informa
2 min read
article

Google Chrome Polishes Its First Security Update

Last week, Google released its shiny new Chrome browser. However, before the week finished, Google also had to issue a patch for one of security's most common -- and most well-known to developers -- application security issues: a buffer overflow vulnerability that would make it possible for an attacker to completely take over your system.
Last week, Google released its shiny new Chrome browser. However, before the week finished, Google also had to issue a patch for one of security's most common -- and most well-known to developers -- application security issues: a buffer overflow vulnerability that would make it possible for an attacker to completely take over your system.According to this advisory from security firm SVRT-Bkis, they found a critical buffer overflow in Google Chrome that would enable an attacker to take complete control of an unpatched system.

From the advisory:


Type of Issue : Buffer Overflow.

Affected Software : Google Chrome 0.2.149.27.

Exploitation Environment : Google Chrome on Windows XP SP2.

Impact: Remote code execution.

Rating : Critical.

Description : The vulnerability is caused due to a boundary error when handling the "SaveAs" function. On saving a malicious page with an overly long title ( tag in HTML), the program causes a stack-based overflow and makes it possible for attackers to execute arbitrary code on users' systems. <P> How an attacker could exploit the issue : To exploit the Vulnerability, a hacker might construct a specially crafted Web page, which contains malicious code. He then tricks users into visiting his Web site and convinces them to save this Page. Right after that, the code would be executed, giving him the privilege to make use of the affected system. </blockquote> <P> Fortunately, Google promptly fixed the flaw. Just make sure you are running version 0.2.149.29 or higher. You can do that by selecting About, then Update within Chrome, or visiting <a href="http://www.google.com/chrome/">this</a> Google page. <P> I've a suspicion we've many more Google Chrome security-related updates on the way.</p><div class="mb-3"> <div class="informa-dfp-ads" data-name="Native_Ad_native_1v" data-size="fluid" data-targeting="pos=native_1v" ></div> </div></div></div><div id="articleFooter-newsletterSignup" class="newsletter-cta w-100 mt-3"><div class="text">Keep up with the latest cybersecurity threats, newly-discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.</div><a class="subscribe-btn dr-btn" href="https://www.darkreading.com/newsletter-signup/?_mc=dr_eoa" title="Subscribe" target="_blank" rel="noreferrer">Subscribe</a></div><div class="lazyload-wrapper "><div class="lazyload-placeholder"></div></div><div class="w-100 d-none d-lg-block"><div class="more-insights mt-2"><div class="title">More Insights</div><div class="container"><div class="row"><div id="articleFooter-moreInsights-" class="smartbox col-md-4"><div class="smartbox-title">White Papers</div><ul class="feed"><li class="feed-item"><div class="bullet-container square"><svg width="8" height="8" fill="none" xmlns="http://www.w3.org/2000/svg" alt="White Papers" class="icon-bullet square"><path fill="#181C21" d="M0 0h8v8H0z"></path></svg><svg width="8" height="8" fill="none" xmlns="http://www.w3.org/2000/svg" alt="White Papers" class="icon-bullet-on-hover square"><path fill="#9F110D" d="M0 0h8v8H0z"></path></svg></div><a target="_blank" rel="noreferrer" href="https://www.informationweek.com/whitepaper/cybersecurity/software-as-a-service/sumo-logic-for-continuous-intelligence/436973?cid=smartbox_techweb_whitepaper_14.500005115&_mc=smartbox_techweb_whitepaper_14.500005115">Sumo Logic for Continuous Intelligence</a></li><li class="feed-item"><div class="bullet-container square"><svg width="8" height="8" fill="none" xmlns="http://www.w3.org/2000/svg" alt="White Papers" class="icon-bullet square"><path fill="#181C21" d="M0 0h8v8H0z"></path></svg><svg width="8" height="8" fill="none" xmlns="http://www.w3.org/2000/svg" alt="White Papers" class="icon-bullet-on-hover square"><path fill="#9F110D" d="M0 0h8v8H0z"></path></svg></div><a target="_blank" rel="noreferrer" href="https://www.informationweek.com/whitepaper/cybersecurity/security/protecting-the-endpoint-to-work-from-anywhere/437563?cid=smartbox_techweb_whitepaper_14.500005105&_mc=smartbox_techweb_whitepaper_14.500005105">Protecting Endpoint to Work from Anywhere</a></li></ul><div class="readmore-link"><a target="_blank" rel="noreferrer" href="https://www.informationweek.com/whitepaper/Security">More White Papers</a></div></div><div id="articleFooter-moreInsights-" class="smartbox col-md-4"><div class="smartbox-title">Webinars</div><ul class="feed"><li class="feed-item"><div class="bullet-container square"><svg width="8" height="8" fill="none" xmlns="http://www.w3.org/2000/svg" alt="Webinars" class="icon-bullet square"><path fill="#181C21" d="M0 0h8v8H0z"></path></svg><svg width="8" height="8" fill="none" xmlns="http://www.w3.org/2000/svg" alt="Webinars" class="icon-bullet-on-hover square"><path fill="#9F110D" d="M0 0h8v8H0z"></path></svg></div><a target="_blank" rel="noreferrer" href="https://webinar.darkreading.com/1317679?keycode=sbx&cid=smartbox_techweb_webcast_8.500001173&_mc=smartbox_techweb_webcast_8.500001173">Vendors as Your Largest BEC Threat</a></li><li class="feed-item"><div class="bullet-container square"><svg width="8" height="8" fill="none" xmlns="http://www.w3.org/2000/svg" alt="Webinars" class="icon-bullet square"><path fill="#181C21" d="M0 0h8v8H0z"></path></svg><svg width="8" height="8" fill="none" xmlns="http://www.w3.org/2000/svg" alt="Webinars" class="icon-bullet-on-hover square"><path fill="#9F110D" d="M0 0h8v8H0z"></path></svg></div><a target="_blank" rel="noreferrer" href="https://webinar.darkreading.com/1314754?keycode=sbx&cid=smartbox_techweb_webcast_8.500001168&_mc=smartbox_techweb_webcast_8.500001168">Harnessing the Power of Security Automation</a></li></ul><div class="readmore-link"><a target="_blank" rel="noreferrer" href="https://www.darkreading.com/upcoming-webinars">More Webinars</a></div></div><div id="articleFooter-moreInsights-" class="smartbox col-md-4"><div class="smartbox-title">Reports</div><ul class="feed"><li class="feed-item"><div class="bullet-container square"><svg width="8" height="8" fill="none" xmlns="http://www.w3.org/2000/svg" alt="Reports" class="icon-bullet square"><path fill="#181C21" d="M0 0h8v8H0z"></path></svg><svg width="8" height="8" fill="none" xmlns="http://www.w3.org/2000/svg" alt="Reports" class="icon-bullet-on-hover square"><path fill="#9F110D" d="M0 0h8v8H0z"></path></svg></div><a target="_blank" rel="noreferrer" href="https://www.informationweek.com/whitepaper/network-and-perimeter-security/networking/incorporating-a-prevention-mindset-into-threat-detection-and-response/439373?cid=smartbox_techweb_analytics_7.300005934&_mc=smartbox_techweb_analytics_7.300005934">Incorporating a Prevention Mindset into Threat Detection and Response</a></li><li class="feed-item"><div class="bullet-container square"><svg width="8" height="8" fill="none" xmlns="http://www.w3.org/2000/svg" alt="Reports" class="icon-bullet square"><path fill="#181C21" d="M0 0h8v8H0z"></path></svg><svg width="8" height="8" fill="none" xmlns="http://www.w3.org/2000/svg" alt="Reports" class="icon-bullet-on-hover square"><path fill="#9F110D" d="M0 0h8v8H0z"></path></svg></div><a target="_blank" rel="noreferrer" href="https://www.informationweek.com/whitepaper/cloud-security/network-and-perimeter-security/practical-network-security-approaches-for-a-multicloud,-hybrid-it-world/438913?cid=smartbox_techweb_analytics_7.300005932&_mc=smartbox_techweb_analytics_7.300005932">Practical Network Security Approaches for a Multicloud, Hybrid IT World</a></li></ul><div class="readmore-link"><a target="_blank" rel="noreferrer" href="https://www.darkreading.com/must-reads">More Reports</a></div></div></div></div></div></div><div class="w-100 d-lg-block"><div class="informa-dfp-ads" data-name="Native_Ad_insight_1v" data-size="fluid" data-targeting="pos=nativeinsight_1v"></div></div></div><div class="col-lg-4"><div class="d-flex w-100 justify-content-center align-items-center flex-column"><div class="informa-dfp-ads add-border-bottom add-pb" data-size="5*5,300*250,300*600" data-name="TAP_Native_Ad_300_1v" data-targeting="pos=300_1v" data-mapping="1119*0=300*600,300*250,5*5|0*0=5*5,320*250"></div><div class="informa-dfp-ads add-border-bottom add-pb" data-name="Right_300x250_Rectangle_300_2v" data-size="300*250,300*600" data-targeting="pos=300_2v"></div></div><div class="right-hand-rail-wrap"><div id="rhc-editorsChoice" class="right-hand-rail-first editor-choice"><div class="editor-choice-title">Editors' Choice</div><div class="editor-choice-article"><a href="https://www.darkreading.com/iot/coke-can-eavesdropping-device" title="How to Turn a Coke Can Into an Eavesdropping Device" class="d-flex align-items-center justify-content-center"><div class="lazyload-wrapper " style="margin:auto"><div style="height:75px" class="lazyload-placeholder"></div></div></a><div class="info pl-3"><div class="title"><a href="https://www.darkreading.com/iot/coke-can-eavesdropping-device">How to Turn a Coke Can Into an Eavesdropping Device</a></div><div class="author">Robert Lemos, Contributing Writer, Dark Reading</div></div></div><div class="editor-choice-article"><a href="https://www.darkreading.com/mobile/iphones-open-to-attack-even-when-off-researchers-say" title="iPhones Open to Attack Even When Off, Researchers Say" class="d-flex align-items-center justify-content-center"><div class="lazyload-wrapper " style="margin:auto"><div style="height:75px" class="lazyload-placeholder"></div></div></a><div class="info pl-3"><div class="title"><a href="https://www.darkreading.com/mobile/iphones-open-to-attack-even-when-off-researchers-say">iPhones Open to Attack Even When Off, Researchers Say</a></div><div class="author">Dark Reading Staff, Dark Reading</div></div></div><div class="editor-choice-article"><a href="https://www.darkreading.com/vulnerabilities-threats/mastering-the-new-ciso-playbook" title="Mastering the New CISO Playbook" class="d-flex align-items-center justify-content-center"><div class="lazyload-wrapper " style="margin:auto"><div style="height:75px" class="lazyload-placeholder"></div></div></a><div class="info pl-3"><div class="title"><a href="https://www.darkreading.com/vulnerabilities-threats/mastering-the-new-ciso-playbook">Mastering the New CISO Playbook</a></div><div class="author">Chaim Mazal, Senior VP of Technology and CISO, Kandji</div></div></div><div class="editor-choice-article"><a href="https://www.darkreading.com/application-security/what-to-patch-now-actively-exploited-zero-day-threatens-domain-controllers" title="What to Patch Now: Actively Exploited Windows Zero-Day Threatens Domain Controllers" class="d-flex align-items-center justify-content-center"><div class="lazyload-wrapper " style="margin:auto"><div style="height:75px" class="lazyload-placeholder"></div></div></a><div class="info pl-3"><div class="title"><a href="https://www.darkreading.com/application-security/what-to-patch-now-actively-exploited-zero-day-threatens-domain-controllers">What to Patch Now: Actively Exploited Windows Zero-Day Threatens Domain Controllers</a></div><div class="author">Tara Seals, Managing Editor, News, Dark Reading</div></div></div></div><div id="rhc-webinars" class="smartbox " type="Webinars"><div class="smartbox-title">Webinars</div><ul class="feed"><li class="feed-item"><svg width="20" height="18" fill="none" xmlns="http://www.w3.org/2000/svg" class="feed-item-icon"><path d="M19.803 14.639a.807.807 0 00-.088-.156l-1.822-2.52a.775.775 0 00-.628-.323H3.516V3.2c0-.882.701-1.6 1.563-1.6h9.842c.862 0 1.563.718 1.563 1.6v5.2c0 .442.35.8.781.8a.79.79 0 00.781-.8V3.2c0-1.764-1.402-3.2-3.125-3.2H5.08C3.356 0 1.954 1.436 1.954 3.2v8.976L.285 14.483a.805.805 0 00-.088.156 2.442 2.442 0 00.186 2.275A2.323 2.323 0 002.344 18h15.312c.793 0 1.526-.406 1.96-1.086.435-.68.505-1.53.187-2.275zm-1.494 1.399a.764.764 0 01-.654.362h-4.92a.79.79 0 00-.782-.8H8.047a.79.79 0 00-.781.8H2.344a.764.764 0 01-.653-.362.801.801 0 01-.089-.688l1.527-2.11H16.87l1.527 2.11a.801.801 0 01-.089.688zM6.308 8.81a.814.814 0 00.03 1.131.769.769 0 001.105-.031 3.396 3.396 0 012.519-1.112H10c.962 0 1.856.395 2.518 1.112a.77.77 0 001.104.031.814.814 0 00.031-1.13 5.033 5.033 0 00-1.509-1.118c.393-.496.63-1.127.63-1.813C12.773 4.292 11.511 3 9.96 3 8.41 3 7.149 4.292 7.149 5.88c0 .693.24 1.33.64 1.827-.552.27-1.056.642-1.481 1.103zM9.96 4.6c.69 0 1.25.574 1.25 1.28 0 .706-.56 1.28-1.25 1.28s-1.25-.574-1.25-1.28c0-.706.56-1.28 1.25-1.28z" fill="#494949"></path></svg><a target="_blank" rel="noreferrer" href="https://webinar.darkreading.com/1317679?keycode=sbx&cid=smartbox_techweb_webcast_8.500001173&_mc=smartbox_techweb_webcast_8.500001173">Vendors as Your Largest BEC Threat</a></li><li class="feed-item"><svg width="20" height="18" fill="none" xmlns="http://www.w3.org/2000/svg" class="feed-item-icon"><path d="M19.803 14.639a.807.807 0 00-.088-.156l-1.822-2.52a.775.775 0 00-.628-.323H3.516V3.2c0-.882.701-1.6 1.563-1.6h9.842c.862 0 1.563.718 1.563 1.6v5.2c0 .442.35.8.781.8a.79.79 0 00.781-.8V3.2c0-1.764-1.402-3.2-3.125-3.2H5.08C3.356 0 1.954 1.436 1.954 3.2v8.976L.285 14.483a.805.805 0 00-.088.156 2.442 2.442 0 00.186 2.275A2.323 2.323 0 002.344 18h15.312c.793 0 1.526-.406 1.96-1.086.435-.68.505-1.53.187-2.275zm-1.494 1.399a.764.764 0 01-.654.362h-4.92a.79.79 0 00-.782-.8H8.047a.79.79 0 00-.781.8H2.344a.764.764 0 01-.653-.362.801.801 0 01-.089-.688l1.527-2.11H16.87l1.527 2.11a.801.801 0 01-.089.688zM6.308 8.81a.814.814 0 00.03 1.131.769.769 0 001.105-.031 3.396 3.396 0 012.519-1.112H10c.962 0 1.856.395 2.518 1.112a.77.77 0 001.104.031.814.814 0 00.031-1.13 5.033 5.033 0 00-1.509-1.118c.393-.496.63-1.127.63-1.813C12.773 4.292 11.511 3 9.96 3 8.41 3 7.149 4.292 7.149 5.88c0 .693.24 1.33.64 1.827-.552.27-1.056.642-1.481 1.103zM9.96 4.6c.69 0 1.25.574 1.25 1.28 0 .706-.56 1.28-1.25 1.28s-1.25-.574-1.25-1.28c0-.706.56-1.28 1.25-1.28z" fill="#494949"></path></svg><a target="_blank" rel="noreferrer" href="https://webinar.darkreading.com/1314754?keycode=sbx&cid=smartbox_techweb_webcast_8.500001168&_mc=smartbox_techweb_webcast_8.500001168">Harnessing the Power of Security Automation</a></li><li class="feed-item"><svg width="20" height="18" fill="none" xmlns="http://www.w3.org/2000/svg" class="feed-item-icon"><path d="M19.803 14.639a.807.807 0 00-.088-.156l-1.822-2.52a.775.775 0 00-.628-.323H3.516V3.2c0-.882.701-1.6 1.563-1.6h9.842c.862 0 1.563.718 1.563 1.6v5.2c0 .442.35.8.781.8a.79.79 0 00.781-.8V3.2c0-1.764-1.402-3.2-3.125-3.2H5.08C3.356 0 1.954 1.436 1.954 3.2v8.976L.285 14.483a.805.805 0 00-.088.156 2.442 2.442 0 00.186 2.275A2.323 2.323 0 002.344 18h15.312c.793 0 1.526-.406 1.96-1.086.435-.68.505-1.53.187-2.275zm-1.494 1.399a.764.764 0 01-.654.362h-4.92a.79.79 0 00-.782-.8H8.047a.79.79 0 00-.781.8H2.344a.764.764 0 01-.653-.362.801.801 0 01-.089-.688l1.527-2.11H16.87l1.527 2.11a.801.801 0 01-.089.688zM6.308 8.81a.814.814 0 00.03 1.131.769.769 0 001.105-.031 3.396 3.396 0 012.519-1.112H10c.962 0 1.856.395 2.518 1.112a.77.77 0 001.104.031.814.814 0 00.031-1.13 5.033 5.033 0 00-1.509-1.118c.393-.496.63-1.127.63-1.813C12.773 4.292 11.511 3 9.96 3 8.41 3 7.149 4.292 7.149 5.88c0 .693.24 1.33.64 1.827-.552.27-1.056.642-1.481 1.103zM9.96 4.6c.69 0 1.25.574 1.25 1.28 0 .706-.56 1.28-1.25 1.28s-1.25-.574-1.25-1.28c0-.706.56-1.28 1.25-1.28z" fill="#494949"></path></svg><a target="_blank" rel="noreferrer" href="https://webinar.darkreading.com/1315271?keycode=sbx&cid=smartbox_techweb_webcast_8.500001167&_mc=smartbox_techweb_webcast_8.500001167">The Value Drivers of Attack Surface Management, Revealed</a></li><li class="feed-item"><svg width="20" height="18" fill="none" xmlns="http://www.w3.org/2000/svg" class="feed-item-icon"><path d="M19.803 14.639a.807.807 0 00-.088-.156l-1.822-2.52a.775.775 0 00-.628-.323H3.516V3.2c0-.882.701-1.6 1.563-1.6h9.842c.862 0 1.563.718 1.563 1.6v5.2c0 .442.35.8.781.8a.79.79 0 00.781-.8V3.2c0-1.764-1.402-3.2-3.125-3.2H5.08C3.356 0 1.954 1.436 1.954 3.2v8.976L.285 14.483a.805.805 0 00-.088.156 2.442 2.442 0 00.186 2.275A2.323 2.323 0 002.344 18h15.312c.793 0 1.526-.406 1.96-1.086.435-.68.505-1.53.187-2.275zm-1.494 1.399a.764.764 0 01-.654.362h-4.92a.79.79 0 00-.782-.8H8.047a.79.79 0 00-.781.8H2.344a.764.764 0 01-.653-.362.801.801 0 01-.089-.688l1.527-2.11H16.87l1.527 2.11a.801.801 0 01-.089.688zM6.308 8.81a.814.814 0 00.03 1.131.769.769 0 001.105-.031 3.396 3.396 0 012.519-1.112H10c.962 0 1.856.395 2.518 1.112a.77.77 0 001.104.031.814.814 0 00.031-1.13 5.033 5.033 0 00-1.509-1.118c.393-.496.63-1.127.63-1.813C12.773 4.292 11.511 3 9.96 3 8.41 3 7.149 4.292 7.149 5.88c0 .693.24 1.33.64 1.827-.552.27-1.056.642-1.481 1.103zM9.96 4.6c.69 0 1.25.574 1.25 1.28 0 .706-.56 1.28-1.25 1.28s-1.25-.574-1.25-1.28c0-.706.56-1.28 1.25-1.28z" fill="#494949"></path></svg><a target="_blank" rel="noreferrer" href="https://webinar.darkreading.com/1341387?keycode=sbx&cid=smartbox_techweb_webcast_8.500001166&_mc=smartbox_techweb_webcast_8.500001166">Implementing and Using XDR to Improve Enterprise Cybersecurity</a></li><li class="feed-item"><svg width="20" height="18" fill="none" xmlns="http://www.w3.org/2000/svg" class="feed-item-icon"><path d="M19.803 14.639a.807.807 0 00-.088-.156l-1.822-2.52a.775.775 0 00-.628-.323H3.516V3.2c0-.882.701-1.6 1.563-1.6h9.842c.862 0 1.563.718 1.563 1.6v5.2c0 .442.35.8.781.8a.79.79 0 00.781-.8V3.2c0-1.764-1.402-3.2-3.125-3.2H5.08C3.356 0 1.954 1.436 1.954 3.2v8.976L.285 14.483a.805.805 0 00-.088.156 2.442 2.442 0 00.186 2.275A2.323 2.323 0 002.344 18h15.312c.793 0 1.526-.406 1.96-1.086.435-.68.505-1.53.187-2.275zm-1.494 1.399a.764.764 0 01-.654.362h-4.92a.79.79 0 00-.782-.8H8.047a.79.79 0 00-.781.8H2.344a.764.764 0 01-.653-.362.801.801 0 01-.089-.688l1.527-2.11H16.87l1.527 2.11a.801.801 0 01-.089.688zM6.308 8.81a.814.814 0 00.03 1.131.769.769 0 001.105-.031 3.396 3.396 0 012.519-1.112H10c.962 0 1.856.395 2.518 1.112a.77.77 0 001.104.031.814.814 0 00.031-1.13 5.033 5.033 0 00-1.509-1.118c.393-.496.63-1.127.63-1.813C12.773 4.292 11.511 3 9.96 3 8.41 3 7.149 4.292 7.149 5.88c0 .693.24 1.33.64 1.827-.552.27-1.056.642-1.481 1.103zM9.96 4.6c.69 0 1.25.574 1.25 1.28 0 .706-.56 1.28-1.25 1.28s-1.25-.574-1.25-1.28c0-.706.56-1.28 1.25-1.28z" fill="#494949"></path></svg><a target="_blank" rel="noreferrer" href="https://webinar.darkreading.com/1348601?keycode=sbx&cid=smartbox_techweb_webcast_8.500001165&_mc=smartbox_techweb_webcast_8.500001165">Implementing Zero Trust in Your Enterprise</a></li></ul><div class="readmore-link"><a target="_blank" rel="noreferrer" href="https://www.darkreading.com/upcoming-webinars">More Webinars</a></div></div><div id="rhc-whitePapers" class="smartbox " type="Whitepapers"><div class="smartbox-title">White Papers</div><ul class="feed"><li class="feed-item"><svg width="24" height="24" fill="none" xmlns="http://www.w3.org/2000/svg" class="feed-item-icon"><g clip-path="url(#whitepaper_svg__clip0)" fill="#494949"><path d="M19.997 18H6.666a.669.669 0 00-.67.669V20a.669.669 0 11-1.33 0V4a.669.669 0 01.662-.669h11.338a.669.669 0 01.662.669v12a.669.669 0 001.331 0V4a2 2 0 00-1.993-2H5.328a2 2 0 00-2 2v16a2 2 0 004 0v-.669h12V20a.669.669 0 01-.669.669h-10a.668.668 0 100 1.331h10a2 2 0 002-2v-1.331a.669.669 0 00-.662-.669z"></path><path d="M13.996 7H10.67a.668.668 0 110-1.331h3.325a.67.67 0 110 1.33zM13.996 11.375H10.67a.669.669 0 010-1.331h3.325a.67.67 0 010 1.331zM13.996 15.681H10.67a.67.67 0 110-1.331h3.325a.668.668 0 110 1.331zM8.003 7a.669.669 0 11.251-.049.669.669 0 01-.258.05h.007zM8.003 11.375a.669.669 0 11.251-.049.67.67 0 01-.258.05h.007zM8.003 15.681a.669.669 0 11.251-.049.666.666 0 01-.258.05h.007z"></path></g><defs><clipPath