description":"","updated_at":"2021-07-16T09:58:32.940Z","updated_by":"blta3dd47a38c602549","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-07-20T11:35:00.858Z","user":"blta3dd47a38c602549"}},{"_version":3,"locale":"en-us","uid":"blt88fe329e8d35e99f","ACL":{},"_in_progress":false,"branding":{"hub_page_color":"000000","hub_page_description":"","hub_page_logo":[]},"created_at":"2021-05-29T07:25:20.552Z","created_by":"blt9a0fc67c46c47dd7","display_options":"Standard View","icon":null,"modules":{"module_blocks":[]},"over_the_edge":[],"secondary_categories":[{"_version":2,"locale":"en-us","uid":"blt038394f2fc302955","ACL":{},"_in_progress":false,"branding":{"hub_page_color":"","hub_page_description":"","hub_page_logo":null},"created_at":"2021-05-29T07:25:41.005Z","created_by":"blt9a0fc67c46c47dd7","display_options":"Standard View","icon":null,"modules":{"module_blocks":[]},"over_the_edge":[],"secondary_category_name":"Authentication","seo":{"canonical_url":"","meta_description":"Authentication","meta_keywords":"","meta_title":"Authentication"},"shown_in_header":true,"slug":"authentication","sponsor_logo":null,"sponsor_text":"","tags":[],"title":"[Endpoint] Authentication","topic_page_description":"","updated_at":"2021-07-15T08:43:26.396Z","updated_by":"blt986fc66e34c7b415","_content_type_uid":"dr_category_secondary","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-07-20T11:44:33.457Z","user":"blta3dd47a38c602549"}},{"_version":2,"locale":"en-us","uid":"blt9f22a744d7b136d6","ACL":{},"_in_progress":false,"branding":{"hub_page_color":"","hub_page_description":"","hub_page_logo":null},"created_at":"2021-05-29T07:25:44.029Z","created_by":"blt9a0fc67c46c47dd7","display_options":"Standard View","icon":null,"modules":{"module_blocks":[]},"over_the_edge":[],"secondary_category_name":"Privacy","seo":{"canonical_url":"","meta_description":"Privacy","meta_keywords":"","meta_title":"Privacy"},"shown_in_header":true,"slug":"privacy","sponsor_logo":null,"sponsor_text":"","tags":[],"title":"[Endpoint] Privacy","topic_page_description":"","updated_at":"2021-07-16T11:18:55.988Z","updated_by":"blta3dd47a38c602549","_content_type_uid":"dr_category_secondary","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-07-20T11:44:57.811Z","user":"blta3dd47a38c602549"}}],"seo":{"canonical_url":"","meta_description":"Endpoint","meta_keywords":"","meta_title":"Endpoint"},"slug":"endpoint","sponsor_logo":null,"sponsor_text":"","tags":[],"title":"Endpoint","topic_page_description":"","updated_at":"2021-07-15T08:31:13.084Z","updated_by":"blt986fc66e34c7b415","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-07-20T11:37:04.617Z","user":"blta3dd47a38c602549"}},{"_version":1,"locale":"en-us","uid":"blt000a3e5dc1d51c08","ACL":{},"_in_progress":false,"created_at":"2021-06-16T21:13:39.947Z","created_by":"blt9488f204761710b3","secondary_categories":[],"slug":"security-now","tags":[],"title":"Security Now","updated_at":"2021-06-16T21:13:39.947Z","updated_by":"blt9488f204761710b3","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-06-16T21:13:47.259Z","user":"blt9488f204761710b3"},"_owner":{"uid":"blt9488f204761710b3","created_at":"2021-05-21T10:05:50.071Z","updated_at":"2021-11-22T13:07:40.552Z","email":"roma.nowak@informa.com","username":"roma_blt4d352a9b","first_name":"roma","last_name":"nowak","org_uid":[],"shared_org_uid":["blt5948195ac13977b0"],"mobile_number":"5167901481","country_code":"1","tfa_status":"verified","authy_id":"375656345","active":true,"profile_type":"business","failed_attempts":0,"settings":{"preferences":{"global":[],"stack":[]}}}},{"_version":1,"locale":"en-us","uid":"blt8622595eba1da383","ACL":{},"_in_progress":false,"created_at":"2021-06-16T21:13:12.377Z","created_by":"blt9488f204761710b3","secondary_categories":[],"slug":"black-hat","tags":[],"title":"Black