id="whitepaper_svg__clip0"><path fill="#fff" transform="translate(1.996 2)" d="M0 0h20v20H0z"></path></clipPath></defs></svg><a target="_blank" rel="noreferrer" href="https://www.informationweek.com/whitepaper/cybersecurity/software-as-a-service/sumo-logic-for-continuous-intelligence/436973?cid=smartbox_techweb_whitepaper_14.500005115&_mc=smartbox_techweb_whitepaper_14.500005115">Sumo Logic for Continuous Intelligence</a></li><li class="feed-item"><svg width="24" height="24" fill="none" xmlns="http://www.w3.org/2000/svg" class="feed-item-icon"><g clip-path="url(#whitepaper_svg__clip0)" fill="#494949"><path d="M19.997 18H6.666a.669.669 0 00-.67.669V20a.669.669 0 11-1.33 0V4a.669.669 0 01.662-.669h11.338a.669.669 0 01.662.669v12a.669.669 0 001.331 0V4a2 2 0 00-1.993-2H5.328a2 2 0 00-2 2v16a2 2 0 004 0v-.669h12V20a.669.669 0 01-.669.669h-10a.668.668 0 100 1.331h10a2 2 0 002-2v-1.331a.669.669 0 00-.662-.669z"></path><path d="M13.996 7H10.67a.668.668 0 110-1.331h3.325a.67.67 0 110 1.33zM13.996 11.375H10.67a.669.669 0 010-1.331h3.325a.67.67 0 010 1.331zM13.996 15.681H10.67a.67.67 0 110-1.331h3.325a.668.668 0 110 1.331zM8.003 7a.669.669 0 11.251-.049.669.669 0 01-.258.05h.007zM8.003 11.375a.669.669 0 11.251-.049.67.67 0 01-.258.05h.007zM8.003 15.681a.669.669 0 11.251-.049.666.666 0 01-.258.05h.007z"></path></g><defs><clipPath id="whitepaper_svg__clip0"><path fill="#fff" transform="translate(1.996 2)" d="M0 0h20v20H0z"></path></clipPath></defs></svg><a target="_blank" rel="noreferrer" href="https://www.informationweek.com/whitepaper/cybersecurity/security/protecting-the-endpoint-to-work-from-anywhere/437563?cid=smartbox_techweb_whitepaper_14.500005105&_mc=smartbox_techweb_whitepaper_14.500005105">Protecting Endpoint to Work from Anywhere</a></li><li class="feed-item"><svg width="24" height="24" fill="none" xmlns="http://www.w3.org/2000/svg" class="feed-item-icon"><g clip-path="url(#whitepaper_svg__clip0)" fill="#494949"><path d="M19.997 18H6.666a.669.669 0 00-.67.669V20a.669.669 0 11-1.33 0V4a.669.669 0 01.662-.669h11.338a.669.669 0 01.662.669v12a.669.669 0 001.331 0V4a2 2 0 00-1.993-2H5.328a2 2 0 00-2 2v16a2 2 0 004 0v-.669h12V20a.669.669 0 01-.669.669h-10a.668.668 0 100 1.331h10a2 2 0 002-2v-1.331a.669.669 0 00-.662-.669z"></path><path d="M13.996 7H10.67a.668.668 0 110-1.331h3.325a.67.67 0 110 1.33zM13.996 11.375H10.67a.669.669 0 010-1.331h3.325a.67.67 0 010 1.331zM13.996 15.681H10.67a.67.67 0 110-1.331h3.325a.668.668 0 110 1.331zM8.003 7a.669.669 0 11.251-.049.669.669 0 01-.258.05h.007zM8.003 11.375a.669.669 0 11.251-.049.67.67 0 01-.258.05h.007zM8.003 15.681a.669.669 0 11.251-.049.666.666 0 01-.258.05h.007z"></path></g><defs><clipPath id="whitepaper_svg__clip0"><path fill="#fff" transform="translate(1.996 2)" d="M0 0h20v20H0z"></path></clipPath></defs></svg><a target="_blank" rel="noreferrer" href="https://www.informationweek.com/whitepaper/cybersecurity/cloud-security/the-top-10-api-vulnerabilities/437313?cid=smartbox_techweb_whitepaper_14.500005096&_mc=smartbox_techweb_whitepaper_14.500005096">The Top 10 API Vulnerabilities</a></li><li class="feed-item"><svg width="24" height="24" fill="none" xmlns="http://www.w3.org/2000/svg" class="feed-item-icon"><g clip-path="url(#whitepaper_svg__clip0)" fill="#494949"><path d="M19.997 18H6.666a.669.669 0 00-.67.669V20a.669.669 0 11-1.33 0V4a.669.669 0 01.662-.669h11.338a.669.669 0 01.662.669v12a.669.669 0 001.331 0V4a2 2 0 00-1.993-2H5.328a2 2 0 00-2 2v16a2 2 0 004 0v-.669h12V20a.669.669 0 01-.669.669h-10a.668.668 0 100 1.331h10a2 2 0 002-2v-1.331a.669.669 0 00-.662-.669z"></path><path d="M13.996 7H10.67a.668.668 0 110-1.331h3.325a.67.67 0 110 1.33zM13.996 11.375H10.67a.669.669 0 010-1.331h3.325a.67.67 0 010 1.331zM13.996 15.681H10.67a.67.67 0 110-1.331h3.325a.668.668 0 110 1.331zM8.003 7a.669.669 0 11.251-.049.669.669 0 01-.258.05h.007zM8.003 11.375a.669.669 0 11.251-.049.67.67 0 01-.258.05h.007zM8.003 15.681a.669.669 0 11.251-.049.666.666 0 01-.258.05h.007z"></path></g><defs><clipPath id="whitepaper_svg__clip0"><path fill="#fff" transform="translate(1.996 2)" d="M0 0h20v20H0z"></path></clipPath></defs></svg><a target="_blank" rel="noreferrer" href="https://www.informationweek.com/whitepaper/cybersecurity/security-monitoring/botguard-for-inventory-scalping/437293?cid=smartbox_techweb_whitepaper_14.500005094&_mc=smartbox_techweb_whitepaper_14.500005094">BotGuard for Denial of Inventory & Stockouts</a></li><li class="feed-item"><svg width="24" height="24" fill="none" xmlns="http://www.w3.org/2000/svg" class="feed-item-icon"><g clip-path="url(#whitepaper_svg__clip0)" fill="#494949"><path d="M19.997 18H6.666a.669.669 0 00-.67.669V20a.669.669 0 11-1.33 0V4a.669.669 0 01.662-.669h11.338a.669.669 0 01.662.669v12a.669.669 0 001.331 0V4a2 2 0 00-1.993-2H5.328a2 2 0 00-2 2v16a2 2 0 004 0v-.669h12V20a.669.669 0 01-.669.669h-10a.668.668 0 100 1.331h10a2 2 0 002-2v-1.331a.669.669 0 00-.662-.669z"></path><path d="M13.996 7H10.67a.668.668 0 110-1.331h3.325a.67.67 0 110 1.33zM13.996 11.375H10.67a.669.669 0 010-1.331h3.325a.67.67 0 010 1.331zM13.996 15.681H10.67a.67.67 0 110-1.331h3.325a.668.668 0 110 1.331zM8.003 7a.669.669 0 11.251-.049.669.669 0 01-.258.05h.007zM8.003 11.375a.669.669 0 11.251-.049.67.67 0 01-.258.05h.007zM8.003 15.681a.669.669 0 11.251-.049.666.666 0 01-.258.05h.007z"></path></g><defs><clipPath id="whitepaper_svg__clip0"><path fill="#fff" transform="translate(1.996 2)" d="M0 0h20v20H0z"></path></clipPath></defs></svg><a target="_blank" rel="noreferrer" href="https://www.informationweek.com/whitepaper/cybersecurity/endpoint-security/optimizing-endpoint-protection-/435693?cid=smartbox_techweb_whitepaper_14.500005082&_mc=smartbox_techweb_whitepaper_14.500005082">Optimizing Endpoint Protection</a></li></ul><div class="readmore-link"><a target="_blank" rel="noreferrer" href="https://www.informationweek.com/whitepaper/Security">More White Papers</a></div></div><div class="native-right-ads"><div class="informa-dfp-ads" data-name="Native_right_1v" data-size="fluid" data-targeting="pos=native_right_1v"></div></div><div id="rhc-events" class="smartbox " type="Live Events"><div class="smartbox-title">Events</div><ul class="feed"><li class="feed-item"><svg width="20" height="20" fill="none" xmlns="http://www.w3.org/2000/svg" class="feed-item-icon"><path d="M7.376.79c0-.436.354-.79.79-.79h8.312a2.354 2.354 0 012.351 2.351v6.82h.38a.791.791 0 010 1.58h-7.765a.791.791 0 010-1.58h5.805V2.35a.772.772 0 00-.771-.77H8.166a.791.791 0 01-.79-.79zM.79 12.117c.436 0 .79-.354.79-.79V7.776c0-.425.346-.771.771-.771h3.067c.247 0 .477.117.622.315l1.582 3.009a.785.785 0 00.466.387.785.785 0 00.603-.056.793.793 0 00.33-1.067L7.416 6.541a.785.785 0 00-.041-.07 2.357 2.357 0 00-1.902-1.047H2.351a2.354 2.354 0 00-2.35 2.352v3.55c0 .437.354.791.79.791zm.771-9.766A2.354 2.354 0 013.912 0a2.354 2.354 0 012.351 2.351 2.354 2.354 0 01-2.35 2.351 2.354 2.354 0 01-2.352-2.35zm1.58 0a.772.772 0 001.542 0 .772.772 0 00-1.542 0zm16.83 16.073A1.306 1.306 0 0118.696 20H1.305a1.306 1.306 0 01-1.277-1.574 3.848 3.848 0 011.809-2.522 2.337 2.337 0 01-.393-1.3 2.354 2.354 0 012.351-2.35 2.354 2.354 0 012.351 2.35c0 .481-.145.928-.393 1.3a3.824 3.824 0 011.145 1.034 3.847 3.847 0 011.144-1.034 2.338 2.338 0 01-.393-1.3A2.354 2.354 0 0110 12.255a2.354 2.354 0 012.351 2.35c0 .481-.145.928-.393 1.3a3.805 3.805 0 011.144 1.034 3.841 3.841 0 011.144-1.034 2.337 2.337 0 01-.392-1.3 2.354 2.354 0 012.35-2.35 2.354 2.354 0 012.352 2.35 2.353 2.353 0 01-2.31 2.351l-.02.001h-.042c-.944 0-1.78.599-2.104 1.464h4.346a.792.792 0 01.604-.606.083.083 0 01.007-.001h.001a.794.794 0 01.934.61zm-4.537-3.82a.772.772 0 001.542 0 .772.772 0 00-1.542 0zm-12.41 0a.772.772 0 001.542 0 .772.772 0 00-1.542 0zm2.897 3.815a2.258 2.258 0 00-2.105-1.463h-.041c-.944 0-1.782.599-2.105 1.463h4.25zm3.308-3.814a.772.772 0 001.542 0 .772.772 0 00-1.542 0zm2.896 3.814a2.258 2.258 0 00-2.105-1.463h-.04c-.944 0-1.781.599-2.105 1.463h4.25z" fill="#494949"></path></svg><a target="_blank" rel="noreferrer" href="https://ve.informaengage.com/virtual-events/dr-how-data-breaches-happen/?kcode=sbx&cid=smartbox_techweb_session_16.500268&_mc=smartbox_techweb_session_16.500268">Dark Reading Virtual Event - June 23 - Learn More</a></li><li class="feed-item"><svg width="20" height="20" fill="none" xmlns="http://www.w3.org/2000/svg" class="feed-item-icon"><path d="M7.376.79c0-.436.354-.79.79-.79h8.312a2.354 2.354 0 012.351 2.351v6.82h.38a.791.791 0 010 1.58h-7.765a.791.791 0 010-1.58h5.805V2.35a.772.772 0 00-.771-.77H8.166a.791.791 0 01-.79-.79zM.79 12.117c.436 0 .79-.354.79-.79V7.776c0-.425.346-.771.771-.771h3.067c.247 0 .477.117.622.315l1.582 3.009a.785.785 0 00.466.387.785.785 0 00.603-.056.793.793 0 00.33-1.067L7.416 6.541a.785.785 0 00-.041-.07 2.357 2.357 0 00-1.902-1.047H2.351a2.354 2.354 0 00-2.35 2.352v3.55c0 .437.354.791.79.791zm.771-9.766A2.354 2.354 0 013.912 0a2.354 2.354 0 012.351 2.351 2.354 2.354 0 01-2.35 2.351 2.354 2.354 0 01-2.352-2.35zm1.58 0a.772.772 0 001.542 0 .772.772 0 00-1.542 0zm16.83 16.073A1.306 1.306 0 0118.696 20H1.305a1.306 1.306 0 01-1.277-1.574 3.848 3.848 0 011.809-2.522 2.337 2.337 0 01-.393-1.3 2.354 2.354 0 012.351-2.35 2.354 2.354 0 012.351 2.35c0 .481-.145.928-.393 1.3a3.824 3.824 0 011.145 1.034 3.847 3.847 0 011.144-1.034 2.338 2.338 0 01-.393-1.3A2.354 2.354 0 0110 12.255a2.354 2.354 0 012.351 2.35c0 .481-.145.928-.393 1.3a3.805 3.805 0 011.144 1.034 3.841 3.841 0 011.144-1.034 2.337 2.337 0 01-.392-1.3 2.354 2.354 0 012.35-2.35 2.354 2.354 0 012.352 2.35 2.353 2.353 0 01-2.31 2.351l-.02.001h-.042c-.944 0-1.78.599-2.104 1.464h4.346a.792.792 0 01.604-.606.083.083 0 01.007-.001h.001a.794.794 0 01.934.61zm-4.537-3.82a.772.772 0 001.542 0 .772.772 0 00-1.542 0zm-12.41 0a.772.772 0 001.542 0 .772.772 0 00-1.542 0zm2.897 3.815a2.258 2.258 0 00-2.105-1.463h-.041c-.944 0-1.782.599-2.105 1.463h4.25zm3.308-3.814a.772.772 0 001.542 0 .772.772 0 00-1.542 0zm2.896 3.814a2.258 2.258 0 00-2.105-1.463h-.04c-.944 0-1.781.599-2.105 1.463h4.25z" fill="#494949"></path></svg><a target="_blank" rel="noreferrer" href="https://www.blackhat.com/us-22/?cid=smartbox_techweb_session_16.500267&_mc=smartbox_techweb_session_16.500267">Black Hat USA - August 6-11 - Learn More</a></li><li class="feed-item"><svg width="20" height="20" fill="none" xmlns="http://www.w3.org/2000/svg" class="feed-item-icon"><path d="M7.376.79c0-.436.354-.79.79-.79h8.312a2.354 2.354 0 012.351 2.351v6.82h.38a.791.791 0 010 1.58h-7.765a.791.791 0 010-1.58h5.805V2.35a.772.772 0 00-.771-.77H8.166a.791.791 0 01-.79-.79zM.79 12.117c.436 0 .79-.354.79-.79V7.776c0-.425.346-.771.771-.771h3.067c.247 0 .477.117.622.315l1.582 3.009a.785.785 0 00.466.387.785.785 0 00.603-.056.793.793 0 00.33-1.067L7.416 6.541a.785.785 0 00-.041-.07 2.357 2.357 0 00-1.902-1.047H2.351a2.354 2.354 0 00-2.35 2.352v3.55c0 .437.354.791.79.791zm.771-9.766A2.354 2.354 0 013.912 0a2.354 2.354 0 012.351 2.351 2.354 2.354 0 01-2.35 2.351 2.354 2.354 0 01-2.352-2.35zm1.58 0a.772.772 0 001.542 0 .772.772 0 00-1.542 0zm16.83 16.073A1.306 1.306 0 0118.696 20H1.305a1.306 1.306 0 01-1.277-1.574 3.848 3.848 0 011.809-2.522 2.337 2.337 0 01-.393-1.3 2.354 2.354 0 012.351-2.35 2.354 2.354 0 012.351 2.35c0 .481-.145.928-.393 1.3a3.824 3.824 0 011.145 1.034 3.847 3.847 0 011.144-1.034 2.338 2.338 0 01-.393-1.3A2.354 2.354 0 0110 12.255a2.354 2.354 0 012.351 2.35c0 .481-.145.928-.393 1.3a3.805 3.805 0 011.144 1.034 3.841 3.841 0 011.144-1.034 2.337 2.337 0 01-.392-1.3 2.354 2.354 0 012.35-2.35 2.354 2.354 0 012.352 2.35 2.353 2.353 0 01-2.31 2.351l-.02.001h-.042c-.944 0-1.78.599-2.104 1.464h4.346a.792.792 0 01.604-.606.083.083 0 01.007-.001h.001a.794.794 0 01.934.61zm-4.537-3.82a.772.772 0 001.542 0 .772.772 0 00-1.542 0zm-12.41 0a.772.772 0 001.542 0 .772.772 0 00-1.542 0zm2.897 3.815a2.258 2.258 0 00-2.105-1.463h-.041c-.944 0-1.782.599-2.105 1.463h4.25zm3.308-3.814a.772.772 0 001.542 0 .772.772 0 00-1.542 0zm2.896 3.814a2.258 2.258 0 00-2.105-1.463h-.04c-.944 0-1.781.599-2.105 1.463h4.25z" fill="#494949"></path></svg><a target="_blank" rel="noreferrer" href="https://www.blackhat.com/tr-22/?cid=smartbox_techweb_session_16.500262&_mc=smartbox_techweb_session_16.500262">Black Hat Spring Trainings - June 13-16 - Learn More</a></li></ul><div class="readmore-link"><a target="_blank" rel="noreferrer" href="https://www.darkreading.com/upcoming-events">More Events</a></div></div></div><div class="w-100 d-lg-none mt-4"><div class="more-insights mt-2"><div class="title">More Insights</div><div class="container"><div class="row"><div id="articleFooter-moreInsights-" class="smartbox col-md-4"><div class="smartbox-title">White Papers</div><ul class="feed"><li class="feed-item"><div class="bullet-container square"><svg width="8" height="8" fill="none" xmlns="http://www.w3.org/2000/svg" alt="White Papers" class="icon-bullet square"><path fill="#181C21" d="M0 0h8v8H0z"></path></svg><svg width="8" height="8" fill="none" xmlns="http://www.w3.org/2000/svg" alt="White Papers" class="icon-bullet-on-hover square"><path fill="#9F110D" d="M0 0h8v8H0z"></path></svg></div><a target="_blank" rel="noreferrer" href="https://www.informationweek.com/whitepaper/cybersecurity/software-as-a-service/sumo-logic-for-continuous-intelligence/436973?cid=smartbox_techweb_whitepaper_14.500005115&_mc=smartbox_techweb_whitepaper_14.500005115">Sumo Logic for Continuous Intelligence</a></li><li class="feed-item"><div class="bullet-container square"><svg width="8" height="8" fill="none" xmlns="http://www.w3.org/2000/svg" alt="White Papers" class="icon-bullet square"><path fill="#181C21" d="M0 0h8v8H0z"></path></svg><svg width="8" height="8" fill="none" xmlns="http://www.w3.org/2000/svg" alt="White Papers" class="icon-bullet-on-hover square"><path fill="#9F110D" d="M0 0h8v8H0z"></path></svg></div><a target="_blank" rel="noreferrer" href="https://www.informationweek.com/whitepaper/cybersecurity/security/protecting-the-endpoint-to-work-from-anywhere/437563?cid=smartbox_techweb_whitepaper_14.500005105&_mc=smartbox_techweb_whitepaper_14.500005105">Protecting Endpoint to Work from Anywhere</a></li></ul><div class="readmore-link"><a target="_blank" rel="noreferrer" href="https://www.informationweek.com/whitepaper/Security">More White Papers</a></div></div><div id="articleFooter-moreInsights-" class="smartbox col-md-4"><div class="smartbox-title">Webinars</div><ul class="feed"><li class="feed-item"><div class="bullet-container square"><svg width="8" height="8" fill="none" xmlns="http://www.w3.org/2000/svg" alt="Webinars" class="icon-bullet square"><path fill="#181C21" d="M0 0h8v8H0z"></path></svg><svg width="8" height="8" fill="none" xmlns="http://www.w3.org/2000/svg" alt="Webinars" class="icon-bullet-on-hover square"><path fill="#9F110D" d="M0 0h8v8H0z"></path></svg></div><a target="_blank" rel="noreferrer" href="https://webinar.darkreading.com/1317679?keycode=sbx&cid=smartbox_techweb_webcast_8.500001173&_mc=smartbox_techweb_webcast_8.500001173">Vendors as Your Largest BEC Threat</a></li><li class="feed-item"><div class="bullet-container square"><svg width="8" height="8" fill="none" xmlns="http://www.w3.org/2000/svg" alt="Webinars" class="icon-bullet square"><path fill="#181C21" d="M0 0h8v8H0z"></path></svg><svg width="8" height="8" fill="none" xmlns="http://www.w3.org/2000/svg" alt="Webinars" class="icon-bullet-on-hover square"><path fill="#9F110D" d="M0 0h8v8H0z"></path></svg></div><a target="_blank" rel="noreferrer" href="https://webinar.darkreading.com/1314754?keycode=sbx&cid=smartbox_techweb_webcast_8.500001168&_mc=smartbox_techweb_webcast_8.500001168">Harnessing the Power of Security Automation</a></li></ul><div class="readmore-link"><a target="_blank" rel="noreferrer" href="https://www.darkreading.com/upcoming-webinars">More Webinars</a></div></div><div id="articleFooter-moreInsights-" class="smartbox col-md-4"><div class="smartbox-title">Reports</div><ul class="feed"><li class="feed-item"><div class="bullet-container square"><svg width="8" height="8" fill="none" xmlns="http://www.w3.org/2000/svg" alt="Reports" class="icon-bullet square"><path fill="#181C21" d="M0 0h8v8H0z"></path></svg><svg width="8" height="8" fill="none" xmlns="http://www.w3.org/2000/svg" alt="Reports" class="icon-bullet-on-hover square"><path fill="#9F110D" d="M0 0h8v8H0z"></path></svg></div><a target="_blank" rel="noreferrer" href="https://www.informationweek.com/whitepaper/network-and-perimeter-security/networking/incorporating-a-prevention-mindset-into-threat-detection-and-response/439373?cid=smartbox_techweb_analytics_7.300005934&_mc=smartbox_techweb_analytics_7.300005934">Incorporating a Prevention Mindset into Threat Detection and Response</a></li><li class="feed-item"><div class="bullet-container square"><svg width="8" height="8" fill="none" xmlns="http://www.w3.org/2000/svg" alt="Reports" class="icon-bullet square"><path fill="#181C21" d="M0 0h8v8H0z"></path></svg><svg width="8" height="8" fill="none" xmlns="http://www.w3.org/2000/svg" alt="Reports" class="icon-bullet-on-hover square"><path fill="#9F110D" d="M0 0h8v8H0z"></path></svg></div><a target="_blank" rel="noreferrer" href="https://www.informationweek.com/whitepaper/cloud-security/network-and-perimeter-security/practical-network-security-approaches-for-a-multicloud,-hybrid-it-world/438913?cid=smartbox_techweb_analytics_7.300005932&_mc=smartbox_techweb_analytics_7.300005932">Practical Network Security Approaches for a Multicloud, Hybrid IT World</a></li></ul><div class="readmore-link"><a target="_blank" rel="noreferrer" href="https://www.darkreading.com/must-reads">More Reports</a></div></div></div></div></div></div></div></div></div><script defer="" src="https://code.jquery.com/jquery-3.3.1.slim.min.js"></script><script defer="" src="https://cdnjs.cloudflare.com/ajax/libs/popper.js/1.14.0/umd/popper.min.js"></script><script defer="" src="https://stackpath.bootstrapcdn.com/bootstrap/4.1.0/js/bootstrap.min.js"></script></main><footer><div class="container"><div class="row"><div class="col-lg-5"><h4 class="f-nav-title">Discover More From Informa Tech</h4><div class="nav-2-col"><ul class="nav-2-col-ul-left"><li><a href="https://www.interop.com/" rel="noreferrer" target="_blank">Interop</a></li><li><a href="https://www.informationweek.com/" rel="noreferrer" target="_blank">InformationWeek</a></li><li><a href="https://www.networkcomputing.com/" rel="noreferrer" target="_blank">Network Computing</a></li><li><a href="https://www.itprotoday.com/" rel="noreferrer" target="_blank">ITPro Today</a></li></ul><ul class="nav-2-col-ul-right"><li><a href="https://www.datacenterknowledge.com/" rel="noreferrer" target="_blank">Data Center Knowledge</a></li><li><a href="https://www.blackhat.com/" rel="noreferrer" target="_blank">Black Hat</a></li><li><a href="http://www.omdia.com/" rel="noreferrer" target="_blank">Omdia</a></li></ul></div></div><div class="col-lg-3"><h4 class="f-nav-title">Working With Us</h4><ul class="nav-2-col-ul-left"><li><a href="https://www.darkreading.com/about-us" rel="noreferrer" target="_blank">About Us</a></li><li><a href="https://www.darkreading.com/advertise" rel="noreferrer" target="_blank">Advertise</a></li><li><a href="https://info.wrightsmedia.com/informa-licensing-reprints-request" rel="noreferrer" target="_blank">Reprints</a></li></ul></div><div class="col-lg-4"><h4 class="f-nav-title f-nav-social-networks text-lg-left">Follow Dark Reading On Social</h4><div class="f-social-networks"><ul class="d-flex justify-content-lg-start w-100"><li class="social-icon-wrap"><a href="https://www.darkreading.com/rss.xml" rel="noreferrer" target="_blank"><svg width="16" height="16" viewBox="0 0 1792 1792" xmlns="http://www.w3.org/2000/svg"><path d="M576 1344q0 80-56 136t-136 56-136-56-56-136 56-136 136-56 136 56 56 136zm512 123q2 28-17 48-18 21-47 21H889q-25 0-43-16.5t-20-41.5q-22-229-184.5-391.5T250 902q-25-2-41.5-20T192 839V704q0-29 21-47 17-17 43-17h5q160 13 306 80.5T826 902q114 113 181.5 259t80.5 306zm512 2q2 27-18 47-18 20-46 20h-143q-26 0-44.5-17.5T1329 1476q-12-215-101-408.5t-231.5-336-336-231.5T252 398q-25-1-42.5-19.5T192 335V192q0-28 20-46 18-18 44-18h3q262 13 501.5 120T1186 542q187 186 294 425.5t120 501.5z"></path></svg></a></li><li class="social-icon-wrap"><a href="https://twitter.com/DarkReading" rel="noreferrer" target="_blank"><svg width="16" height="16" viewBox="0 0 1792 1792" xmlns="http://www.w3.org/2000/svg"><path d="M1684 408q-67 98-162 167 1 14 1 42 0 130-38 259.5T1369.5 1125 1185 1335.5t-258 146-323 54.5q-271 0-496-145 35 4 78 4 225 0 401-138-105-2-188-64.5T285 1033q33 5 61 5 43 0 85-11-112-23-185.5-111.5T172 710v-4q68 38 146 41-66-44-105-115t-39-154q0-88 44-163 121 149 294.5 238.5T884 653q-8-38-8-74 0-134 94.5-228.5T1199 256q140 0 236 102 109-21 205-78-37 115-142 178 93-10 186-50z"></path></svg></a></li><li class="social-icon-wrap"><a href="https://www.linkedin.com/company/dark-reading/" rel="noreferrer" target="_blank"><svg width="16" height="16" viewBox="0 0 1792 1792" xmlns="http://www.w3.org/2000/svg"><path d="M477 625v991H147V625h330zm21-306q1 73-50.5 122T312 490h-2q-82 0-132-49t-50-122q0-74 51.5-122.5T314 148t133 48.5T498 319zm1166 729v568h-329v-530q0-105-40.5-164.5T1168 862q-63 0-105.5 34.5T999 982q-11 30-11 81v553H659q2-399 2-647t-1-296l-1-48h329v144h-2q20-32 41-56t56.5-52 87-43.5T1285 602q171 0 275 113.5t104 332.5z"></path></svg></a></li><li class="social-icon-wrap"><a href="https://www.facebook.com/darkreadingcom" rel="noreferrer" target="_blank"><svg width="16" height="16" viewBox="0 0 1792 1792" xmlns="http://www.w3.org/2000/svg"><path d="M1343 12v264h-157q-86 0-116 36t-30 108v189h293l-39 296h-254v759H734V905H479V609h255V391q0-186 104-288.5T1115 0q147 0 228 12z"></path></svg></a></li></ul></div></div></div><div class="row"><div class="w-100"><div class="f-hr"></div></div></div><div class="row"><div class="col-md-12 b-f-wrap "><div class="f-logo-wrap d-flex justify-content-between align-items-center"><div class="f-logo"><div class="lazyload-wrapper " style="margin:auto"><div style="height:200px" class="lazyload-placeholder"></div></div></div><div class="f-h-nav"><ul class="nav-horizontal d-flex"><li><a href="https://tech.informa.com/" rel="noreferrer" target="_blank">Home</a></li><li><a href="https://tech.informa.com/cookie-policy" rel="noreferrer" target="_blank">Cookies</a></li><li><a href="https://tech.informa.com/privacy-policy" rel="noreferrer" target="_blank">Privacy</a></li><li><a href="https://tech.informa.com/terms-and-conditions" rel="noreferrer" target="_blank">Terms</a></li></ul></div></div></div></div><div class="row"><div class="w-100"><div class="f-hr"></div></div></div><div class="row"><div class="col-md-12 b-f-wrap"><div class="f-logo-wrap d-flex justify-content-between align-items-center"><div class="f-logo o-hidden d-none d-sm-block"><img src="https://eu-images.contentstack.com/v3/assets/blt66983808af36a8ef/blt3edeb23396a4b5dc/60b1ea7a9afdef577986633e/Whitelogo_1.png" alt="Logo"/></div><div class="copyright-wrap"><p>Copyright © <!-- -->2022<!-- --> <!-- -->Informa PLC Informa UK Limited is a company registered in England and Wales with company number 1072954 whose registered office is 5 Howick Place, London, SW1P 1WG.</p></div></div></div></div></div></footer></div></div></div><script id="__NEXT_DATA__" type="application/json">{"props":{"pageProps":{"data":{"typeOfSlug":"articlePost","result":{"_version":3,"locale":"en-us","uid":"bltb8b51aa64bdcf847","ACL":{},"_in_progress":false,"article_label":[{"_version":2,"locale":"en-us","uid":"blt610cb37ce61b4a29","ACL":{},"_in_progress":false,"article_label_page_description":"","created_at":"2021-05-29T07:27:37.247Z","created_by":"blt9a0fc67c46c47dd7","label":"Commentary","seo":{"canonical_url":"","meta_description":"","meta_keywords":"","meta_title":""},"tags":[],"title":"Commentary","updated_at":"2021-09-12T15:45:51.152Z","updated_by":"blt871c9fa65adba4f6","url":"/commentary","_content_type_uid":"dr_article_label","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-09-14T10:07:22.582Z","user":"blt986fc66e34c7b415"}}],"author_page":[{"_content_type_uid":"dr_author","_version":4,"locale":"en-us","uid":"blt4affc35d13fd5dcf","_in_progress":false,"author_description":"An award winning writer and journalist, for more than 20 years George Hulme has written about business, technology, and IT security topics. He currently freelances for a wide range of publications, and is security blogger at InformationWeek.com.","author_email":"george@georgehulme.com","author_name":"George V. Hulme","author_role":"Contributor","created_at":"2021-06-24T07:19:49.732Z","created_by":"blt5ee151557599d2cd","portrait":{"_version":1,"is_dir":false,"uid":"blt1294f16114f9d036","ACL":{},"content_type":"image/jpeg","created_at":"2021-06-24T07:19:49.286Z","created_by":"blt5ee151557599d2cd","file_size":"6449","filename":"Hulme-IWK-125x125.jpg","parent_uid":"blt60b58d3e4f06fc5f","tags":[],"title":"Hulme-IWK-125x125.jpg","updated_at":"2021-06-24T07:19:49.286Z","updated_by":"blt5ee151557599d2cd","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-09-22T04:14:19.227Z","user":"blt5ee151557599d2cd"},"url":"https://eu-images.contentstack.com/v3/assets/blt66983808af36a8ef/blt1294f16114f9d036/60d43215e1461d39eb814e70/Hulme-IWK-125x125.jpg"},"title":"George V. Hulme","updated_at":"2021-06-26T01:00:33.732Z","updated_by":"blt5ee151557599d2cd","url":"/author/george-v-hulme","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-09-22T04:14:17.230Z","user":"blt5ee151557599d2cd"},"ACL":{}}],"body":"Last week, Google released its shiny new Chrome browser. However, before the week finished, Google also had to issue a patch for one of security's most common -- and most well-known to developers -- application security issues: a buffer overflow vulnerability that would make it possible for an attacker to completely take over your system.According to this \u003ca href=\"http://security.bkis.vn/?p=119\"\u003eadvisory\u003c/a\u003e from security firm SVRT-Bkis, they found a critical buffer overflow in Google Chrome that would enable an attacker to take complete control of an unpatched system. \r\n\u003cP\u003e\r\nFrom the advisory:\r\n\u003cP\u003e\r\n\u003cblockquote\u003eType of Issue : Buffer Overflow.\r\n\u003cP\u003e\r\nAffected Software : Google Chrome 0.2.149.27.\r\n\u003cP\u003e\r\nExploitation Environment : Google Chrome on Windows XP SP2.\r\n\u003cP\u003e\r\nImpact: Remote code execution.\r\n\u003cP\u003e\r\nRating : Critical.\r\n\u003cP\u003e\r\nDescription :\r\nThe vulnerability is caused due to a boundary error when handling the \"SaveAs\" function. On saving a malicious page with an overly long title (\u003ctitle\u003e tag in HTML), the program causes a stack-based overflow and makes it possible for attackers to execute arbitrary code on users' systems.\r\n\u003cP\u003e\r\nHow an attacker could exploit the issue :\r\nTo exploit the Vulnerability, a hacker might construct a specially crafted Web page, which contains malicious code. He then tricks users into visiting his Web site and convinces them to save this Page. Right after that, the code would be executed, giving him the privilege to make use of the affected system.\r\n\u003c/blockquote\u003e\r\n\u003cP\u003e\r\nFortunately, Google promptly fixed the flaw. Just make sure you are running version 0.2.149.29 or higher. You can do that by selecting About, then Update within Chrome, or visiting \u003ca href=\"http://www.google.com/chrome/\"\u003ethis\u003c/a\u003e Google page.\r\n\u003cP\u003e\r\nI've a suspicion we've many more Google Chrome security-related updates on the way.\r\n","byline":null,"created_at":"2021-06-28T07:34:08.528Z","created_by":"blt5ee151557599d2cd","featured_image":null,"featured_image_caption":null,"featured_image_credit":null,"keywords":[],"old_url":"/risk-management/google-chrome-polishes-its-first-security-update/d/d-id/1071754","published_date":"2008-09-08T19:26:05-05:00","seo":{"meta_keywords":"","canonical_url":null,"meta_description":"Last week, Google released its shiny new Chrome browser. However, before the week finished, Google also had to issue a patch for one of security's most common -","meta_title":"Google Chrome Polishes Its First Security Update"},"summary":"Last week, Google released its shiny new Chrome browser. However, before the week finished, Google also had to issue a patch for one of security's most common -- and most well-known to developers -- application security issues: a buffer overflow vulnerability that would make it possible for an attacker to completely take over your system.","tags":[],"term_selector":{"primaryTerm":"risk","primaryTermInRealText":"Risk","primaryCategoryBelonged":"risk","actualUrl":"/risk/google-chrome-polishes-its-first-security-update"},"title":"Google Chrome Polishes Its First Security Update","updated_at":"2022-03-14T15:41:44.313Z","updated_by":"blt5ee151557599d2cd","url":"/google-chrome-polishes-its-first-security-update","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2022-03-14T15:41:45.285Z","user":"blt5ee151557599d2cd"},"pageType":"article","bodyText":"Last week, Google released its shiny new Chrome browser. However, before the week finished, Google also had to issue a patch for one of security's most common -- and most well-known to developers -- application security issues: a buffer overflow vulnerability that would make it possible for an attacker to completely take over your system.According to this advisory from security firm SVRT-Bkis, they found a critical buffer overflow in Google Chrome that would enable an attacker to take complete control of an unpatched system. \r \r From the advisory:\r \r Type of Issue : Buffer Overflow.\r \r Affected Software : Google Chrome 0.2.149.27.\r \r Exploitation Environment : Google Chrome on Windows XP SP2.\r \r Impact: Remote code execution.\r \r Rating : Critical.\r \r Description :\r The vulnerability is caused due to a boundary error when handling the \"SaveAs\" function. On saving a malicious page with an overly long title ( tag in HTML), the program causes a stack-based overflow and makes it possible for attackers to execute arbitrary code on users' systems.\r \r How an attacker could exploit the issue :\r To exploit the Vulnerability, a hacker might construct a specially crafted Web page, which contains malicious code. He then tricks users into visiting his Web site and convinces them to save this Page. Right after that, the code would be executed, giving him the privilege to make use of the affected system.\r \r \r Fortunately, Google promptly fixed the flaw. Just make sure you are running version 0.2.149.29 or higher. You can do that by selecting About, then Update within Chrome, or visiting this Google page.\r \r I've a suspicion we've many more Google Chrome security-related updates on the way."},"seo":{"meta_keywords":"","canonical_url":"https://www.darkreading.com/risk/google-chrome-polishes-its-first-security-update","meta_description":"Last week, Google released its shiny new Chrome browser. However, before the week finished, Google also had to issue a patch for one of security's most common -","meta_title":"Google Chrome Polishes Its First Security Update","meta_zephr-tags":"DR-pageType-article, DR-pagePrimaryCategory-risk, DR-contentLabel-commentary, DR-pageIsSponsored-false"},"slug":"google-chrome-polishes-its-first-security-update","term":{"slug":"risk","display_options":"Standard View","topic_page_description":"Breaking news, news analysis, and expert commentary on cybersecurity risk, and the tools, technologies, and practices for assessing risk.","title":"Risk","system":{"uid":"blt7095e7265cf0f380","__typename":"EntrySystemField"},"seo":{"canonical_url":"","meta_description":"Breaking news, news analysis, and expert commentary on cybersecurity risk, and the tools, technologies, and practices for assessing risk","meta_keywords":"","meta_title":"Risk","__typename":"Seo"},"secondary_categoriesConnection":{"totalCount":1,"edges":[{"node":{"title":"[Risk] Compliance","secondary_category_name":"Compliance","slug":"compliance","display_options":"Standard View","topic_page_description":"","system":{"uid":"blt9d07d0a4c0d8cb54","__typename":"EntrySystemField"},"shown_in_header":true,"seo":{"meta_description":"Compliance","canonical_url":"","meta_keywords":"","meta_title":"Compliance","__typename":"Seo"},"sponsor_text":"","sponsor_logoConnection":{"edges":[],"__typename":"SysAssetConnection"},"image_alt_text":null,"branding":{"hub_page_color":"","hub_page_description_with_hyperlink":null,"image_alt_text":null,"hub_page_logoConnection":{"edges":[],"totalCount":0,"__typename":"SysAssetConnection"},"__typename":"DrCategorySecondaryBranding"},"__typename":"DrCategorySecondary"},"__typename":"DrPrimaryCategorySecondaryCategoriesEdge"}],"__typename":"DrPrimaryCategorySecondaryCategoriesConnection"},"sponsor_logoConnection":{"edges":[],"__typename":"SysAssetConnection"},"sponsor_text":"","image_alt_text":"","branding":{"hub_page_color":"000000","hub_page_description_with_hyperlink":"","image_alt_text":"","hub_page_logoConnection":{"totalCount":0,"edges":[],"__typename":"SysAssetConnection"},"__typename":"DrPrimaryCategoryBranding","hub_page_logo":{}},"__typename":"DrPrimaryCategory","term_related":["compliance","risk"],"term_selector":{"primaryTerm":"risk","primaryCategoryBelonged":"risk","primaryTermInRealText":"Risk"},"pagePrimaryCategory":"risk","uid":"blt7095e7265cf0f380","fullSlug":"risk","secondary_categories":[],"sponsor_logo":{},"icon":{},"term_type":"primary","isFound":true,"all_terms":["dr-tech","the-cyber-future","emerging-tech","tech-talks","tech-trends","vulnerabilities-threats","advanced-threats","insider-threats","vulnerability-management","threat-intelligence","security-now","risk","compliance","physical-security","perimeter","operations","identity-and-access-management","edge","edge-articles","edge-ask-the-experts","edge-slideshows","edge-threat-monitor","cloud","attacks-breaches","mobile","iot","endpoint","authentication","privacy","remote-workforce","careers-and-people","black-hat","application-security","database-security","analytics","security-monitoring","omdia","partner-perspectives","crowdstrike","darktrace"]},"isEdge":true,"primaryCategory":"risk","smartbox":[{"title":"Reports","ordinal":1,"type":"Reports","hidden":true,"feed":{"title":"Reports","href":"http://smartbox.techweb.com/smartbox/externalsmartbox?site_id=162801002\u0026taxonomy_ids=\u0026num_display=10\u0026article_type=analytics\u0026output_type=xml","__typename":"Link"},"read_more_link":{"title":"More Reports","href":"/must-reads","__typename":"Link"},"system":{"uid":"blt5145c70334f61d02","__typename":"EntrySystemField"},"__typename":"DrSmartbox","articles":[{"title":["Incorporating a Prevention Mindset into Threat Detection and Response"],"link":["https://www.informationweek.com/whitepaper/network-and-perimeter-security/networking/incorporating-a-prevention-mindset-into-threat-detection-and-response/439373?cid=smartbox_techweb_analytics_7.300005934\u0026_mc=smartbox_techweb_analytics_7.300005934"],"publishedSite":[""],"publishedSiteURL":[""]},{"title":["Practical Network Security Approaches for a Multicloud, Hybrid IT World"],"link":["https://www.informationweek.com/whitepaper/cloud-security/network-and-perimeter-security/practical-network-security-approaches-for-a-multicloud,-hybrid-it-world/438913?cid=smartbox_techweb_analytics_7.300005932\u0026_mc=smartbox_techweb_analytics_7.300005932"],"publishedSite":[""],"publishedSiteURL":[""],"description":["The report covers areas enterprises should focus on for their multicloud/hybrid cloud security strategy:\r\n-increase visibility over the environment\r\n-learning cloud-specific skills\r\n-relying on established security frameworks\r\n-re-architecting the network\r\n"]},{"title":["State of the Cloud: A Security Perspective"],"link":["https://www.informationweek.com/whitepaper/cloud-security/cybersecurity/state-of-the-cloud-a-security-perspective/438333?cid=smartbox_techweb_analytics_7.300005931\u0026_mc=smartbox_techweb_analytics_7.300005931"],"publishedSite":[""],"publishedSiteURL":[""],"description":["Cloud computing has evolved over the years from a nice-to-have item on the IT wish list to a core technology driving business initiatives. But despite widespread adoption, cloud-based IT systems continue to be saddled with issues related to data security, privacy, and resilience.\r\n\r\nDownload this report from Dark Reading for an in-depth look at what IT security teams are thinking and doing when it comes to the cloud."]},{"title":["Understanding DNS Threats and How to Use DNS to Expand Your Cybersecurity Arsenal"],"link":["https://www.informationweek.com/whitepaper/cybersecurity/security/understanding-dns-threats-and-how-to-use-dns-to-expand-your-cybersecurity-arsenal/437963?cid=smartbox_techweb_analytics_7.300005930\u0026_mc=smartbox_techweb_analytics_7.300005930"],"publishedSite":[""],"publishedSiteURL":[""],"description":["With attacks and breaches on the rise, enterprise security teams need full visibility over what they have in their network. DNS is a key tool for visibility and asset discovery. Proactive DNS-layer security - such as using DNS data to mitigate threats that network-based controls may miss - is about blocking threats before they compromise the enterprise."]},{"title":["Rethinking Endpoint Security in a Pandemic and Beyond"],"link":["https://www.informationweek.com/whitepaper/endpoint-security/cloud-security/how-enterprises-are-securing-the-application-environment/437053?cid=smartbox_techweb_analytics_7.300005929\u0026_mc=smartbox_techweb_analytics_7.300005929"],"publishedSite":[""],"publishedSiteURL":[""],"description":["IT security teams are expending the concept of \"endpoint security\" as companies adjust to a distributed workforce. How much responsibility will enterprise IT take for the security of personal devices such as printers. How will they manage identities across multiple cloud services?\r\n\r\nThe report covers areas enterprises should focus on for their endpoint security strategy:\r\n-Managing identities and credentials\r\n-Vulnerability scanning and remediation\r\n-Quarantining at-risk endpoints\r\n-Reviewing suspect accounts\r\n"]},{"title":["How Enterprises Are Securing the Application Environment"],"link":["https://www.informationweek.com/whitepaper/cybersecurity/cloud-security/how-enterprises-are-securing-the-application-environment/437083?cid=smartbox_techweb_analytics_7.300005928\u0026_mc=smartbox_techweb_analytics_7.300005928"],"publishedSite":[""],"publishedSiteURL":[""],"description":["Download this report from Dark Reading to learn more about the measures enterprises have adopted to ensure the security of their internally developed applications and third-party packaged applications."]},{"title":["How Enterprises Plan to Address Endpoint Security Threats in a Post-Pandemic World"],"link":["https://www.informationweek.com/whitepaper/cybersecurity/endpoint-security/how-enterprises-plan-to-address-endpoint-security-threats-in-a-post-pandemic-world/436653?cid=smartbox_techweb_analytics_7.300005925\u0026_mc=smartbox_techweb_analytics_7.300005925"],"publishedSite":[""],"publishedSiteURL":[""],"description":["Dark Reading's 2022 Endpoint Security Report examines how IT and cybersecurity professionals are grappling with the impact of pandemic-related changes on endpoint security strategies. The report explores how they are building their endpoint security defenses, and provides insight on what organizations are doing to protect users from malware, hackers, and social engineering attacks."]