Hat","updated_at":"2021-06-16T21:13:12.377Z","updated_by":"blt9488f204761710b3","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-06-16T21:13:19.576Z","user":"blt9488f204761710b3"},"_owner":{"uid":"blt9488f204761710b3","created_at":"2021-05-21T10:05:50.071Z","updated_at":"2021-11-22T13:07:40.552Z","email":"roma.nowak@informa.com","username":"roma_blt4d352a9b","first_name":"roma","last_name":"nowak","org_uid":[],"shared_org_uid":["blt5948195ac13977b0"],"mobile_number":"5167901481","country_code":"1","tfa_status":"verified","authy_id":"375656345","active":true,"profile_type":"business","failed_attempts":0,"settings":{"preferences":{"global":[],"stack":[]}}}}],"smartbox":[{"feed":{"href":"https://smartbox.techweb.com/smartbox/externalsmartbox?site_id=162801002\u0026taxonomy_ids=\u0026num_display=3\u0026article_type=session\u0026output_type=xml","title":"Events","__typename":"Link"},"read_more_link":{"href":"https://www.darkreading.com/upcoming-events","title":"More Events","__typename":"Link"},"title":"Events","type":"Live Events","system":{"publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-10-19T13:23:56.785Z","user":"blt9488f204761710b3","__typename":"SystemPublishDetails"},"uid":"blt8b6a33909c49602f","__typename":"EntrySystemField"},"hidden":false,"ordinal":2,"__typename":"DrSmartbox","articles":[{"title":["Cybersecurity Outlook 2022 - December 8 Virtual Event"],"link":["https://vts.informaengage.com/cybersecurity_outlook_2022/?keycode=sbx\u0026cid=smartbox_techweb_session_16.500259\u0026_mc=smartbox_techweb_session_16.500259"],"publishDate":["Dec 08, 2021"],"publishedSite":[""],"publishedSiteURL":[""],"description":["Join Black Hat, Dark Reading and Omdia at this free, all-day virtual event offering expert insight on the cyber-threats and trends enterprises will face in the coming year.\r\n\r\nOn December 8, Cybersecurity Outlook 2022 will look at some of the new threats posed by online attackers, as well as evolving products and technologies that may mitigate those threats. You'll hear from some of the cybersecurity industry's top thinkers, as well as researchers who have been studying the next wave of cyber vulnerabilities and exploits."]}]},{"feed":{"href":"https://smartbox.techweb.com/smartbox/externalsmartbox?site_id=162801002\u0026taxonomy_ids=\u0026num_display=5\u0026article_type=webcast\u0026output_type=xml","title":"Webinars","__typename":"Link"},"read_more_link":{"href":"https://www.darkreading.com/upcoming-webinars","title":"More Webinars","__typename":"Link"},"title":"Webinars","type":"Webinars","system":{"publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-10-19T13:22:58.379Z","user":"blt9488f204761710b3","__typename":"SystemPublishDetails"},"uid":"blt8f82585c522cc0f5","__typename":"EntrySystemField"},"hidden":false,"ordinal":1,"__typename":"DrSmartbox","articles":[{"title":["Cybersecurity Forecast 2022: Snowpocalypse or cloudy with a chance of rain?"],"link":["https://webinar.darkreading.com/930906?keycode=sbx\u0026cid=smartbox_techweb_webcast_8.500001115\u0026_mc=smartbox_techweb_webcast_8.500001115"],"publishedSite":[""],"eventDate":["Dec 09, 2021"],"publishedSiteURL":[""],"description":["Does the year ahead hold significant promise for IT and Security teams, or does the upheaval caused by COVID-19 and the spike in cyberattacks continue well into 2022? As threat actors continue to evolve, what should security teams look out for and how should security executives prepare to ensure their organization doesn't become the subject of the next news headline? Please join Qualys CISO, Ben Carr and Director of Malware Threat Research, Travis Smith for a discussion covering emerging trends."]