},{"title":["How Enterprises Are Assessing Cybersecurity Risk in Today's Environment"],"link":["https://www.informationweek.com/whitepaper/cybersecurity/cloud-services/how-enterprises-are-assessing-cybersecurity-risk-in-today%E2%80%99s-environment/434623?cid=smartbox_techweb_analytics_7.300005921\u0026_mc=smartbox_techweb_analytics_7.300005921"],"publishedSite":[""],"publishedSiteURL":[""],"description":["Many cybersecurity pros expect fundamental, long-term changes to their organization's computing and data security due to the shift to more remote work and accelerated cloud adoption. Download this report from Dark Reading to learn more about their challenges and concerns."]},{"title":["Defending Against Critical Threats"],"link":["https://www.informationweek.com/whitepaper/cybersecurity/endpoint-security/defending-against-critical-threats/429033?cid=smartbox_techweb_analytics_7.300005906\u0026_mc=smartbox_techweb_analytics_7.300005906"],"publishedSite":[""],"publishedSiteURL":[""]},{"title":["CVE Weaponization Report"],"link":["https://www.informationweek.com/whitepaper/cybersecurity/risk-management-security/cve-weaponization-report/429173?cid=smartbox_techweb_analytics_7.300005901\u0026_mc=smartbox_techweb_analytics_7.300005901"],"publishedSite":[""],"publishedSiteURL":[""]}]},{"title":"Webinars","ordinal":1,"type":"Webinars","hidden":false,"feed":{"title":"Webinars","href":"https://smartbox.techweb.com/smartbox/externalsmartbox?site_id=162801002\u0026taxonomy_ids=\u0026num_display=5\u0026article_type=webcast\u0026output_type=xml","__typename":"Link"},"read_more_link":{"title":"More Webinars","href":"https://www.darkreading.com/upcoming-webinars","__typename":"Link"},"system":{"uid":"blt8f82585c522cc0f5","__typename":"EntrySystemField"},"__typename":"DrSmartbox","articles":[{"title":["Vendors as Your Largest BEC Threat"],"link":["https://webinar.darkreading.com/1317679?keycode=sbx\u0026cid=smartbox_techweb_webcast_8.500001173\u0026_mc=smartbox_techweb_webcast_8.500001173"],"publishedSite":[""],"eventDate":["Jun 22, 2022"],"publishedSiteURL":[""],"description":["The tactics that worked for your business five years ago likely aren't still working today, and cybercrime is no different. The CEO fraud that dominated the last few years is not nearly as successful as it used to be, partially because employees understand that their CEO isn't emailing them about gift cards at 2:00 in the morning.\r\n\r\nNot to be outdone, cybercriminals have shifted their tactics, now relying more on vendor impersonation and vendor email compromise to run their scams. The average invoice fraud attack costs $183,000 and Abnormal has seen attacks that request upwards of $2.1 million. Attend this webinar to make sure you're prepared to defend against them."]},{"title":["Harnessing the Power of Security Automation"],"link":["https://webinar.darkreading.com/1314754?keycode=sbx\u0026cid=smartbox_techweb_webcast_8.500001168\u0026_mc=smartbox_techweb_webcast_8.500001168"],"publishedSite":[""],"eventDate":["Jun 09, 2022"],"publishedSiteURL":[""],"description":["With many organizations pinched for both dollars and manpower, security and IT teams are turning to a new class of technology and practices designed to automate repetitive and time-consuming tasks in security operations. How can companies truly unleash the potential for automation? Which tasks can enterprises safely automate? How does emerging automation technology work, and how can security teams implement it in a way that is both effective and secure? In this webinar, top experts offer insights on how to make automation work for your security team."]},{"title":["The Value Drivers of Attack Surface Management, Revealed"],"link":["https://webinar.darkreading.com/1315271?keycode=sbx\u0026cid=smartbox_techweb_webcast_8.500001167\u0026_mc=smartbox_techweb_webcast_8.500001167"],"publishedSite":[""],"eventDate":["May 26, 2022"],"publishedSiteURL":[""],"description":["The value of modern ASM extends beyond the security benefits. It can save money as well through prevention, lower cyber insurance costs, lower human effort, and higher operational efficiency. Join to find out how modern attack surfaces have changed, why a new process for asset inventory is essential, and how attack surface management can fit into your existing security budget."]},{"title":["Implementing and Using XDR to Improve Enterprise Cybersecurity"],"link":["https://webinar.darkreading.com/1341387?keycode=sbx\u0026cid=smartbox_techweb_webcast_8.500001166\u0026_mc=smartbox_techweb_webcast_8.500001166"],"publishedSite":[""],"eventDate":["May 25, 2022"],"publishedSiteURL":[""],"description":["Security operations teams are taking a hard look at extended detection and response tools - XDR - as a means of collecting and analyzing threat data and identifying cyber attacks faster and more efficiently. But exactly how does XDR technology work? What tools does it require, and what skills do you need to have to use it in your enterprise? In this panel discussion, top experts will discuss the benefits of XDR, the challenges in implementing it, and details on how to implement XDR technology to speed the detection and mitigation of new exploits."]},{"title":["Implementing Zero Trust in Your Enterprise"],"link":["https://webinar.darkreading.com/1348601?keycode=sbx\u0026cid=smartbox_techweb_webcast_8.500001165\u0026_mc=smartbox_techweb_webcast_8.500001165"],"publishedSite":[""],"eventDate":["Jun 21, 2022"],"publishedSiteURL":[""],"description":["Attackers have shown time and again that perimeter security is no longer enough to keep them out. The concept of internal users and outsiders doesn't work in network defense when attackers use credential theft and lateral movement to pretend they are legitimate internal users. The zero-trust model - trust nothing, verify everything - sounds straightforward, but it can be a challenge to deploy. In this webinar, learn from the experts what zero-trust looks like in practice, how to create a multi-layered defense, and what challenges to overcome along the way. You will learn the first steps to take toward implementing a zero-trust model in your organization."]}]},{"title":"Thao test smartbox","ordinal":1,"type":"Webinars","hidden":false,"feed":{"title":"Thao tests smartbox","href":"https://smartbox.techweb.com/smartbox/externalsmartbox?site_id=162801002\u0026taxonomy_ids=\u0026num_display=3\u0026article_type=session\u0026output_type=xml","__typename":"Link"},"read_more_link":{"title":"Read more","href":"https://finance.vietstock.vn/TDC-ctcp-kinh-doanh-va-phat-trien-binh-duong.htm","__typename":"Link"},"system":{"uid":"blt378d3b273bbe06e9","__typename":"EntrySystemField"},"__typename":"DrSmartbox","articles":[{"title":["Dark Reading Virtual Event - June 23 - Learn More"],"link":["https://ve.informaengage.com/virtual-events/dr-how-data-breaches-happen/?kcode=sbx\u0026cid=smartbox_techweb_session_16.500268\u0026_mc=smartbox_techweb_session_16.500268"],"publishDate":["Jun 23, 2022"],"publishedSite":[""],"publishedSiteURL":[""],"description":["On June 23, Dark Reading will host a free, all-day virtual event will look at some of the most common vulnerabilities that lead to enterprise data breaches, as well as the latest tools and best practices for incident response.\r\n\r\nIf you are looking for the latest strategies and practices for preventing cyber breaches -- and how to respond when they happen -- then this virtual event is for you."]},{"title":["Black Hat USA - August 6-11 - Learn More"],"link":["https://www.blackhat.com/us-22/?cid=smartbox_techweb_session_16.500267\u0026_mc=smartbox_techweb_session_16.500267"],"publishDate":["Aug 11, 2022"],"publishedSite":[""],"publishedSiteURL":[""]},{"title":["Black Hat Spring Trainings - June 13-16 - Learn More"],"link":["https://www.blackhat.com/tr-22/?cid=smartbox_techweb_session_16.500262\u0026_mc=smartbox_techweb_session_16.500262"],"publishDate":["Dec 23, 2021"],"publishedSite":[""],"publishedSiteURL":[""],"description":["Black Hat Trainings will be held virtually and at Renaissance Arlington Capital View Hotel in Virginia, in the Eastern Time Zone, June 13-16. Develop in-demand cybersecurity skills in hands-on, technical Trainings taught by expert instructors from around the world. From infrastructure hacking to incident response, there's a course for individuals of all experience levels. Expand your security talent in just 4 days."]}]},{"title":"Events","ordinal":2,"type":"Live Events","hidden":false,"feed":{"title":"Events","href":"https://smartbox.techweb.com/smartbox/externalsmartbox?site_id=162801002\u0026taxonomy_ids=\u0026num_display=3\u0026article_type=session\u0026output_type=xml","__typename":"Link"},"read_more_link":{"title":"More Events","href":"https://www.darkreading.com/upcoming-events","__typename":"Link"},"system":{"uid":"blt8b6a33909c49602f","__typename":"EntrySystemField"},"__typename":"DrSmartbox","articles":[{"title":["Dark Reading Virtual Event - June 23 - Learn More"],"link":["https://ve.informaengage.com/virtual-events/dr-how-data-breaches-happen/?kcode=sbx\u0026cid=smartbox_techweb_session_16.500268\u0026_mc=smartbox_techweb_session_16.500268"],"publishDate":["Jun 23, 2022"],"publishedSite":[""],"publishedSiteURL":[""],"description":["On June 23, Dark Reading will host a free, all-day virtual event will look at some of the most common vulnerabilities that lead to enterprise data breaches, as well as the latest tools and best practices for incident response.\r\n\r\nIf you are looking for the latest strategies and practices for preventing cyber breaches -- and how to respond when they happen -- then this virtual event is for you."]},{"title":["Black Hat USA - August 6-11 - Learn More"],"link":["https://www.blackhat.com/us-22/?cid=smartbox_techweb_session_16.500267\u0026_mc=smartbox_techweb_session_16.500267"],"publishDate":["Aug 11, 2022"],"publishedSite":[""],"publishedSiteURL":[""]},{"title":["Black Hat Spring Trainings - June 13-16 - Learn More"],"link":["https://www.blackhat.com/tr-22/?cid=smartbox_techweb_session_16.500262\u0026_mc=smartbox_techweb_session_16.500262"],"publishDate":["Dec 23, 2021"],"publishedSite":[""],"publishedSiteURL":[""],"description":["Black Hat Trainings will be held virtually and at Renaissance Arlington Capital View Hotel in Virginia, in the Eastern Time Zone, June 13-16. Develop in-demand cybersecurity skills in hands-on, technical Trainings taught by expert instructors from around the world. From infrastructure hacking to incident response, there's a course for individuals of all experience levels. Expand your security talent in just 4 days."]}]},{"title":"White Papers","ordinal":3,"type":"Whitepapers","hidden":false,"feed":{"title":"White Papers","href":"http://smartbox.techweb.com/smartbox/externalsmartbox?site_id=162801002\u0026taxonomy_ids=\u0026num_display=\u0026article_type=whitepaper\u0026output_type=xml","__typename":"Link"},"read_more_link":{"title":"More White Papers","href":"https://www.informationweek.com/whitepaper/Security","__typename":"Link"},"system":{"uid":"blt1192837947494c5f","__typename":"EntrySystemField"},"__typename":"DrSmartbox","articles":[{"title":["Sumo Logic for Continuous Intelligence"],"link":["https://www.informationweek.com/whitepaper/cybersecurity/software-as-a-service/sumo-logic-for-continuous-intelligence/436973?cid=smartbox_techweb_whitepaper_14.500005115\u0026_mc=smartbox_techweb_whitepaper_14.500005115"],"publishedSite":[""],"publishedSiteURL":[""]},{"title":["Protecting Endpoint to Work from Anywhere"],"link":["https://www.informationweek.com/whitepaper/cybersecurity/security/protecting-the-endpoint-to-work-from-anywhere/437563?cid=smartbox_techweb_whitepaper_14.500005105\u0026_mc=smartbox_techweb_whitepaper_14.500005105"],"publishedSite":[""],"publishedSiteURL":[""]},{"title":["The Top 10 API Vulnerabilities"],"link":["https://www.informationweek.com/whitepaper/cybersecurity/cloud-security/the-top-10-api-vulnerabilities/437313?cid=smartbox_techweb_whitepaper_14.500005096\u0026_mc=smartbox_techweb_whitepaper_14.500005096"],"publishedSite":[""],"publishedSiteURL":[""]},{"title":["BotGuard for Denial of Inventory \u0026 Stockouts"],"link":["https://www.informationweek.com/whitepaper/cybersecurity/security-monitoring/botguard-for-inventory-scalping/437293?cid=smartbox_techweb_whitepaper_14.500005094\u0026_mc=smartbox_techweb_whitepaper_14.500005094"],"publishedSite":[""],"publishedSiteURL":[""]},{"title":["Optimizing Endpoint Protection"],"link":["https://www.informationweek.com/whitepaper/cybersecurity/endpoint-security/optimizing-endpoint-protection-/435693?cid=smartbox_techweb_whitepaper_14.500005082\u0026_mc=smartbox_techweb_whitepaper_14.500005082"],"publishedSite":[""],"publishedSiteURL":[""]}]}],"editorsChoice":{"_version":56,"locale":"en-us","uid":"blt9262b8fd3485b1dc","ACL":{},"_in_progress":false,"created_at":"2021-05-29T07:25:35.582Z","created_by":"blt9a0fc67c46c47dd7","selected_articles":[{"_version":9,"locale":"en-us","uid":"blt48aa54be6812ebbc","_in_progress":false,"article_label":[{"uid":"bltb75c0271fde42422","_content_type_uid":"dr_article_label"}],"author_page":[{"_version":3,"locale":"en-us","uid":"blt20588c687cab91b6","ACL":{},"_in_progress":false,"author_description":"\u003cp style=\"text-align: justify;\"\u003eVeteran technology journalist of more than 20 years. Former research engineer. Written for more than two dozen publications, including CNET \u003ca href=\"http://news.com/\" title=\"Follow link\"\u003eNews.com\u003c/a\u003e, Dark Reading, MIT's Technology Review, Popular Science, and Wired News. Five awards for journalism, including Best Deadline Journalism (Online) in 2003 for coverage of the Blaster worm. Crunches numbers on various trends using Python and R. Recent reports include analyses of the shortage in cybersecurity workers and annual vulnerability trends.\u003c/p\u003e","author_email":"mail@robertlemos.com","author_label":{"author_label_background_color":"","author_label_text":"","author_label_text_color":"","display_author_label":false},"author_name":"Robert Lemos","author_page_tagline":"","author_role":"Contributing Writer, Dark Reading","created_at":"2021-05-29T07:26:17.988Z","created_by":"blt9a0fc67c46c47dd7","hidden_email":false,"image_alt_text":"Robert Lemos Headshot","member_since":null,"portrait":{"_version":1,"is_dir":false,"uid":"blt58481326324d6911","ACL":{},"content_type":"image/png","created_at":"2021-05-29T07:13:41.432Z","created_by":"blt9a0fc67c46c47dd7","file_size":"40970","filename":"Robert-Lemos.png","tags":[],"title":"Robert-Lemos.png","updated_at":"2021-05-29T07:13:41.432Z","updated_by":"blt9a0fc67c46c47dd7","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-05-29T07:13:42.612Z","user":"blt9a0fc67c46c47dd7"},"url":"https://eu-images.contentstack.com/v3/assets/blt66983808af36a8ef/blt58481326324d6911/60b1e9a55d34de550780a990/Robert-Lemos.png"},"seo":{"canonical_url":"","meta_description":"","meta_keywords":"","meta_title":""},"social_links":{"twitter_link":{"title":"","href":""},"linkedin_link":{"title":"","href":""}},"specialisms":[],"tags":["freelancer"],"title":"Robert Lemos","updated_at":"2022-05-17T19:07:37.328Z","updated_by":"blt36bec842c46f38f6","url":"/author/robert-lemos","_content_type_uid":"dr_author","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2022-05-17T19:07:41.149Z","user":"blt36bec842c46f38f6"}}],"body":"\u003cp\u003eBLACK HAT ASIA —\u003cstrong\u003e\u0026nbsp;\u003c/strong\u003eA soda can, a smartphone stand, or any shiny, lightweight desk decoration could pose a threat of eavesdropping, even in a soundproof room, if an attacker can see the object, according to a team of researchers from Ben-Gurion University of the Negev.\u003c/p\u003e\n\u003cp\u003eAt the Black Hat Asia security conference on Thursday, and aiming to expand on previous research into optical speech eavesdropping, the research team showed that audio conversations at the volume of a typical meeting or conference call could be captured from up to 35 meters, or about 114 feet, away. The researchers used a telescope to collect the light reflected from an object near the speaker and a light sensor — a photodiode — to sample the changes in the light as the object vibrated. \u003c/p\u003e\n\n\u003cp\u003eA lightweight object with a shiny surface reflects the signal with enough fidelity to recover the audio, said Ben Nassi, an information security researcher at the university.\u003c/p\u003e\n\u003cp\u003e\"Many shiny, lightweight objects can serve as optical implants that can be exploited to recover speech,\" he said. \"In some cases, they are completely innocent objects, such as a smartphone stand or an empty beverage can, but all of these devices — because they share the same two characteristics, they are lightweight and shiny — can be used to eavesdrop when there is enough light.\"\u003c/p\u003e\n\u003cp\u003eThe \u003ca href=\"https://www.blackhat.com/asia-22/briefings/schedule/index.html#the-little-seal-bug-optical-sound-recovery-from-lightweight-reflective-objects-25643\" target=\"_blank\"\u003eeavesdropping experiment\u003c/a\u003e is not the first time that researchers have attempted side-channel attacks that pick up audio from surrounding objects. \u003c/p\u003e\n\u003cp\u003e\u003cstrong\u003eImproving on Past Optical Eavesdropping\u003cbr\u003e\u003c/strong\u003eIn 2016, for example, researchers demonstrated ways to \u003ca href=\"https://www.darkreading.com/attacks-breaches/researchers-demo-method-for-turning-a-pc-into-an-eavesdropping-device\" target=\"_blank\"\u003ereconfigure the audio-out jack on a computer to an audio-in jack\u003c/a\u003e\u0026nbsp;and thereby use speakers as microphones. In 2014, a group of MIT researchers found \u003ca href=\"https://gizmodo.com/mit-scientists-figure-out-how-to-eavesdrop-using-a-pota-1615792341%5C\" target=\"_blank\"\u003ea way to use a potato chip bag to capture sound waves\u003c/a\u003e. And in 2008, a group of researchers created a process to \u003ca href=\"https://www.darkreading.com/vulnerabilities-threats/computer-keyboards-betray-users-keystrokes-to-radio-eavesdroppers\" target=\"_blank\"\u003ecapture the keys typed on a keyboard by their sounds and the time between keystrokes\u003c/a\u003e. \u003c/p\u003e\n\n\u003cp\u003eThe MIT research is similar to the technique pursued by the Ben-Gurion University researchers, except that exploitation\u0026nbsp;required more restrictive placement of the reflective object and required substantial processing power to recover the audio, said Raz Swissa, a researcher with Ben-Gurion University of the Negev.\u003c/p\u003e\n\u003cp\u003e\"This [older] method cannot be applied in real time because it requires a lot of computational resources to recover just a few seconds of sound,\" he said. And other well-known techniques, such as a laser microphone, require a detectable light signal to work. \u003c/p\u003e\n\u003cp\u003eThe researchers thus\u0026nbsp;focused on creating a process that could be accomplished with everyday objects already in the targeted area and using instruments that are readily available. Using objects 25 centimeters — about 10 inches — away\u0026nbsp;from the speaker, the researchers could capture fluctuations in the light reflected off of them\u0026nbsp;up to 35 meters away. The recovered speech was quite clear at 15 meters and somewhat understandable at 35 meters. \u003c/p\u003e\n\u003cp\u003eOverall, the experimental setup, which the researchers call the Little Seal Bug, could be used to capture audio with everyday objects The attacker can be external to the target, thus less detectable, while the low computational requirements make capture available in real time.\u003c/p\u003e\n\u003cp\u003e\u003cstrong\u003eGreat Seal, Little Seal and Beyond\u003cbr\u003e\u003c/strong\u003eThe Little Seal Bug is a nod to a well-known early espionage incident, known as the Great Seal Bug. In 1945, the Soviet Union gifted the US ambassador a crimson, embossed eagle seemingly celebrating the US-Soviet collaboration to defeat Nazi Germany. Yet the Great Seal also had a hidden audio recorder that allowed Soviet spies to eavesdrop on high-level conversations in the embassy. \u003c/p\u003e\n\n\u003cp\u003eSimilarly, the Little Seal Bug could use common items around an office to capture audio via reflected light. In addition, most mobile devices come with a photosensor that does not require special permission to access. While the researchers have not come up with an attack chain using the sensor, such a resource could very well be used by future attackers.\u003c/p\u003e\n\u003cp\u003eHowever, there are many more likely threats for espionage attacks, Nassi said. From compromising systems with malware and capturing the audio that way, to using microphones already embedded in Internet of Things devices, such as \u003ca href=\"https://www.darkreading.com/cloud/researchers-turn-alexa-and-google-home-into-credential-thieves\" target=\"_blank\"\u003eAI assistants\u003c/a\u003e and \u003ca href=\"https://www.darkreading.com/vulnerabilities-threats/webcam-bug-enables-virtual-home-invasions\" target=\"_blank\"\u003evideo cameras\u003c/a\u003e, our world is quickly becoming filled with potential eavesdropping devices.\u003c/p\u003e\n\u003cp\u003e\"A smartphone, a laptop, an IP camera, and a smart watch are probably more risky in terms of privacy than these devices or objects,\" he said.\u003c/p\u003e","byline":"","created_at":"2022-05-13T20:48:35.326Z","created_by":"bltd30ec9c1d5903aaa","featured_image":{"_version":1,"is_dir":false,"uid":"blt427129eb947e0c4f","ACL":{},"content_type":"image/jpeg","created_at":"2022-05-14T14:37:23.977Z","created_by":"blt7639e1b0bae9533a","file_size":"98893","filename":"cocacola-MedicimageEducation-alamy.jpg","parent_uid":null,"tags":[],"title":"cocacola-MedicimageEducation-alamy.jpg","updated_at":"2022-05-14T14:37:23.977Z","updated_by":"blt7639e1b0bae9533a","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2022-05-14T14:37:58.651Z","user":"blt7639e1b0bae9533a"},"url":"https://eu-images.contentstack.com/v3/assets/blt66983808af36a8ef/blt427129eb947e0c4f/627fbea3310f0577232425fc/cocacola-MedicimageEducation-alamy.jpg"},"featured_image_caption":"","featured_image_credit":"","image_alt_text":"","keywords":[],"old_url":"","published_date":"2022-05-14T14:37:44.000Z","seo":{"meta_title":"","meta_description":"","meta_keywords":"","canonical_url":""},"sponsored_content_settings":{"is_sponsor_article":false,"sponsor_name":""},"summary":"Cyber-researchers are testing the bounds of optical attacks with a technique that allows attackers to recover voice audio from meetings if there are shiny, lightweight objects nearby.","tags":[],"term_selector":{"historyOfPrimaryTerm":["iot"],"primaryTerm":"iot","primaryTermInRealText":"IoT","primaryCategoryBelonged":"iot","actualUrl":"/iot/coke-can-eavesdropping-device","secondaryTerm":["attacks-breaches","threat-intelligence","insider-threats"]},"title":"How to Turn a Coke Can Into an Eavesdropping Device","updated_at":"2022-05-14T14:37:48.607Z","updated_by":"blt7639e1b0bae9533a","url":"/coke-can-eavesdropping-device","_content_type_uid":"dr_article","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2022-05-14T14:37:58.690Z","user":"blt7639e1b0bae9533a"}},{"_version":11,"locale":"en-us","uid":"bltca5a3e58ad43aabc","_in_progress":false,"article_label":[{"uid":"bltf160abb39bf33081","_content_type_uid":"dr_article_label"}],"author_page":[{"_version":1,"locale":"en-us","uid":"blt47c7348446f83b61","ACL":{},"_in_progress":false,"author_description":"\u003cp\u003eDark Reading's Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article.\u003c/p\u003e","author_email":"editors@darkreading.com","author_name":"Dark Reading Staff","author_role":"Dark Reading","created_at":"2021-05-29T07:26:13.181Z","created_by":"blt9a0fc67c46c47dd7","portrait":{"_version":1,"is_dir":false,"uid":"blte161b23f0fd3a84b","ACL":{},"content_type":"image/jpeg","created_at":"2021-05-29T07:16:07.204Z","created_by":"blt9a0fc67c46c47dd7","file_size":"2939","filename":"dr_staff_125x125.jpg","parent_uid":"blt6faacc35402eac62","tags":[],"title":"dr_staff_125x125.jpg","updated_at":"2021-05-29T07:16:07.204Z","updated_by":"blt9a0fc67c46c47dd7","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-05-29T07:16:08.282Z","user":"blt9a0fc67c46c47dd7"},"url":"https://eu-images.contentstack.com/v3/assets/blt66983808af36a8ef/blte161b23f0fd3a84b/60b1ea374e7eb868c4c6a293/dr_staff_125x125.jpg"},"social_links":{"linkedin_link":{"title":"Dark Reading","href":"https://www.linkedin.com/company/dark-reading"},"twitter_link":{"title":"@DarkReading","href":"https://twitter.com/DarkReading"}},"tags":["staff"],"title":"Dark Reading Staff","updated_at":"2021-05-29T07:26:13.181Z","updated_by":"blt9a0fc67c46c47dd7","url":"/author/dark-reading-staff","_content_type_uid":"dr_author","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-05-29T07:54:05.026Z","user":"blt9a0fc67c46c47dd7"}}],"body":"\u003cp\u003eBluetooth, near-field communication (NFC) and ultra-wideband (UWB) operate when iPhone's iOS system is shut off, meaning even powered-down devices are vulnerable to attack.\u003c/p\u003e\n\u003cp\u003eNew research from the Technical University of Darmstadt in Germany examined the\u0026nbsp;chips that enable the \"Find My\" functions and allow users to access banking and identification information even when the device is in low-power mode. This access also has the unintended consequence of leaving\u0026nbsp;the device open to attack, even though the user might think the \u003ca href=\"https://www.darkreading.com/vulnerabilities-threats/apple-patches-zero-days-in-ios-14-8-update\" target=\"_blank\"\u003eiPhone\u003c/a\u003e is offline and secure. according to\u0026nbsp;the team's paper, entitled \"\u003ca href=\"https://arxiv.org/pdf/2205.06114.pdf\" target=\"_blank\"\u003eEvil Never Sleeps\u003c/a\u003e.\"\u003c/p\u003e\n\n\u003cp\u003e\"On recent iPhones, Bluetooth, near field communication (NFC), and U=ultra-wideband (UWB) keep running\nafter power off, and all three wireless chips have direct access to the\nsecure element,\" the paper states. \"As a practical example what this means to security,\nwe demonstrate the possibility to load malware onto a Bluetooth\nchip that is executed while the iPhone is off.\"\u0026nbsp;\u003c/p\u003e\n\u003cp\u003eThat said, exploitation is far from simple, requiring several steps and the use of known bugs like \u003ca href=\"https://asset-group.github.io/disclosures/braktooth/\" target=\"_blank\"\u003eBrakTooth\u003c/a\u003e, the researchers explain.\u003c/p\u003e\n","byline":"","created_at":"2022-05-16T19:42:37.917Z","created_by":"blt83ecefcf0687561a","featured_image":{"_version":1,"is_dir":false,"uid":"blt2f691bdbb4fff56e","ACL":{},"content_type":"image/jpeg","created_at":"2022-05-16T19:55:53.690Z","created_by":"blt83ecefcf0687561a","file_size":"2339929","filename":"iPhone_Yalcin_Sonat_Alamy.jpg","parent_uid":null,"tags":[],"title":"iPhone_Yalcin_Sonat_Alamy.jpg","updated_at":"2022-05-16T19:55:53.690Z","updated_by":"blt83ecefcf0687561a","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2022-05-16T20:44:45.613Z","user":"blt36bec842c46f38f6"},"url":"https://eu-images.contentstack.com/v3/assets/blt66983808af36a8ef/blt2f691bdbb4fff56e/6282ac49daa31875dc0c9683/iPhone_Yalcin_Sonat_Alamy.jpg"},"featured_image_caption":"","featured_image_credit":"Source: Yalcin Sonat via Alamy","image_alt_text":"iPhone and AirPods on a desk","keywords":[],"old_url":"","published_date":"2022-05-16T20:37:27.000Z","seo":{"meta_title":"","meta_description":"","meta_keywords":"","canonical_url":""},"sponsored_content_settings":{"is_sponsor_article":false,"sponsor_name":""},"summary":"Wireless chips that run when the iPhone iOS is shut down can be exploited.","tags":[],"term_selector":{"historyOfPrimaryTerm":["mobile","endpoint"],"primaryTerm":"endpoint","primaryTermInRealText":"Endpoint","primaryCategoryBelonged":"endpoint","actualUrl":"/mobile/iphones-open-to-attack-even-when-off-researchers-say","secondaryTerm":["remote-workforce","vulnerabilities-threats","advanced-threats"]},"title":"iPhones Open to Attack Even When Off, Researchers Say","updated_at":"2022-05-18T17:24:12.239Z","updated_by":"blt31bd4bcd14669cc0","url":"/iphones-open-to-attack-even-when-off-researchers-say","_content_type_uid":"dr_article","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2022-05-18T17:24:18.441Z","user":"blt31bd4bcd14669cc0"}},{"_version":2,"locale":"en-us","uid":"bltbb4ba3d7040e9e2e","ACL":{},"_in_progress":false,"article_label":[{"uid":"blt610cb37ce61b4a29","_content_type_uid":"dr_article_label"}],"author_page":[{"_content_type_uid":"dr_author","_version":1,"locale":"en-us","uid":"blt44704409b533207f","ACL":{},"_in_progress":false,"author_description":"\u003cp\u003eChaim Mazal is the SVP of Technology and CISO at \u003ca href=\"Chaim Mazal is the SVP of Technology and CISO at Kandji, an Apple device management (MDM) solution built exclusively for IT teams, where he oversees the product engineering, infrastructure, data, and information security organizations. Before joining the Kandji team, Chaim built engineering first security programs at three of the highest valued multi billion dollar SaaS startups in Mid-West: ActiveCampaign, Uptake, and Avant. Chaim has created several SaaS-specific engineering focused programs using his expertise in product lead hyper-growth and offensive security to secure fast-paced modern environments.\"\" target=\"_blank\"\u003eKandji\u003c/a\u003e, an Apple device management (MDM) solution built exclusively for IT teams, where he oversees the product engineering, infrastructure, data, and information security organizations. Before joining the Kandji team, Chaim built engineering first security programs at three of the highest valued multi billion dollar SaaS startups in Mid-West: ActiveCampaign, Uptake, and Avant. Chaim has created several SaaS-specific engineering focused programs using his expertise in product lead hyper-growth and offensive security to secure fast-paced modern environments.\u003c/p\u003e","author_email":"chaim@kandji.io","author_label":{"display_author_label":false,"author_label_text":"","author_label_background_color":"ffffff","author_label_text_color":"000000"},"author_name":"Chaim Mazal","author_page_tagline":"","author_role":"Senior VP of Technology and CISO, Kandji","created_at":"2022-02-11T18:47:57.061Z","created_by":"blt603b94c5f23c042e","hidden_email":false,"image_alt_text":"Photo of Chaim Mazal","member_since":null,"portrait":{"uid":"bltd3209a385d0fd6cf","created_by":"blt603b94c5f23c042e","updated_by":"blt603b94c5f23c042e","created_at":"2022-02-11T18:46:08.974Z","updated_at":"2022-02-11T18:46:08.974Z","content_type":"image/jpeg","file_size":"5581","filename":"Chaim_Mazal.jpeg","title":"Chaim_Mazal.jpeg","ACL":[],"_version":1,"parent_uid":null,"is_dir":false,"tags":[],"publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2022-02-11T18:48:06.867Z","user":"blt603b94c5f23c042e"},"url":"https://eu-images.contentstack.com/v3/assets/blt66983808af36a8ef/bltd3209a385d0fd6cf/6206aef08cccbd493a5c66d5/Chaim_Mazal.jpeg"},"seo":{"meta_title":"","meta_description":"","meta_keywords":"","canonical_url":""},"social_links":{"twitter_link":{"title":"","href":""},"linkedin_link":{"title":"Chaim Mazal","href":"https://www.linkedin.com/in/cmazal/"}},"specialisms":[],"tags":[],"title":"Chaim Mazal","updated_at":"2022-02-11T18:47:57.061Z","updated_by":"blt603b94c5f23c042e","url":"/author/chaim-mazal","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2022-02-11T18:48:06.884Z","user":"blt603b94c5f23c042e"}}],"body":"\u003cp\u003eCybersecurity has always been a moving target. Most recently, a two-year global pandemic and the war in Eastern Europe have heightened the risk of cyberattacks, prompting President Joe Biden to urge US companies to \"\u003ca href=\"https://www.whitehouse.gov/briefing-room/statements-releases/2022/03/21/statement-by-president-biden-on-our-nations-cybersecurity/\" target=\"_blank\"\u003eharden [their] cyber defenses immediately\u003c/a\u003e.\"\u003c/p\u003e\n\u003cp\u003eConsider the current cybersecurity landscape. In 2021, US businesses weathered a \u003ca href=\"https://www.nasdaq.com/articles/data-breaches-in-2021-already-top-all-of-last-year-2021-10-21\" target=\"_blank\"\u003e17% increase in data breaches from 2020\u003c/a\u003e. Also in 2021, organizations experienced the \u003ca href=\"https://www.ibm.com/security/data-breach\" target=\"_blank\"\u003ehighest average cost of a data breach\u003c/a\u003e in 17 years at $4.24 million, up almost 10% from the previous year. Common attack vectors include compromised credentials, phishing, and cloud misconfiguration. Now, modern warfare has been redefined to include cyber warfare.\u003c/p\u003e\n\u003cp\u003eAs CISO, your job is to ensure there are controls and processes in place to help mitigate risk to the organization, and the current global instability has upped the risk ante for all organizations. You have already been working to identify and prioritize risks from fraudulent SMS, phishing emails, ransomware attempts, breaches, distributed denial-of-service (DDoS)\u0026nbsp;attacks, fake landing pages, and more. But how can your organization double down on cybersecurity to stay one step ahead of the curve? \u003c/p\u003e\n\u003cp\u003eBased on this current global landscape, it is time for CISOs to rethink their strategies.\u003c/p\u003e\n\u003cp\u003e\u003cstrong\u003e1. \u003c/strong\u003e\u003cstrong\u003eRealize that the security playbook has changed — at least for now.\u003cbr\u003e\u003c/strong\u003eThe landscape has changed, and the playbook must change, as well. Previously, we've seen cybercriminals focus on ransomware or phishing attempts — attacks focused on monetary incentives. If we think about potential nation-state activity, we will see fewer financially motivated attacks and more attempts to disrupt or shut down specific services or networks, including DDoS attacks. \u003c/p\u003e\n\n\u003cp\u003eRather than infiltration and breaches, we will see more backbone-level attack attempts (think ISP and uptime) that affect availability and continuity. This could also extend to major cloud providers and Internet resources. Bad actors may focus on resources that allow people to continuously share and exchange free-flowing information — including services tied to the economy. Their aim is to affect, disrupt, and destabilize continuity, preventing major organizations from delivering value. There is also the potential for more \"strategic viability\" cyberattacks against critical infrastructure systems, such as those driving power generation or electricity production.\u003c/p\u003e\n\u003cp\u003eIn the past, we saw more concealed interaction. In other words, prior attempts were cloaked; one host country could launch an attack from another unwitting host. Now, the cloak is gone, and there is less effort to conceal attacks. \u003c/p\u003e\n\u003cp\u003e\u003cstrong\u003e2\u003c/strong\u003e. \u003cstrong\u003eMake visibility a priority.\u003cbr\u003e\u003c/strong\u003eOrganizations need the appropriate controls and mechanisms in place to \"see\" where specific traffic and requests come from so they can start making the difficult decisions about where they will allow traffic to come from.\u003c/p\u003e\n\n\u003cp\u003eThis is not just about enabling safe access, but also creating the ability to control the flow of traffic and requests to your company and assets. You need to drill down into activity across your platforms and assess everything from a geolocation perspective. Have you deployed technology that allows you to actively contextualize traffic patterns based on what's happening globally? If several major service providers experience an outage, can this be attributed to global interference at a nation-state level? If, when, and how will this affect your organization? Can you detect if a nation-state threat actor targets your organization, and, if so, can you trace the exact location and source? Also, keep in mind that criminal hacking groups can work closely with nation-states, which makes a proxy attack possible.\u003c/p\u003e\n\u003cp\u003e\u003cstrong\u003e3\u003c/strong\u003e. \u003cstrong\u003eKeep your security controls under control.\u003cbr\u003e\u003c/strong\u003eAs CISO, you should maintain an updated \u003ca href=\"https://csrc.nist.gov/glossary/term/risk_register\" target=\"_blank\"\u003erisk register\u003c/a\u003e. This risk register should identify threats, outline the probability they will affect your organization, and present the overall potential impact. This framework, which should be broken down into sections that align with various business units and stakeholders (such as infrastructure, internal systems, and Web applications) should help you prioritize identified risks.\u003c/p\u003e\n\n\u003cp\u003eYou should also be up to date on cybersecurity compliance regulations, standards, frameworks, and certifications (such as GDPR, ISO 27001, PCI-DSS, and FIPS, SOC) that ensure the security, processing integrity, and privacy of sensitive data. Security controls, specifically, encompass data encryption, network firewalls, password policies, network access control, and more.\u003c/p\u003e\n\u003cp\u003eKeep in mind that new standards may be imposed by your host/home government amid ongoing conflict. This could affect, for example, who you allow to access your platforms. The security and IT teams will be tasked with using existing controls or leveraging them in an alternative capacity to meet new government mandates — mandates that may apply internally to a company or companies that operate with them. You may be called upon to prevent traffic from geo-specific locations to better safeguard customer data or to fulfill an applicable restriction from a governing body. Also, your organization's customers may ask if you have can block or deny access to your platform based on a certain region.\u003c/p\u003e\n\u003cp\u003e\u003cstrong\u003eConclusion\u003cbr\u003e\u003c/strong\u003eWhen it comes to cybersecurity, no one person can control all the variables — especially variables at a global level. In addition to your usual risk mitigation efforts, you should be prepared to adopt new policies and processes — depending on the \"temperature\" of global events. If cybersecurity is a moving target, it's moving even faster now. Organizations that reinforce their defenses (and prepare for additional safeguards) will have the best playbook for pre-empting and preventing new types of fraud, breaches, and hacks.