},{"title":["Preventing Attackers from Navigating Your Enterprise Systems"],"link":["https://webinar.darkreading.com/951852?keycode=sbx\u0026cid=smartbox_techweb_webcast_8.500001114\u0026_mc=smartbox_techweb_webcast_8.500001114"],"publishedSite":[""],"eventDate":["Dec 15, 2021"],"publishedSiteURL":[""],"description":["Over the past few years, cyber attackers have favored exploits in which they steal a legitimate user's credentials and then navigate enterprise defenses as a trusted end user. This \"lateral movement\" enables the attacker to quickly gain access to a wide variety of applications and data, and can lead to a major data breach. In this webinar, experts discuss methods for recognizing anomalous and unauthorized behavior among trusted users, and how to prevent those \"users\" from gaining access to critical information. You'll also learn how to limit trusted users from accessing systems or gaining privileges that their roles don't require them to have."]},{"title":["Protecting Enterprise Data from Malicious Insiders"],"link":["https://webinar.darkreading.com/945057?keycode=sbx\u0026cid=smartbox_techweb_webcast_8.500001107\u0026_mc=smartbox_techweb_webcast_8.500001107"],"publishedSite":[""],"eventDate":["Dec 14, 2021"],"publishedSiteURL":[""],"description":["It's a sad truth: not all employees are nice. Corporate espionage, sabotage and other security incidents could be committed or aided by any insider with something to gain. How do you know when a once-trustworthy employee is about to do something malicious? How can you identify anomalous behavior among your users? Most of all, how can you prevent employees from taking cyber actions that might hurt your enterprise's business? In this webinar, experts discuss methods for detecting and mitigating malicious insider threats, and for preventing users from using their trusted positions to threaten your data."]},{"title":["Beyond Patch Management: Next-Generation Approaches to Finding and Fixing Vulnerable Code"],"link":["https://webinar.darkreading.com/950051?keycode=sbx\u0026cid=smartbox_techweb_webcast_8.500001105\u0026_mc=smartbox_techweb_webcast_8.500001105"],"publishedSite":[""],"eventDate":["Dec 07, 2021"],"publishedSiteURL":[""],"description":["A good patch management process can help make your enterprise data more secure. But what does it do for vulnerabilities that haven't been patched? Attackers are increasingly manipulating open-source, third-party components in software -- do you have a process to find and repair those bugs? In this webinar, top experts will update you on the latest critical applications vulnerabilities and provide advice on how you can scan, detect, and remediate new vulns on an ongoing basis."]},{"title":["The ROI Story: Identifying \u0026 Justifying Disruptive Technology"],"link":["https://webinar.informationweek.com/5876?keycode=sbx\u0026cid=smartbox_techweb_webcast_8.500000934\u0026_mc=smartbox_techweb_webcast_8.500000934"],"publishedSite":[""],"eventDate":["Mar 25, 2020"],"publishedSiteURL":[""],"description":["This webinar will assist anyone interested in how to use financial analysis as a framework to optimize strategic decision-making."]}]},{"feed":{"href":"http://smartbox.techweb.com/smartbox/externalsmartbox?site_id=162801002\u0026taxonomy_ids=\u0026num_display=\u0026article_type=whitepaper\u0026output_type=xml","title":"White Papers","__typename":"Link"},"read_more_link":{"href":"https://www.informationweek.com/whitepaper/Security","title":"More White Papers","__typename":"Link"},"title":"White Papers","type":"Whitepapers","system":{"publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-10-08T08:26:16.832Z","user":"blt8d6e4671551ab970","__typename":"SystemPublishDetails"},"uid":"blt1192837947494c5f","__typename":"EntrySystemField"},"hidden":false,"ordinal":3,"__typename":"DrSmartbox","articles":[{"title":["2021 Ransomware Threat Report"],"link":["https://www.informationweek.com/whitepaper/cybersecurity/security-monitoring/2021-ransomware-threat-report/432943?cid=smartbox_techweb_whitepaper_14.500004727\u0026_mc=smartbox_techweb_whitepaper_14.500004727"],"publishedSite":[""],"publishedSiteURL":[""]},{"title":["2021 Cyberthreat Defense Report"],"link":["https://www.informationweek.com/whitepaper/cloud-security/cybersecurity/2021-cyberthreat-defense-report/429393?cid=smartbox_techweb_whitepaper_14.500004710\u0026_mc=smartbox_techweb_whitepaper_14.500004710"],"publishedSite":[""],"publishedSiteURL":[""]},{"title":["Unit 42 Incident Response and Data Breach Report"],"link":["https://www.informationweek.com/whitepaper/risk-management-security/policy-administration/unit-42-incident-response-and-data-breach-report/431373?cid=smartbox_techweb_whitepaper_14.500004724\u0026_mc=smartbox_techweb_whitepaper_14.500004724"],"publishedSite":[""],"publishedSiteURL":[""]},{"title":["Understanding the Most Common Lateral Movement Attack Tactics"],"link":["https://www.informationweek.com/whitepaper/cybersecurity/network-and-perimeter-security/understanding-the-most-common-lateral-movement-attack-tactics/431123?cid=smartbox_techweb_whitepaper_14.500004714\u0026_mc=smartbox_techweb_whitepaper_14.500004714"],"publishedSite":[""],"publishedSiteURL":[""]},{"title":["A Pragmatic Path to SASE"],"link":["https://www.informationweek.com/whitepaper/cybersecurity/cloud-security/a-pragmatic-path-to-sase/430973?cid=smartbox_techweb_whitepaper_14.500004711\u0026_mc=smartbox_techweb_whitepaper_14.500004711"],"publishedSite":[""],"publishedSiteURL":[""]}]},{"feed":{"href":"https://smartbox.techweb.com/smartbox/externalsmartbox?site_id=162801002\u0026taxonomy_ids=\u0026num_display=3\u0026article_type=session\u0026output_type=xml","title":"Thao tests smartbox","__typename":"Link"},"read_more_link":{"href":"https://finance.vietstock.vn/TDC-ctcp-kinh-doanh-va-phat-trien-binh-duong.htm","title":"Read more","__typename":"Link"},"title":"Thao test smartbox","type":"Webinars","system":{"publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-10-13T09:32:03.167Z","user":"blta36fe02d0bc9c8a3","__typename":"SystemPublishDetails"},"uid":"blt378d3b273bbe06e9","__typename":"EntrySystemField"},"hidden":false,"ordinal":1,"__typename":"DrSmartbox","articles":[{"title":["Cybersecurity Outlook 2022 - December 8 Virtual Event"],"link":["https://vts.informaengage.com/cybersecurity_outlook_2022/?keycode=sbx\u0026cid=smartbox_techweb_session_16.500259\u0026_mc=smartbox_techweb_session_16.500259"],"publishDate":["Dec 08, 2021"],"publishedSite":[""],"publishedSiteURL":[""],"description":["Join Black Hat, Dark Reading and Omdia at this free, all-day virtual event offering expert insight on the cyber-threats and trends enterprises will face in the coming year.\r\n\r\nOn December 8, Cybersecurity Outlook 2022 will look at some of the new threats posed by online attackers, as well as evolving products and technologies that may mitigate those threats. You'll hear from some of the cybersecurity industry's top thinkers, as well as researchers who have been studying the next wave of cyber vulnerabilities and exploits."]