\u003c/p\u003e\n","byline":"","created_at":"2022-05-06T20:48:24.871Z","created_by":"blt603b94c5f23c042e","featured_image":{"_version":1,"is_dir":false,"uid":"blt77e01562336788fa","ACL":{},"content_type":"image/jpeg","created_at":"2022-05-06T20:47:29.209Z","created_by":"blt603b94c5f23c042e","file_size":"185854","filename":"Playbook_Ivelin_Radkov_Alamy.jpg","parent_uid":null,"tags":[],"title":"Playbook_Ivelin_Radkov_Alamy.jpg","updated_at":"2022-05-06T20:47:29.209Z","updated_by":"blt603b94c5f23c042e","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2022-05-10T14:00:00.272Z","user":"blt603b94c5f23c042e"},"url":"https://eu-images.contentstack.com/v3/assets/blt66983808af36a8ef/blt77e01562336788fa/6275896111a67766f42c0c45/Playbook_Ivelin_Radkov_Alamy.jpg"},"featured_image_caption":"","featured_image_credit":"Source: Ivelin Radkov via Alamy Stock Photo","image_alt_text":"Playbook","keywords":[],"old_url":"","published_date":"2022-05-10T14:00:00.000Z","seo":{"meta_title":"","meta_description":"","meta_keywords":"","canonical_url":""},"sponsored_content_settings":{"is_sponsor_article":false,"sponsor_name":""},"summary":"How can you safeguard your organization amid global conflict and uncertainty?","tags":[],"term_selector":{"historyOfPrimaryTerm":["vulnerabilities-threats"],"primaryTerm":"vulnerabilities-threats","primaryTermInRealText":"Vulnerabilities/Threats","primaryCategoryBelonged":"vulnerabilities-threats","actualUrl":"/vulnerabilities-threats/mastering-the-new-ciso-playbook","secondaryTerm":["attacks-breaches","risk"]},"title":"Mastering the New CISO Playbook","updated_at":"2022-05-10T13:22:56.802Z","updated_by":"blt603b94c5f23c042e","url":"/mastering-the-new-ciso-playbook","_content_type_uid":"dr_article","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2022-05-10T14:00:00.359Z","user":"blt603b94c5f23c042e"}},{"_version":15,"locale":"en-us","uid":"blt883a51ee6f377960","_in_progress":false,"article_label":[{"uid":"bltb75c0271fde42422","_content_type_uid":"dr_article_label"}],"author_page":[{"_version":3,"locale":"en-us","uid":"blt94423ceefefe3e31","ACL":{},"_in_progress":false,"author_description":"Tara Seals has 20+ years of experience as a journalist, analyst and editor in the cybersecurity, communications and technology space. Prior to Dark Reading, Tara was Editor in Chief at Threatpost, and prior to that,\u0026nbsp;the North American news lead for Infosecurity Magazine. She also\u0026nbsp;spent 13 years working for Informa (formerly Virgo Publishing), as executive editor and editor-in-chief at publications focused on both the service provider and the enterprise arenas. A Texas native, she holds a B.A. from Columbia University, lives in Western Massachusetts with her family and is on a never-ending quest for good Mexican food in the Northeast.\u003cbr\u003e","author_email":"tara.seals@informa.com","author_label":{"display_author_label":false,"author_label_text":"","author_label_background_color":"ffffff","author_label_text_color":"000000"},"author_name":"Tara Seals","author_page_tagline":"News and Analysis","author_role":"Managing Editor, News, Dark Reading","created_at":"2022-04-28T14:10:53.091Z","created_by":"blt13546d7f135b3d6e","hidden_email":false,"image_alt_text":"Tara Seals Headshot 2022","member_since":null,"portrait":{"_version":1,"is_dir":false,"uid":"bltea67136f81f32eca","ACL":{},"content_type":"image/jpeg","created_at":"2022-04-28T14:03:32.184Z","created_by":"blt13546d7f135b3d6e","file_size":"12544","filename":"Tara-Seals-Headshot2.jpg","parent_uid":null,"tags":[],"title":"Tara-Seals-Headshot2.jpg","updated_at":"2022-04-28T14:03:32.184Z","updated_by":"blt13546d7f135b3d6e","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2022-04-28T14:20:04.633Z","user":"blt13546d7f135b3d6e"},"url":"https://eu-images.contentstack.com/v3/assets/blt66983808af36a8ef/bltea67136f81f32eca/626a9eb4726e3315b16b3c64/Tara-Seals-Headshot2.jpg"},"seo":{"meta_title":"Tara Seals Dark Reading News","meta_description":"Cybersecurity news articles from Tara Seals at Dark Reading.","meta_keywords":"","canonical_url":""},"social_links":{"twitter_link":{"title":"","href":"https://twitter.com/wirelesswench"},"linkedin_link":{"title":"","href":""}},"specialisms":[],"tags":[],"title":"Tara Seals","updated_at":"2022-05-17T19:08:20.876Z","updated_by":"blt36bec842c46f38f6","url":"/author/tara-seals","_content_type_uid":"dr_author","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2022-05-17T19:08:24.663Z","user":"blt36bec842c46f38f6"}}],"body":"\u003cp\u003eMicrosoft squashed 74 security vulnerabilities with its May 2022 Patch Tuesday update, including an important-rated zero-day bug that's being actively exploited in the wild and several that are likely widely present across enterprises.\u003c/p\u003e\n\n\u003cp\u003eIt also patched seven critical flaws, 65 other important-rated bugs, and one low-severity issue. The fixes run the gamut of the computing giant's portfolio, including: Windows and Windows Components, .NET and Visual Studio, Microsoft Edge (Chromium-based), Microsoft Exchange Server, Office and Office Components, Windows Hyper-V, Windows Authentication Methods, BitLocker, Windows Cluster Shared Volume (CSV), Remote Desktop Client, Windows Network File System, NTFS, and Windows Point-to-Point Tunneling Protocol. \u003c/p\u003e\n\n\u003cp\u003e\u003cstrong\u003e3 Zero-Days, 1 Actively Exploited\u003c/strong\u003e\u003cbr\u003e\nThe actively exploited bug (\u003ca href=\"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26925\" target=\"_blank\"\u003eCVE-2022-26925\u003c/a\u003e) is a Windows LSA-spoofing vulnerability that rates 8.1 out of 10 on the CVSS vulnerability-severity scale – however, Microsoft notes in its advisory that it should be bumped up to critical (CVSS 9.8) if used in Windows NT LAN Manager (NTLM) relay attacks.\u003c/p\u003e\n\n\u003cp\u003e\"[A]n unauthenticated attacker could call a method on the LSARPC interface and coerce the domain controller to authenticate to the attacker using NTLM,\" Microsoft warns in its advisory – a concerning situation considering that domain controllers provide high-level access to privileges.\u003c/p\u003e\n\n\u003cp\u003eNow deprecated, NTLM uses a weak authentication protocol that can easily reveal credentials and session keys. In a relay attack, bad actors can capture an authentication and relay it to another server – which they can then use to authenticate to the remote server with the compromised user's privileges.\u003c/p\u003e\n\n\u003cp\u003eThat said, the bug is tougher to exploit than most, explains Trend Micro Zero Day Initiative (ZDI) researcher Dustin Childs in a \u003ca href=\"https://www.zerodayinitiative.com/blog/2022/5/10/the-may-2022-security-update-review\" target=\"_blank\"\u003eTuesday blog\u003c/a\u003e. \"The threat actor would need to be in the logical network path between the target and the resource requested (e.g., man-in-the-middle), but since this is listed as under active attack, someone must have figured out how to make that happen.\"\u003c/p\u003e\n\n\u003cp\u003eTyler Reguly, manager of security R\u0026D at Tripwire, tells Dark Reading that the bug could be related to a previously seen threat known as PetitPotam, which emerged in July to allow attackers to force remote Windows systems to reveal easily crackable password hashes.\u003c/p\u003e\n\n\u003cp\u003e\"Based on Microsoft’s provided links, this looks to be related to the previous \u003ca href=\"https://www.sprocketsecurity.com/blog/the-ultimate-tag-team-petitpotam-and-adcs-pwnage-from-linux\" target=\"_blank\"\u003ePetitPotam patch\u003c/a\u003e,\" he notes, adding that researchers will be guessing about that. \"This is a prime example of where detailed executive summaries that explain what is happening were useful in the past. It would be great if Microsoft could return to providing those on a regular basis,\" he says.\u003c/p\u003e\n\n\u003cp\u003eMicrosoft also patched two other zero-days, including a critical bug (\u003ca href=\"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-29972\" target=\"_blank\"\u003eCVE-2022-29972\u003c/a\u003e, CVSS not available) in Insight Software's Magnitude Simba Amazon Redshift ODBC Driver – \"a third-party ODBC data connector used to connect to Amazon Redshift, in Integration Runtime (IR) in Azure Synapse Pipelines, and Azure Data Factory,\" as ZDI's Childs explains.\u003c/p\u003e\n\n\u003cp\u003eHe adds, \"This update is complicated enough for Microsoft \u003ca href=\"https://msrc-blog.microsoft.com/2022/05/09/vulnerability-mitigated-in-the-third-party-data-connector-used-in-azure-synapse-pipelines-and-azure-data-factory-cve-2022-29972\" target=\"_blank\"\u003eto blog about the bug\u003c/a\u003e and how it affects multiple Microsoft services.\"\u003c/p\u003e\n\n\u003cp\u003eThe final zero-day (\u003ca href=\"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-22713\" target=\"_blank\"\u003eCVE-2022-22713\u003c/a\u003e, CVSS 5.6) is an important-rated bug in Windows Hyper-V that could allow denial-of-service (DoS).\u003c/p\u003e\n\n\u003cp\u003e\u003cstrong\u003eLeading Lights: Critical Microsoft Security Bugs to Patch Now\u003c/strong\u003e\u003cbr\u003e\nAs far as other patches for admins to prioritize this month, some of the critical-rated issues are far-reaching across organizational infrastructure and could affect millions of companies, researchers warn.\u003c/p\u003e\n\n\u003cp\u003e\"The big news is the critical vulnerabilities that need to be highlighted for immediate action,\" Chris Hass, director of security at Automox, tells Dark Reading. \"This month features vulnerabilities in a number of applications that are prevalent in most enterprise organizations, including NSF, Remote Desktop Client, and Active Directory.\"\u003c/p\u003e\n\n\u003cp\u003eFor instance, the critical bug affecting Windows Network File System, or NFS (\u003ca href=\"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26937\" target=\"_blank\"\u003eCVE-2022-26937\u003c/a\u003e, CVSS 9.8) could allow unauthenticated remote code-execution (RCE) in the context of the highly privileged NFS service, according to Microsoft's advisory. To boot, its ubiquity is Log4j-like: It \"is present in every Windows Server version from 2008 forward,\" Hass says, \"which puts most organizations at risk if action isn't taken quickly.\"\u003c/p\u003e\n\n\u003cp\u003eFurther, \"these types of vulnerabilities will potentially appeal to ransomware operators as they could lead to the kind of exposure of critical data, often part of a ransom attempt,\" Kevin Breen, director of cyber threat research at Immersive Labs, tells Dark Reading.\u003c/p\u003e\n\n\u003cp\u003eIn terms of who should especially prioritize the patch, \"NFS isn't on by default, but it's prevalent in environment where Windows systems are mixed with other OSes such as Linux or Unix. If this describes your environment, you should definitely test and deploy this patch quickly,\" Childs warns.\u003c/p\u003e\n\n\u003cp\u003eAs for other critical bugs to consider, Breen flags \u003ca href=\"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-22017\" target=\"_blank\"\u003eCVE-2022-22017\u003c/a\u003e (CVSS 8.8), an RCE issue in the also-ubiquitous Remote Desktop (RDP) Client.\u003c/p\u003e\n\n\u003cp\u003e\"With more remote workers than ever, enterprises need to put anything affecting RDP on the radar — especially given its popularity with ransomware actors and access brokers,\" he warns.\u003c/p\u003e\n\n\u003cp\u003eThe Active Directory bug (\u003ca href=\"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26923\" target=\"_blank\"\u003eCVE-2022-26923\u003c/a\u003e, CVSS 8.8) is found in Domain Services and could allow elevation of privilege thanks to an issue with the issuance of certificates. ZDI, which reported the bug, says that an attacker can gain access to a certificate to authenticate to a DC with a high level of privilege, allowing any domain-authenticated user to become a domain admin if Active Directory Certificate Services are running.\u003c/p\u003e\n\n\u003cp\u003e\"This is a very common deployment,\" Childs says. \"Considering the severity of this bug and the relative ease of exploit, it would not surprise me to see active attacks using this technique sooner rather than later.\"\u003c/p\u003e\n\n\u003cp\u003eOf less concern, Breen says, are a group of 10 RCE bugs in LDAP (the most severe, \u003ca href=\"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-22012\" target=\"_blank\"\u003eCVE-2022-22012\u003c/a\u003e, has a CVSS score of 9.8). These \"appear particularly threatening; however, they have been marked by Microsoft as 'exploitation less likely' as they require a default configuration unlikely to exist in most environments,\" he notes. \"It's not to say there is no need to patch these, rather a reminder that context is important when prioritizing patches.\"\u003c/p\u003e\n\n\u003cp\u003e\u003cstrong\u003eThe Worst of the Rest\u003c/strong\u003e\u003cbr\u003e\nA handful of other vulnerabilities that also stood out to researchers are worth noting here, starting with Windows Print Spooler, which has \u003ca href=\"https://www.darkreading.com/vulnerabilities-threats/cybercriminals-are-increasingly-exploiting-vulnerabilities-in-windows-print-spooler\" target=\"_blank\"\u003elong presented an attractive bull's-eye for cyberattackers\u003c/a\u003e.\u003c/p\u003e\n\n\u003cp\u003e\"There were several Windows Print Spooler vulnerabilities patched this month, including two information disclosure flaws (\u003ca href=\"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-29114\" target=\"_blank\"\u003eCVE-2022-29114\u003c/a\u003e, \u003ca href=\"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-29140\" target=\"_blank\"\u003eCVE-2022-29140\u003c/a\u003e) and two elevation of privilege flaws (\u003ca href=\"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-29104\" target=\"_blank\"\u003eCVE-2022-29104\u003c/a\u003e, \u003ca href=\"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-29132\" target=\"_blank\"\u003eCVE-2022-29132\u003c/a\u003e),\" Satnam Narang, staff research engineer at Tenable, tells Dark Reading. \"All of the flaws are rated as important, and two of the three are considered more likely to be exploited. Windows Print Spooler continues to remain a valuable target for attackers since PrintNightmare was disclosed nearly a year ago. Elevation-of-privilege flaws in particular should be carefully prioritized, as we've seen ransomware groups like Conti favor them as part of its playbook.\"\u003c/p\u003e\n\n\u003cp\u003eBreen also highlighted two other important-rated bugs as patching priorities:\u003c/p\u003e\n\n\u003cul\u003e\u003cli\u003e\u003ca href=\"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-29108\" target=\"_blank\"\u003eCVE-2022-29108\u003c/a\u003e, a remotely executable flaw in Sharepoint that could likely be abused by an attacker seeking to move laterally across an organization. \"Requiring authenticated access to exploit, it could be used by a threat actor to steal confidential information or inject documents with malicious code or macros that could be part of a wider attack chain,\" Breen warns.\u003c/li\u003e\u003cli\u003eA bug in \u003ca href=\"https://msrc.microsoft.com/update-guide/vulnerability/ADV220001\" target=\"_blank\"\u003eAzure Data Factory\u003c/a\u003e (no CVE assigned) is remotely exploitable and can expose an enterprise’s confidential data, according to Breen.\u003c/li\u003e\u003c/ul\u003e\n\n\u003cp\u003eVirsec CTO and co-founder Satya Gupta says that overall, the broader context of Microsoft's patching trends is important to consider for defenders. Specifically, in the last year, more than a third of the patches (1,330, or 36%) are for RCE issues.\u003c/p\u003e\n\n\u003cp\u003e\"This of course represents a massive opportunity for malicious actors to compromise nearly any customer,\" he says. \"In total, several of May's vulnerabilities represent a Log4j level of exposure, particularly if you consider what it would take to patch millions of servers.\"\u003c/p\u003e","byline":"","created_at":"2022-05-10T21:30:40.818Z","created_by":"blt13546d7f135b3d6e","featured_image":{"_version":1,"is_dir":false,"uid":"blt448f14ff3bcdb7f0","ACL":{},"content_type":"image/jpeg","created_at":"2022-05-10T22:07:35.930Z","created_by":"blt31bd4bcd14669cc0","file_size":"112866","filename":"MSFTbuilding_StockStudio_Alamy_Stock_Photo.jpeg","parent_uid":null,"tags":[],"title":"MSFTbuilding_StockStudio_Alamy_Stock_Photo.jpeg","updated_at":"2022-05-10T22:07:35.930Z","updated_by":"blt31bd4bcd14669cc0","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2022-05-10T22:36:12.869Z","user":"blt79e64467d078e3e4"},"url":"https://eu-images.contentstack.com/v3/assets/blt66983808af36a8ef/blt448f14ff3bcdb7f0/627ae22786811517169414d5/MSFTbuilding_StockStudio_Alamy_Stock_Photo.jpeg"},"featured_image_caption":"","featured_image_credit":"Source: Stock Studio via Alamy Stock Photo","image_alt_text":"Microsoft office building","keywords":[],"old_url":"","published_date":"2022-05-10T22:35:55.000Z","seo":{"meta_title":"","meta_description":"","meta_keywords":"","canonical_url":""},"sponsored_content_settings":{"is_sponsor_article":false,"sponsor_name":""},"summary":"Microsoft's May 2022 Patch Tuesday contains several bugs in ubiquitous software that could affect millions of machines, researchers warn.","tags":[],"term_selector":{"actualUrl":"/application-security/what-to-patch-now-actively-exploited-zero-day-threatens-domain-controllers","historyOfPrimaryTerm":["application-security"],"primaryTerm":"application-security","primaryTermInRealText":"Application Security","primaryCategoryBelonged":"application-security","secondaryTerm":["attacks-breaches","endpoint","vulnerabilities-threats"]},"title":"What to Patch Now: Actively Exploited Windows Zero-Day Threatens Domain Controllers","updated_at":"2022-05-10T22:36:00.086Z","updated_by":"blt79e64467d078e3e4","url":"/what-to-patch-now-actively-exploited-zero-day-threatens-domain-controllers","_content_type_uid":"dr_article","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2022-05-10T22:36:12.912Z","user":"blt79e64467d078e3e4"}}],"tags":["editors' choice"],"title":"Editors' Choice","updated_at":"2022-05-18T18:35:26.151Z","updated_by":"blt603b94c5f23c042e","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2022-05-18T18:35:31.864Z","user":"blt603b94c5f23c042e"}},"secondaryData":[],"newsletterSubscribe":{"message":"Keep up with the latest cybersecurity threats, newly-discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.","open_subscribe_link_on_new_tab":true,"subscribe_link":{"title":"Subscribe","href":"https://www.darkreading.com/newsletter-signup/?_mc=dr_eoa"}},"moreInsights":{"title":"More Insights","heading":"More Insights","system":{"uid":"blt5ee3e0ba340bf613","__typename":"EntrySystemField"},"smartboxConnection":{"edges":[{"node":{"title":"White Papers","ordinal":3,"hidden":false,"system":{"uid":"blt1192837947494c5f","__typename":"EntrySystemField"},"feed":{"title":"White Papers","href":"http://smartbox.techweb.com/smartbox/externalsmartbox?site_id=162801002\u0026taxonomy_ids=\u0026num_display=\u0026article_type=whitepaper\u0026output_type=xml","__typename":"Link"},"read_more_link":{"title":"More White Papers","href":"https://www.informationweek.com/whitepaper/Security","__typename":"Link"},"__typename":"DrSmartbox","articles":[{"title":["Sumo Logic for Continuous Intelligence"],"link":["https://www.informationweek.com/whitepaper/cybersecurity/software-as-a-service/sumo-logic-for-continuous-intelligence/436973?cid=smartbox_techweb_whitepaper_14.500005115\u0026_mc=smartbox_techweb_whitepaper_14.500005115"],"publishedSite":[""],"publishedSiteURL":[""]},{"title":["Protecting Endpoint to Work from Anywhere"],"link":["https://www.informationweek.com/whitepaper/cybersecurity/security/protecting-the-endpoint-to-work-from-anywhere/437563?cid=smartbox_techweb_whitepaper_14.500005105\u0026_mc=smartbox_techweb_whitepaper_14.500005105"],"publishedSite":[""],"publishedSiteURL":[""]},{"title":["The Top 10 API Vulnerabilities"],"link":["https://www.informationweek.com/whitepaper/cybersecurity/cloud-security/the-top-10-api-vulnerabilities/437313?cid=smartbox_techweb_whitepaper_14.500005096\u0026_mc=smartbox_techweb_whitepaper_14.500005096"],"publishedSite":[""],"publishedSiteURL":[""]},{"title":["BotGuard for Denial of Inventory \u0026 Stockouts"],"link":["https://www.informationweek.com/whitepaper/cybersecurity/security-monitoring/botguard-for-inventory-scalping/437293?cid=smartbox_techweb_whitepaper_14.500005094\u0026_mc=smartbox_techweb_whitepaper_14.500005094"],"publishedSite":[""],"publishedSiteURL":[""]},{"title":["Optimizing Endpoint Protection"],"link":["https://www.informationweek.com/whitepaper/cybersecurity/endpoint-security/optimizing-endpoint-protection-/435693?cid=smartbox_techweb_whitepaper_14.500005082\u0026_mc=smartbox_techweb_whitepaper_14.500005082"],"publishedSite":[""],"publishedSiteURL":[""]}]},"__typename":"DrMoreInsightsSmartboxEdge"},{"node":{"title":"Webinars","ordinal":1,"hidden":false,"system":{"uid":"blt8f82585c522cc0f5","__typename":"EntrySystemField"},"feed":{"title":"Webinars","href":"https://smartbox.techweb.com/smartbox/externalsmartbox?site_id=162801002\u0026taxonomy_ids=\u0026num_display=5\u0026article_type=webcast\u0026output_type=xml","__typename":"Link"},"read_more_link":{"title":"More Webinars","href":"https://www.darkreading.com/upcoming-webinars","__typename":"Link"},"__typename":"DrSmartbox","articles":[{"title":["Vendors as Your Largest BEC Threat"],"link":["https://webinar.darkreading.com/1317679?keycode=sbx\u0026cid=smartbox_techweb_webcast_8.500001173\u0026_mc=smartbox_techweb_webcast_8.500001173"],"publishedSite":[""],"eventDate":["Jun 22, 2022"],"publishedSiteURL":[""],"description":["The tactics that worked for your business five years ago likely aren't still working today, and cybercrime is no different. The CEO fraud that dominated the last few years is not nearly as successful as it used to be, partially because employees understand that their CEO isn't emailing them about gift cards at 2:00 in the morning.\r\n\r\nNot to be outdone, cybercriminals have shifted their tactics, now relying more on vendor impersonation and vendor email compromise to run their scams. The average invoice fraud attack costs $183,000 and Abnormal has seen attacks that request upwards of $2.1 million. Attend this webinar to make sure you're prepared to defend against them."]},{"title":["Harnessing the Power of Security Automation"],"link":["https://webinar.darkreading.com/1314754?keycode=sbx\u0026cid=smartbox_techweb_webcast_8.500001168\u0026_mc=smartbox_techweb_webcast_8.500001168"],"publishedSite":[""],"eventDate":["Jun 09, 2022"],"publishedSiteURL":[""],"description":["With many organizations pinched for both dollars and manpower, security and IT teams are turning to a new class of technology and practices designed to automate repetitive and time-consuming tasks in security operations. How can companies truly unleash the potential for automation? Which tasks can enterprises safely automate? How does emerging automation technology work, and how can security teams implement it in a way that is both effective and secure? In this webinar, top experts offer insights on how to make automation work for your security team."]},{"title":["The Value Drivers of Attack Surface Management, Revealed"],"link":["https://webinar.darkreading.com/1315271?keycode=sbx\u0026cid=smartbox_techweb_webcast_8.500001167\u0026_mc=smartbox_techweb_webcast_8.500001167"],"publishedSite":[""],"eventDate":["May 26, 2022"],"publishedSiteURL":[""],"description":["The value of modern ASM extends beyond the security benefits. It can save money as well through prevention, lower cyber insurance costs, lower human effort, and higher operational efficiency. Join to find out how modern attack surfaces have changed, why a new process for asset inventory is essential, and how attack surface management can fit into your existing security budget."]},{"title":["Implementing and Using XDR to Improve Enterprise Cybersecurity"],"link":["https://webinar.darkreading.com/1341387?keycode=sbx\u0026cid=smartbox_techweb_webcast_8.500001166\u0026_mc=smartbox_techweb_webcast_8.500001166"],"publishedSite":[""],"eventDate":["May 25, 2022"],"publishedSiteURL":[""],"description":["Security operations teams are taking a hard look at extended detection and response tools - XDR - as a means of collecting and analyzing threat data and identifying cyber attacks faster and more efficiently. But exactly how does XDR technology work? What tools does it require, and what skills do you need to have to use it in your enterprise? In this panel discussion, top experts will discuss the benefits of XDR, the challenges in implementing it, and details on how to implement XDR technology to speed the detection and mitigation of new exploits."]},{"title":["Implementing Zero Trust in Your Enterprise"],"link":["https://webinar.darkreading.com/1348601?keycode=sbx\u0026cid=smartbox_techweb_webcast_8.500001165\u0026_mc=smartbox_techweb_webcast_8.500001165"],"publishedSite":[""],"eventDate":["Jun 21, 2022"],"publishedSiteURL":[""],"description":["Attackers have shown time and again that perimeter security is no longer enough to keep them out. The concept of internal users and outsiders doesn't work in network defense when attackers use credential theft and lateral movement to pretend they are legitimate internal users. The zero-trust model - trust nothing, verify everything - sounds straightforward, but it can be a challenge to deploy. In this webinar, learn from the experts what zero-trust looks like in practice, how to create a multi-layered defense, and what challenges to overcome along the way. You will learn the first steps to take toward implementing a zero-trust model in your organization."]}]},"__typename":"DrMoreInsightsSmartboxEdge"},{"node":{"title":"Reports","ordinal":1,"hidden":true,"system":{"uid":"blt5145c70334f61d02","__typename":"EntrySystemField"},"feed":{"title":"Reports","href":"http://smartbox.techweb.com/smartbox/externalsmartbox?site_id=162801002\u0026taxonomy_ids=\u0026num_display=10\u0026article_type=analytics\u0026output_type=xml","__typename":"Link"},"read_more_link":{"title":"More Reports","href":"/must-reads","__typename":"Link"},"__typename":"DrSmartbox","articles":[{"title":["Incorporating a Prevention Mindset into Threat Detection and Response"],"link":["https://www.informationweek.com/whitepaper/network-and-perimeter-security/networking/incorporating-a-prevention-mindset-into-threat-detection-and-response/439373?cid=smartbox_techweb_analytics_7.300005934\u0026_mc=smartbox_techweb_analytics_7.300005934"],"publishedSite":[""],"publishedSiteURL":[""]},{"title":["Practical Network Security Approaches for a Multicloud, Hybrid IT World"],"link":["https://www.informationweek.com/whitepaper/cloud-security/network-and-perimeter-security/practical-network-security-approaches-for-a-multicloud,-hybrid-it-world/438913?cid=smartbox_techweb_analytics_7.300005932\u0026_mc=smartbox_techweb_analytics_7.300005932"],"publishedSite":[""],"publishedSiteURL":[""],"description":["The report covers areas enterprises should focus on for their multicloud/hybrid cloud security strategy:\r\n-increase visibility over the environment\r\n-learning cloud-specific skills\r\n-relying on established security frameworks\r\n-re-architecting the network\r\n"]},{"title":["State of the Cloud: A Security Perspective"],"link":["https://www.informationweek.com/whitepaper/cloud-security/cybersecurity/state-of-the-cloud-a-security-perspective/438333?cid=smartbox_techweb_analytics_7.300005931\u0026_mc=smartbox_techweb_analytics_7.300005931"],"publishedSite":[""],"publishedSiteURL":[""],"description":["Cloud computing has evolved over the years from a nice-to-have item on the IT wish list to a core technology driving business initiatives. But despite widespread adoption, cloud-based IT systems continue to be saddled with issues related to data security, privacy, and resilience.\r\n\r\nDownload this report from Dark Reading for an in-depth look at what IT security teams are thinking and doing when it comes to the cloud."]},{"title":["Understanding DNS Threats and How to Use DNS to Expand Your Cybersecurity Arsenal"],"link":["https://www.informationweek.com/whitepaper/cybersecurity/security/understanding-dns-threats-and-how-to-use-dns-to-expand-your-cybersecurity-arsenal/437963?cid=smartbox_techweb_analytics_7.300005930\u0026_mc=smartbox_techweb_analytics_7.300005930"],"publishedSite":[""],"publishedSiteURL":[""],"description":["With attacks and breaches on the rise, enterprise security teams need full visibility over what they have in their network. DNS is a key tool for visibility and asset discovery. Proactive DNS-layer security - such as using DNS data to mitigate threats that network-based controls may miss - is about blocking threats before they compromise the enterprise."]},{"title":["Rethinking Endpoint Security in a Pandemic and Beyond"],"link":["https://www.informationweek.com/whitepaper/endpoint-security/cloud-security/how-enterprises-are-securing-the-application-environment/437053?cid=smartbox_techweb_analytics_7.300005929\u0026_mc=smartbox_techweb_analytics_7.300005929"],"publishedSite":[""],"publishedSiteURL":[""],"description":["IT security teams are expending the concept of \"endpoint security\" as companies adjust to a distributed workforce. How much responsibility will enterprise IT take for the security of personal devices such as printers. How will they manage identities across multiple cloud services?\r\n\r\nThe report covers areas enterprises should focus on for their endpoint security strategy:\r\n-Managing identities and credentials\r\n-Vulnerability scanning and remediation\r\n-Quarantining at-risk endpoints\r\n-Reviewing suspect accounts\r\n"]},{"title":["How Enterprises Are Securing the Application Environment"],"link":["https://www.informationweek.com/whitepaper/cybersecurity/cloud-security/how-enterprises-are-securing-the-application-environment/437083?cid=smartbox_techweb_analytics_7.300005928\u0026_mc=smartbox_techweb_analytics_7.300005928"],"publishedSite":[""],"publishedSiteURL":[""],"description":["Download this report from Dark Reading to learn more about the measures enterprises have adopted to ensure the security of their internally developed applications and third-party packaged applications."]},{"title":["How Enterprises Plan to Address Endpoint Security Threats in a Post-Pandemic World"],"link":["https://www.informationweek.com/whitepaper/cybersecurity/endpoint-security/how-enterprises-plan-to-address-endpoint-security-threats-in-a-post-pandemic-world/436653?cid=smartbox_techweb_analytics_7.300005925\u0026_mc=smartbox_techweb_analytics_7.300005925"],"publishedSite":[""],"publishedSiteURL":[""],"description":["Dark Reading's 2022 Endpoint Security Report examines how IT and cybersecurity professionals are grappling with the impact of pandemic-related changes on endpoint security strategies. The report explores how they are building their endpoint security defenses, and provides insight on what organizations are doing to protect users from malware, hackers, and social engineering attacks."]},{"title":["How Enterprises Are Assessing Cybersecurity Risk in Today's Environment"],"link":["https://www.informationweek.com/whitepaper/cybersecurity/cloud-services/how-enterprises-are-assessing-cybersecurity-risk-in-today%E2%80%99s-environment/434623?cid=smartbox_techweb_analytics_7.300005921\u0026_mc=smartbox_techweb_analytics_7.300005921"],"publishedSite":[""],"publishedSiteURL":[""],"description":["Many cybersecurity pros expect fundamental, long-term changes to their organization's computing and data security due to the shift to more remote work and accelerated cloud adoption. Download this report from Dark Reading to learn more about their challenges and concerns."]},{"title":["Defending Against Critical Threats"],"link":["https://www.informationweek.com/whitepaper/cybersecurity/endpoint-security/defending-against-critical-threats/429033?cid=smartbox_techweb_analytics_7.300005906\u0026_mc=smartbox_techweb_analytics_7.300005906"],"publishedSite":[""],"publishedSiteURL":[""]},{"title":["CVE Weaponization Report"],"link":["https://www.informationweek.com/whitepaper/cybersecurity/risk-management-security/cve-weaponization-report/429173?cid=smartbox_techweb_analytics_7.300005901\u0026_mc=smartbox_techweb_analytics_7.300005901"],"publishedSite":[""],"publishedSiteURL":[""]}]},"__typename":"DrMoreInsightsSmartboxEdge"}],"__typename":"DrMoreInsightsSmartboxConnection"},"__typename":"DrMoreInsights","smartbox":[{"title":"White Papers","ordinal":3,"hidden":false,"system":{"uid":"blt1192837947494c5f","__typename":"EntrySystemField"},"feed":{"title":"White Papers","href":"http://smartbox.techweb.com/smartbox/externalsmartbox?site_id=162801002\u0026taxonomy_ids=\u0026num_display=\u0026article_type=whitepaper\u0026output_type=xml","__typename":"Link"},"read_more_link":{"title":"More White Papers","href":"https://www.informationweek.com/whitepaper/Security","__typename":"Link"},"__typename":"DrSmartbox","articles":[{"title":["Sumo Logic for Continuous Intelligence"],"link":["https://www.informationweek.com/whitepaper/cybersecurity/software-as-a-service/sumo-logic-for-continuous-intelligence/436973?cid=smartbox_techweb_whitepaper_14.500005115\u0026_mc=smartbox_techweb_whitepaper_14.500005115"],"publishedSite":[""],"publishedSiteURL":[""]},{"title":["Protecting Endpoint to Work from Anywhere"],"link":["https://www.informationweek.com/whitepaper/cybersecurity/security/protecting-the-endpoint-to-work-from-anywhere/437563?cid=smartbox_techweb_whitepaper_14.500005105\u0026_mc=smartbox_techweb_whitepaper_14.500005105"],"publishedSite":[""],"publishedSiteURL":[""]},{"title":["The Top 10 API Vulnerabilities"],"link":["https://www.informationweek.com/whitepaper/cybersecurity/cloud-security/the-top-10-api-vulnerabilities/437313?cid=smartbox_techweb_whitepaper_14.500005096\u0026_mc=smartbox_techweb_whitepaper_14.500005096"],"publishedSite":[""],"publishedSiteURL":[""]},{"title":["BotGuard for Denial of Inventory \u0026 Stockouts"],"link":["https://www.informationweek.com/whitepaper/cybersecurity/security-monitoring/botguard-for-inventory-scalping/437293?cid=smartbox_techweb_whitepaper_14.500005094\u0026_mc=smartbox_techweb_whitepaper_14.500005094"],"publishedSite":[""],"publishedSiteURL":[""]},{"title":["Optimizing Endpoint Protection"],"link":["https://www.informationweek.com/whitepaper/cybersecurity/endpoint-security/optimizing-endpoint-protection-/435693?cid=smartbox_techweb_whitepaper_14.500005082\u0026_mc=smartbox_techweb_whitepaper_14.500005082"],"publishedSite":[""],"publishedSiteURL":[""]}]},{"title":"Webinars","ordinal":1,"hidden":false,"system":{"uid":"blt8f82585c522cc0f5","__typename":"EntrySystemField"},"feed":{"title":"Webinars","href":"https://smartbox.techweb.com/smartbox/externalsmartbox?site_id=162801002\u0026taxonomy_ids=\u0026num_display=5\u0026article_type=webcast\u0026output_type=xml","__typename":"Link"},"read_more_link":{"title":"More Webinars","href":"https://www.darkreading.com/upcoming-webinars","__typename":"Link"},"__typename":"DrSmartbox","articles":[{"title":["Vendors as Your Largest BEC Threat"],"link":["https://webinar.darkreading.com/1317679?keycode=sbx\u0026cid=smartbox_techweb_webcast_8.500001173\u0026_mc=smartbox_techweb_webcast_8.500001173"],"publishedSite":[""],"eventDate":["Jun 22, 2022"],"publishedSiteURL":[""],"description":["The tactics that worked for your business five years ago likely aren't still working today, and cybercrime is no different. The CEO fraud that dominated the last few years is not nearly as successful as it used to be, partially because employees understand that their CEO isn't emailing them about gift cards at 2:00 in the morning.\r\n\r\nNot to be outdone, cybercriminals have shifted their tactics, now relying more on vendor impersonation and vendor email compromise to run their scams. The average invoice fraud attack costs $183,000 and Abnormal has seen attacks that request upwards of $2.1 million. Attend this webinar to make sure you're prepared to defend against them."]},{"title":["Harnessing the Power of Security Automation"],"link":["https://webinar.darkreading.com/1314754?keycode=sbx\u0026cid=smartbox_techweb_webcast_8.500001168\u0026_mc=smartbox_techweb_webcast_8.500001168"],"publishedSite":[""],"eventDate":["Jun 09, 2022"],"publishedSiteURL":[""],"description":["With many organizations pinched for both dollars and manpower, security and IT teams are turning to a new class of technology and practices designed to automate repetitive and time-consuming tasks in security operations. How can companies truly unleash the potential for automation? Which tasks can enterprises safely automate? How does emerging automation technology work, and how can security teams implement it in a way that is both effective and secure? In this webinar, top experts offer insights on how to make automation work for your security team."]},{"title":["The Value Drivers of Attack Surface Management, Revealed"],"link":["https://webinar.darkreading.com/1315271?keycode=sbx\u0026cid=smartbox_techweb_webcast_8.500001167\u0026_mc=smartbox_techweb_webcast_8.500001167"],"publishedSite":[""],"eventDate":["May 26, 2022"],"publishedSiteURL":[""],"description":["The value of modern ASM extends beyond the security benefits. It can save money as well through prevention, lower cyber insurance costs, lower human effort, and higher operational efficiency. Join to find out how modern attack surfaces have changed, why a new process for asset inventory is essential, and how attack surface management can fit into your existing security budget."]},{"title":["Implementing and Using XDR to Improve Enterprise Cybersecurity"],"link":["https://webinar.darkreading.com/1341387?keycode=sbx\u0026cid=smartbox_techweb_webcast_8.500001166\u0026_mc=smartbox_techweb_webcast_8.500001166"],"publishedSite":[""],"eventDate":["May 25, 2022"],"publishedSiteURL":[""],"description":["Security operations teams are taking a hard look at extended detection and response tools - XDR - as a means of collecting and analyzing threat data and identifying cyber attacks faster and more efficiently. But exactly how does XDR technology work? What tools does it require, and what skills do you need to have to use it in your enterprise? In this panel discussion, top experts will discuss the benefits of XDR, the challenges in implementing it, and details on how to implement XDR technology to speed the detection and mitigation of new exploits."]},{"title":["Implementing Zero Trust in Your Enterprise"],"link":["https://webinar.darkreading.com/1348601?keycode=sbx\u0026cid=smartbox_techweb_webcast_8.500001165\u0026_mc=smartbox_techweb_webcast_8.500001165"],"publishedSite":[""],"eventDate":["Jun 21, 2022"],"publishedSiteURL":[""],"description":["Attackers have shown time and again that perimeter security is no longer enough to keep them out. The concept of internal users and outsiders doesn't work in network defense when attackers use credential theft and lateral movement to pretend they are legitimate internal users. The zero-trust model - trust nothing, verify everything - sounds straightforward, but it can be a challenge to deploy. In this webinar, learn from the experts what zero-trust looks like in practice, how to create a multi-layered defense, and what challenges to overcome along the way. You will learn the first steps to take toward implementing a zero-trust model in your organization."]}]},{"title":"Reports","ordinal":1,"hidden":true,"system":{"uid":"blt5145c70334f61d02","__typename":"EntrySystemField"},"feed":{"title":"Reports","href":"http://smartbox.techweb.com/smartbox/externalsmartbox?site_id=162801002\u0026taxonomy_ids=\u0026num_display=10\u0026article_type=analytics\u0026output_type=xml","__typename":"Link"},"read_more_link":{"title":"More Reports","href":"/must-reads","__typename":"Link"},"__typename":"DrSmartbox","articles":[{"title":["Incorporating a Prevention Mindset into Threat Detection and Response"],"link":["https://www.informationweek.com/whitepaper/network-and-perimeter-security/networking/incorporating-a-prevention-mindset-into-threat-detection-and-response/439373?cid=smartbox_techweb_analytics_7.300005934\u0026_mc=smartbox_techweb_analytics_7.300005934"],"publishedSite":[""],"publishedSiteURL":[""]},{"title":["Practical Network Security Approaches for a Multicloud, Hybrid IT World"],"link":["https://www.informationweek.com/whitepaper/cloud-security/network-and-perimeter-security/practical-network-security-approaches-for-a-multicloud,-hybrid-it-world/438913?cid=smartbox_techweb_analytics_7.300005932\u0026_mc=smartbox_techweb_analytics_7.300005932"],"publishedSite":[""],"publishedSiteURL":[""],"description":["The report covers areas enterprises should focus on for their multicloud/hybrid cloud security strategy:\r\n-increase visibility over the environment\r\n-learning cloud-specific skills\r\n-relying on established security frameworks\r\n-re-architecting the network\r\n"]},{"title":["State of the Cloud: A Security Perspective"],"link":["https://www.informationweek.com/whitepaper/cloud-security/cybersecurity/state-of-the-cloud-a-security-perspective/438333?cid=smartbox_techweb_analytics_7.300005931\u0026_mc=smartbox_techweb_analytics_7.300005931"],"publishedSite":[""],"publishedSiteURL":[""],"description":["Cloud computing has evolved over the years from a nice-to-have item on the IT wish list to a core technology driving business initiatives. But despite widespread adoption, cloud-based IT systems continue to be saddled with issues related to data security, privacy, and resilience.