}]},{"feed":{"href":"http://smartbox.techweb.com/smartbox/externalsmartbox?site_id=162801002\u0026taxonomy_ids=\u0026num_display=10\u0026article_type=analytics\u0026output_type=xml","title":"Reports","__typename":"Link"},"read_more_link":{"href":"https://www.darkreading.com/archives.asp?section_id=315","title":"More Reports","__typename":"Link"},"title":"Reports","type":"Reports","system":{"publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-08-11T20:17:51.398Z","user":"blt9488f204761710b3","__typename":"SystemPublishDetails"},"uid":"blt5145c70334f61d02","__typename":"EntrySystemField"},"hidden":true,"ordinal":null,"__typename":"DrSmartbox","articles":[{"title":["10 Hot Talks From Black Hat USA 2021"],"link":["https://www.informationweek.com/whitepaper/cybersecurity/security-monitoring/10-hot-talks-from-black-hat-usa-2021/431873?cid=smartbox_techweb_analytics_7.300005915\u0026_mc=smartbox_techweb_analytics_7.300005915"],"publishedSite":[""],"publishedSiteURL":[""]},{"title":["Enterprise Cybersecurity Plans in a Post-Pandemic World"],"link":["https://www.informationweek.com/whitepaper/risk-management-security/security-monitoring/enterprise-cybersecurity-plans-in-a-post-pandemic-world/430493?cid=smartbox_techweb_analytics_7.300005913\u0026_mc=smartbox_techweb_analytics_7.300005913"],"publishedSite":[""],"publishedSiteURL":[""],"description":["As the COVID-19 pandemic eases, IT security threats and the challenges involved in responding to them are trending upward. Security leaders expect that cyberattacks like ransomware, phishing, and malware will increase even as the pandemic eventually recedes.\r\n\r\nDownload the Dark Reading and Omdia Research Report Enterprise Cybersecurity Plans in a Post-Pandemic World to understand how security leaders are maintaining pace with pandemic-related challenges, and where there is room for improvement."]},{"title":["The State of Malware Threats"],"link":["https://www.informationweek.com/whitepaper/cybersecurity/risk-management-security/the-state-of-malware-threats/428693?cid=smartbox_techweb_analytics_7.300005894\u0026_mc=smartbox_techweb_analytics_7.300005894"],"publishedSite":[""],"publishedSiteURL":[""]},{"title":["How Enterprises are Attacking the Cybersecurity Problem"],"link":["https://www.informationweek.com/whitepaper/cybersecurity/security-monitoring/how-enterprises-are-attacking-the-cybersecurity-problem/432103?cid=smartbox_techweb_analytics_7.300005916\u0026_mc=smartbox_techweb_analytics_7.300005916"],"publishedSite":[""],"publishedSiteURL":[""],"description":["Concerns over supply chain vulnerabilities and attack visibility drove some significant changes in enterprise cybersecurity strategies over the past year. Dark Reading's 2021 Strategic Security Survey showed that many organizations are staying the course regarding the use of a mix of attack prevention and threat detection technologies and practices for dealing with cyber threats. "]},{"title":["State of DevOps 2021"],"link":["https://www.informationweek.com/whitepaper/application-acceleration/enterprise/state-of-devops-2021/429973?cid=smartbox_techweb_analytics_7.300005911\u0026_mc=smartbox_techweb_analytics_7.300005911"],"publishedSite":[""],"publishedSiteURL":[""],"description":["The chaos of the pandemic and increasing cyberattacks meant that organizations put some DevOps adoption plans on hold temporarily. However, teams that had already embraced the approach saw efficiency and application improvements. Find out more today!"]},{"title":["Incident Readiness and Building Response Playbook"],"link":["https://www.informationweek.com/whitepaper/cybersecurity/security-monitoring/incident-readiness-and-building-response-playbook/429723?cid=smartbox_techweb_analytics_7.300005908\u0026_mc=smartbox_techweb_analytics_7.300005908"],"publishedSite":[""],"publishedSiteURL":[""]},{"title":["Defending Against Critical Threats"],"link":["https://www.informationweek.com/whitepaper/cybersecurity/endpoint-security/defending-against-critical-threats/429033?cid=smartbox_techweb_analytics_7.300005906\u0026_mc=smartbox_techweb_analytics_7.300005906"],"publishedSite":[""],"publishedSiteURL":[""]},{"title":["Proven Success Factors for Endpoint Security"],"link":["https://www.informationweek.com/whitepaper/cybersecurity/endpoint-security/proven-success-factors-for-endpoint-security/429043?cid=smartbox_techweb_analytics_7.300005905\u0026_mc=smartbox_techweb_analytics_7.300005905"],"publishedSite":[""],"publishedSiteURL":[""]},{"title":["Intel 471 Breach Report"],"link":["https://www.informationweek.com/whitepaper/cybersecurity/risk-management-security/intel-471-breach-report/429143?cid=smartbox_techweb_analytics_7.300005902\u0026_mc=smartbox_techweb_analytics_7.300005902"],"publishedSite":[""],"publishedSiteURL":[""]},{"title":["CVE Weaponization Report"],"link":["https://www.informationweek.com/whitepaper/cybersecurity/risk-management-security/cve-weaponization-report/429173?cid=smartbox_techweb_analytics_7.300005901\u0026_mc=smartbox_techweb_analytics_7.300005901"],"publishedSite":[""],"publishedSiteURL":[""]}]}],"articleSettings":{"_version":59,"locale":"en-us","uid":"blt71c2ca1d1bdca542","ACL":{},"_in_progress":false,"article_display_settings":{"article_template":"two-column"},"created_at":"2021-08-03T04:55:12.335Z","created_by":"blt986fc66e34c7b415","modules":{"module_blocks":[]},"right_hand_rail_configuration":{"right_component":[{"uid":"blt9262b8fd3485b1dc","_content_type_uid":"dr_editor_s_choice"},{"uid":"blt8f82585c522cc0f5","_content_type_uid":"dr_smartbox"},{"uid":"blt1192837947494c5f","_content_type_uid":"dr_smartbox"},{"uid":"blt8b6a33909c49602f","_content_type_uid":"dr_smartbox"}]},"subscribe_to_newsletters":{"message":"Keep up with the latest cybersecurity threats, newly-discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.","open_subscribe_link_on_new_tab":true,"subscribe_link":{"title":"Subscribe","href":"https://www.darkreading.com/newsletter-signup/?_mc=dr_eoa"}},"tags":[],"title":"[DR] Settings - Article","updated_at":"2021-10-13T09:38:46.418Z","updated_by":"blta36fe02d0bc9c8a3","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-10-28T09:59:09.533Z","user":"bltfcb3d125bf8c49ee"}}},"adsPattern":"article/risk","sponsoredContentSettings":{"title":"Sponsored Content Settings","sponsored_content_label":"Sponsored Content","label_background_color":"ffc43d","label_text_color":"000000","__typename":"DrSponsoredContent"},"slideshowItems":[],"tagManagerSlideArticleArgs":{},"isEdgePage":true,"pageAid":99708,"ptype":"article","listModuleData":[],"pageName":"article"}},"__N_SSG":true},"page":"/[category]/[hybidPage]","query":{"category":"risk","hybidPage":"google-chrome-polishes-its-first-security-update"},"buildId":"b248af445879de6bfe6cb4725caaf7f570e3978f","assetPrefix":"https://beta.darkreading.com","isFallback":false,"gsp":true,"scriptLoader":[]}</script><link href="https://cdnjs.cloudflare.com/ajax/libs/font-awesome/5.15.2/css/all.min.css" rel="stylesheet"/><script src="https://assets.zephr.com/zephr-browser/1.3.10/zephr-browser.umd.js"></script><script>let baseUrl = 'https://informa-dark-reading.preview.zephr.com'; document.addEventListener('DOMContentLoaded', (event) => { zephrBrowser.run(baseUrl);})</script></body></html><script defer src="https://static.cloudflareinsights.com/beacon.min.js/v64f9daad31f64f81be21cbef6184a5e31634941392597" integrity="sha512-gV/bogrUTVP2N3IzTDKzgP0Js1gg4fbwtYB6ftgLbKQu/V8yH2+lrKCfKHelh4SO3DPzKj4/glTO+tNJGDnb0A==" data-cf-beacon='{"rayId":"6b56b9f7295e37ff","token":"af0cdaaec56f4ed087ea8bc39ec08d1b","version":"2021.11.0","si":100}' crossorigin="anonymous"></script>