\r\n\r\nDownload this report from Dark Reading for an in-depth look at what IT security teams are thinking and doing when it comes to the cloud."]},{"title":["Understanding DNS Threats and How to Use DNS to Expand Your Cybersecurity Arsenal"],"link":["https://www.informationweek.com/whitepaper/cybersecurity/security/understanding-dns-threats-and-how-to-use-dns-to-expand-your-cybersecurity-arsenal/437963?cid=smartbox_techweb_analytics_7.300005930\u0026_mc=smartbox_techweb_analytics_7.300005930"],"publishedSite":[""],"publishedSiteURL":[""],"description":["With attacks and breaches on the rise, enterprise security teams need full visibility over what they have in their network. DNS is a key tool for visibility and asset discovery. Proactive DNS-layer security - such as using DNS data to mitigate threats that network-based controls may miss - is about blocking threats before they compromise the enterprise."]},{"title":["Rethinking Endpoint Security in a Pandemic and Beyond"],"link":["https://www.informationweek.com/whitepaper/endpoint-security/cloud-security/how-enterprises-are-securing-the-application-environment/437053?cid=smartbox_techweb_analytics_7.300005929\u0026_mc=smartbox_techweb_analytics_7.300005929"],"publishedSite":[""],"publishedSiteURL":[""],"description":["IT security teams are expending the concept of \"endpoint security\" as companies adjust to a distributed workforce. How much responsibility will enterprise IT take for the security of personal devices such as printers. How will they manage identities across multiple cloud services?\r\n\r\nThe report covers areas enterprises should focus on for their endpoint security strategy:\r\n-Managing identities and credentials\r\n-Vulnerability scanning and remediation\r\n-Quarantining at-risk endpoints\r\n-Reviewing suspect accounts\r\n"]},{"title":["How Enterprises Are Securing the Application Environment"],"link":["https://www.informationweek.com/whitepaper/cybersecurity/cloud-security/how-enterprises-are-securing-the-application-environment/437083?cid=smartbox_techweb_analytics_7.300005928\u0026_mc=smartbox_techweb_analytics_7.300005928"],"publishedSite":[""],"publishedSiteURL":[""],"description":["Download this report from Dark Reading to learn more about the measures enterprises have adopted to ensure the security of their internally developed applications and third-party packaged applications."]},{"title":["How Enterprises Plan to Address Endpoint Security Threats in a Post-Pandemic World"],"link":["https://www.informationweek.com/whitepaper/cybersecurity/endpoint-security/how-enterprises-plan-to-address-endpoint-security-threats-in-a-post-pandemic-world/436653?cid=smartbox_techweb_analytics_7.300005925\u0026_mc=smartbox_techweb_analytics_7.300005925"],"publishedSite":[""],"publishedSiteURL":[""],"description":["Dark Reading's 2022 Endpoint Security Report examines how IT and cybersecurity professionals are grappling with the impact of pandemic-related changes on endpoint security strategies. The report explores how they are building their endpoint security defenses, and provides insight on what organizations are doing to protect users from malware, hackers, and social engineering attacks."]},{"title":["How Enterprises Are Assessing Cybersecurity Risk in Today's Environment"],"link":["https://www.informationweek.com/whitepaper/cybersecurity/cloud-services/how-enterprises-are-assessing-cybersecurity-risk-in-today%E2%80%99s-environment/434623?cid=smartbox_techweb_analytics_7.300005921\u0026_mc=smartbox_techweb_analytics_7.300005921"],"publishedSite":[""],"publishedSiteURL":[""],"description":["Many cybersecurity pros expect fundamental, long-term changes to their organization's computing and data security due to the shift to more remote work and accelerated cloud adoption. Download this report from Dark Reading to learn more about their challenges and concerns."]},{"title":["Defending Against Critical Threats"],"link":["https://www.informationweek.com/whitepaper/cybersecurity/endpoint-security/defending-against-critical-threats/429033?cid=smartbox_techweb_analytics_7.300005906\u0026_mc=smartbox_techweb_analytics_7.300005906"],"publishedSite":[""],"publishedSiteURL":[""]},{"title":["CVE Weaponization Report"],"link":["https://www.informationweek.com/whitepaper/cybersecurity/risk-management-security/cve-weaponization-report/429173?cid=smartbox_techweb_analytics_7.300005901\u0026_mc=smartbox_techweb_analytics_7.300005901"],"publishedSite":[""],"publishedSiteURL":[""]}]}]},"tagManagerArgs":{"dataLayer":{"pageTitle":"Google Chrome Polishes Its First Security Update","pageID":"bltb8b51aa64bdcf847","pageType":"article","pagePrimaryCategory":"risk","termSelector":{"primaryTerm":"risk","primaryTermInRealText":"Risk","primaryCategoryBelonged":"risk","actualUrl":"/risk/google-chrome-polishes-its-first-security-update"},"contentLabel":"Commentary","adUnit":"3834/darkreading.home/article/risk","canonicalUrl":"","canonicalPath":"","hostname":"","contentAuthor":"George V. Hulme","contentPubDate":"Sep 09, 2008","event":"pageLoad","pageIsSponsored":false,"pageSponsor":"","byline":"","keyword":[]},"dataLayerName":"dataLayer"},"globalData":{"footer":{"_version":14,"locale":"en-us","uid":"blt2f72369f0f41c8be","ACL":{},"_in_progress":false,"copyright":{"text":"Informa PLC Informa UK Limited is a company registered in England and Wales with company number 1072954 whose registered office is 5 Howick Place, London, SW1P 1WG."},"created_at":"2021-05-29T07:25:34.562Z","created_by":"blt9a0fc67c46c47dd7","horizontal_navigation":{"link":[{"title":"Home","href":"https://tech.informa.com/"},{"title":"Cookies","href":"https://tech.informa.com/cookie-policy"},{"title":"Privacy","href":"https://tech.informa.com/privacy-policy"},{"title":"Terms","href":"https://tech.informa.com/terms-and-conditions"}]},"logo":{"image":{"_version":1,"is_dir":false,"uid":"blt3edeb23396a4b5dc","ACL":{},"content_type":"image/png","created_at":"2021-05-29T07:17:14.517Z","created_by":"blt9a0fc67c46c47dd7","file_size":"7774","filename":"Whitelogo_1.png","tags":[],"title":"Whitelogo_1.png","updated_at":"2021-05-29T07:17:14.517Z","updated_by":"blt9a0fc67c46c47dd7","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-05-29T07:17:15.797Z","user":"blt9a0fc67c46c47dd7"},"url":"https://eu-images.contentstack.com/v3/assets/blt66983808af36a8ef/blt3edeb23396a4b5dc/60b1ea7a9afdef577986633e/Whitelogo_1.png"},"image_alt_text":"Informatech Logo"},"nav_links":{"link":[{"title":"Home","href":"/"},{"title":"About","href":"/about"},{"title":"Contact","href":"/contact"},{"title":"Blog","href":"/blog"}]},"one_column_navigation":{"link":[{"title":"About Us","href":"https://www.darkreading.com/about-us"},{"title":"Advertise","href":"https://www.darkreading.com/advertise"},{"title":"Reprints","href":"https://info.wrightsmedia.com/informa-licensing-reprints-request"}],"title":"Working With Us"},"social_networks":{"social_network":[{"link":{"title":"Rss","href":"https://www.darkreading.com/rss.xml"},"_metadata":{"uid":"csc2779b70d6e03c3a"},"icon_class":"fas fa-rss","active":true},{"link":{"title":"Twitter","href":"https://twitter.com/DarkReading"},"_metadata":{"uid":"csd24262af0f251c9b"},"icon_class":"fab fa-twitter","active":true},{"link":{"title":"Linkedin","href":"https://www.linkedin.com/company/dark-reading/"},"_metadata":{"uid":"cse75c5c0ea8c72705"},"icon_class":"fab fa-linkedin-in","active":true},{"link":{"title":"Facebook","href":"https://www.facebook.com/darkreadingcom"},"_metadata":{"uid":"csdbb1b7d09b01bb09"},"icon_class":"fab fa-facebook-f","active":true},{"link":{"title":"Google News","href":"https://news.google.com/publications/CAAqBwgKMKmknwswtq63Aw?ceid=US:en\u0026oc=3"},"_metadata":{"uid":"cs8df94cf6003ddf3f"},"icon_class":"google","active":false}],"title":"Follow Dark Reading On Social"},"tags":[],"title":"Footer","two_columns_navigation":{"link":[{"title":"Interop","href":"https://www.interop.com/"},{"title":"InformationWeek","href":"https://www.informationweek.com/"},{"title":"Network Computing","href":"https://www.networkcomputing.com/"},{"title":"ITPro Today","href":"https://www.itprotoday.com/"},{"title":"Data Center Knowledge","href":"https://www.datacenterknowledge.com/"},{"title":"Black Hat","href":"https://www.blackhat.com/"},{"title":"Omdia","href":"http://www.omdia.com/"}],"title":"Discover More From Informa Tech"},"updated_at":"2022-05-16T16:03:11.177Z","updated_by":"blt261ffa4842e93600","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2022-05-16T16:03:36.627Z","user":"blt261ffa4842e93600"}},"siteSettings":{"_version":84,"locale":"en-us","uid":"blt03ce54293658c8bc","ACL":{},"_in_progress":false,"content_type_icons":[{"content_type":"Article","icon":{"uid":"blt27dca7fd9a7ec07d","created_by":"blt871c9fa65adba4f6","updated_by":"blt871c9fa65adba4f6","created_at":"2021-06-29T03:51:02.199Z","updated_at":"2021-06-29T03:51:02.199Z","content_type":"image/svg+xml","file_size":"3327","filename":"Article.svg","title":"Article.svg","ACL":{},"_version":1,"is_dir":false,"tags":[],"publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-06-29T03:51:31.680Z","user":"blt871c9fa65adba4f6"},"url":"https://eu-images.contentstack.com/v3/assets/blt66983808af36a8ef/blt27dca7fd9a7ec07d/60da98a6537dbc26a0e2a2d3/Article.svg"},"_metadata":{"uid":"cs6bc72e5d7fe8d645"}},{"content_type":"Slideshow","icon":{"_version":1,"is_dir":false,"uid":"bltc31af506fe1f1ef3","ACL":{},"content_type":"image/svg+xml","created_at":"2021-06-23T03:08:44.113Z","created_by":"blt986fc66e34c7b415","file_size":"3960","filename":"Vector.svg","tags":[],"title":"Vector.svg","updated_at":"2021-06-23T03:08:44.113Z","updated_by":"blt986fc66e34c7b415","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-07-15T11:44:06.452Z","user":"blt986fc66e34c7b415"},"url":"https://eu-images.contentstack.com/v3/assets/blt66983808af36a8ef/bltc31af506fe1f1ef3/60d2a5bcdd40a179d073b802/Vector.svg"},"_metadata":{"uid":"cs9b26d7221b48f0e9"}},{"content_type":"Video","icon":{"uid":"blt73d712bb4508bdd2","created_by":"bltb064b71641a544b9","updated_by":"bltb064b71641a544b9","created_at":"2021-07-06T07:22:25.803Z","updated_at":"2021-07-06T07:22:25.803Z","content_type":"image/svg+xml","file_size":"3593","filename":"Vector.svg","title":"Vector.svg","ACL":{},"_version":1,"is_dir":false,"tags":[],"publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-08-09T19:11:32.637Z","user":"blt9488f204761710b3"},"url":"https://eu-images.contentstack.com/v3/assets/blt66983808af36a8ef/blt73d712bb4508bdd2/60e404b17625b62c25ba2a74/Vector.svg"},"_metadata":{"uid":"csee3d099c523785a7"}}],"cookie_banner":"\u003cp data-children-count=\"0\"\u003eThis site uses cookies to provide you with the best user experience possible. By using \u003cstrong\u003eDark Reading\u003c/strong\u003e, you accept \u003ca href=\"https://tech.informa.com/cookie-policy\" target=\"_blank\"\u003eour use of cookies.\u003c/a\u003e\u003c/p\u003e","created_at":"2021-05-29T07:25:08.958Z","created_by":"blt9a0fc67c46c47dd7","homepage_seo_settings":{"meta_description":"Cyber security's comprehensive news site is now an online community for security professionals, outlining cyber threats and the technologies for defending against them.","meta_title":"Dark Reading | Security | Protect The Business"},"open_subscribe_link_on_new_tab":true,"placeholder_image":{"article":{"uid":"bltc1378ee892fc2b03","created_by":"blt986fc66e34c7b415","updated_by":"blt986fc66e34c7b415","created_at":"2021-10-22T09:00:01.060Z","updated_at":"2021-10-22T09:00:01.060Z","content_type":"image/jpeg","file_size":"19176","filename":"dr-logo.jpg","title":"dr-logo.jpg","ACL":{},"_version":1,"is_dir":false,"tags":[],"publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-10-22T09:00:16.437Z","user":"blt986fc66e34c7b415"},"url":"https://eu-images.contentstack.com/v3/assets/blt66983808af36a8ef/bltc1378ee892fc2b03/61727d918e52444950791daf/dr-logo.jpg"},"author":{"uid":"bltc1378ee892fc2b03","created_by":"blt986fc66e34c7b415","updated_by":"blt986fc66e34c7b415","created_at":"2021-10-22T09:00:01.060Z","updated_at":"2021-10-22T09:00:01.060Z","content_type":"image/jpeg","file_size":"19176","filename":"dr-logo.jpg","title":"dr-logo.jpg","ACL":{},"_version":1,"is_dir":false,"tags":[],"publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-10-22T09:00:16.437Z","user":"blt986fc66e34c7b415"},"url":"https://eu-images.contentstack.com/v3/assets/blt66983808af36a8ef/bltc1378ee892fc2b03/61727d918e52444950791daf/dr-logo.jpg"}},"site_wide_style":{"font":null,"module_style":{"heading_color":""},"navigation_style":{"color_1":"","color_2":"","gradient":true}},"social_networks":{"social_network":[{"link":{"title":"Rss","href":"https://www.darkreading.com/rss.xml"},"_metadata":{"uid":"cs1b60c654a4c98515"},"icon_class":"fas fa-rss","open_new_tab":true,"active":true},{"link":{"title":"Twitter","href":"https://twitter.com/DarkReading"},"_metadata":{"uid":"csb40560d5b45c67c0"},"icon_class":"fab fa-twitter","open_new_tab":true,"active":true},{"link":{"title":"Linkedin","href":"https://www.linkedin.com/company/dark-reading/"},"_metadata":{"uid":"csb7b068ffddb2508a"},"icon_class":"fab fa-linkedin-in","open_new_tab":true,"active":true},{"link":{"title":"Facebook","href":"https://www.facebook.com/darkreadingcom/"},"_metadata":{"uid":"cs1c83b83e0ac18d5d"},"icon_class":"fab fa-facebook-f","open_new_tab":true,"active":true}],"title":"Follow DR:"},"subscribe_link":{"title":"Subscribe","href":"https://www.darkreading.com/newsletter-signup/?_mc=dr_header"},"switch_board":{"iris_recommendation":true},"tags":[],"title":"Dark Reading | Security | Protect The Business","updated_at":"2022-03-04T08:49:59.688Z","updated_by":"blt986fc66e34c7b415","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2022-03-09T12:36:16.662Z","user":"bltfcb3d125bf8c49ee"}},"announcements":[[{"_version":1,"locale":"en-us","uid":"bltdd5461be04307e6d","ACL":{},"_in_progress":false,"active":true,"content":"The Value Drivers of Attack Surface Management, Revealed | May 26 Webinar | \u003cREGISTER NOW\u003e","created_at":"2022-05-17T20:32:12.406Z","created_by":"blt86eeaee2e17f91dc","link":{"title":"Get Your Pass","href":"https://webinar.darkreading.com/1315271?keycode=drsitebell"},"open_in_new_tab":true,"tags":["cybersecurity","dark reading","attacks"],"title":"5/26/22 DR Webinar","type_of_announcement":"Event","updated_at":"2022-05-17T20:32:12.406Z","updated_by":"blt86eeaee2e17f91dc","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2022-05-17T20:32:19.983Z","user":"blt86eeaee2e17f91dc"}},{"_version":1,"locale":"en-us","uid":"blt1bdb779aeac28d27","ACL":{},"_in_progress":false,"active":true,"content":"Implementing and Using XDR to Improve Enterprise Cybersecurity | May 25 Webinar | \u003cREGISTER NOW\u003e","created_at":"2022-05-03T00:15:17.141Z","created_by":"blt86eeaee2e17f91dc","link":{"title":"Get Your Pass","href":"https://webinar.darkreading.com/1341387?keycode=drsitebell"},"open_in_new_tab":true,"tags":["dark reading","cybersecurity"],"title":"5/19/22 DR Webinar","type_of_announcement":"Event","updated_at":"2022-05-03T00:15:17.141Z","updated_by":"blt86eeaee2e17f91dc","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2022-05-03T00:15:21.974Z","user":"blt86eeaee2e17f91dc"}},{"_version":1,"locale":"en-us","uid":"bltc86d05673b4bea2e","ACL":{},"_in_progress":false,"active":true,"content":"HOW DATA BREACHES HAPPEN \u0026 WHAT TO DO WHEN THEY HAPPEN TO YOU | June 23 Virtual Event | \u003cGet Your Pass\u003e","created_at":"2022-04-23T16:06:22.307Z","created_by":"blt86eeaee2e17f91dc","link":{"title":"Get Your Pass","href":"https://ve.informaengage.com/virtual-events/dr-how-data-breaches-happen/?kcode=drsitebell"},"open_in_new_tab":true,"tags":["data breaches","attacks","cybersecurity"],"title":"6/23/22 DR VE","type_of_announcement":"Event","updated_at":"2022-04-23T16:06:22.307Z","updated_by":"blt86eeaee2e17f91dc","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2022-04-23T16:06:30.447Z","user":"blt86eeaee2e17f91dc"}}]],"navigation":{"site_information":{"left_column":{"description":"Dark Reading is part of the Informa Tech Division of Informa PLC","links":[{"link":{"href":"https://informa.com/About-Us/","title":"About Us","__typename":"Link"},"open_new_tab":true,"__typename":"DrNavigationV2SiteInformationLeftColumnLinks"},{"link":{"href":"https://informa.com/","title":"Informa PLC","__typename":"Link"},"open_new_tab":true,"__typename":"DrNavigationV2SiteInformationLeftColumnLinks"},{"link":{"href":"https://informa.com/Investors/","title":"Investor Relations","__typename":"Link"},"open_new_tab":true,"__typename":"DrNavigationV2SiteInformationLeftColumnLinks"},{"link":{"href":"https://informa.com/Talent/","title":"Talent","__typename":"Link"},"open_new_tab":true,"__typename":"DrNavigationV2SiteInformationLeftColumnLinks"}],"__typename":"DrNavigationV2SiteInformationLeftColumn"},"right_column":{"description":"This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.","__typename":"DrNavigationV2SiteInformationRightColumn"},"__typename":"DrNavigationV2SiteInformation"},"search":{"link":{"href":"https://www.darkreading.com/about-us/d/d-id/1113937","title":"Search","__typename":"Link"},"open_new_tab":true,"__typename":"DrNavigationV2Search"},"reports":{"enabled":true,"navigation_link_title":"Resources","links":[{"link":"/must-reads","link_text":"Reports \u003e","open_in_new_tab":true,"__typename":"DrNavigationV2ReportsLinks"},{"link":"/latest/slideshow","link_text":"Slideshows \u003e","open_in_new_tab":true,"__typename":"DrNavigationV2ReportsLinks"},{"link":"https://www.informationweek.com/whitepaper","link_text":"Tech Library \u003e","open_in_new_tab":true,"__typename":"DrNavigationV2ReportsLinks"},{"link":"/upcoming-webinars","link_text":"Webinars \u003e","open_in_new_tab":true,"__typename":"DrNavigationV2ReportsLinks"},{"link":"https://www.informationweek.com/whitepaper/Security","link_text":"White Papers \u003e","open_in_new_tab":true,"__typename":"DrNavigationV2ReportsLinks"}],"__typename":"DrNavigationV2Reports"},"logo":{"logo_title":"DR Logo New","image_alt_text":"Dark Reading Logo","site_mobile_logoConnection":{"edges":[{"node":{"url":"https://eu-images.contentstack.com/v3/assets/blt66983808af36a8ef/blt69e42f380169c938/620378c0a75f1e5f7d5bce80/DR_Logo_-_White.svg","__typename":"SysAsset"},"__typename":"SysAssetEdge"}],"__typename":"SysAssetConnection"},"logo_imageConnection":{"edges":[{"node":{"url":"https://eu-images.contentstack.com/v3/assets/blt66983808af36a8ef/blt456fd002839bae7e/620377d02be9c249dcea7cc9/Frame_1728.svg","__typename":"SysAsset"},"__typename":"SysAssetEdge"}],"__typename":"SysAssetConnection"},"__typename":"DrNavigationV2Logo"},"feature_links":[{"enabled":true,"display_as_link":true,"navigation_link_title":"Featured","navigation_links":[{"navigation_link_title":"The Edge","text_link":"/edge","navigation_link_background_color":"#9f110d","__typename":"DrNavigationV2FeatureLinksNavigationLinks"},{"navigation_link_title":"DR Tech","text_link":"/dr-tech","navigation_link_background_color":"#9f110d","__typename":"DrNavigationV2FeatureLinksNavigationLinks"}],"links":[{"brand_logoConnection":{"edges":[{"node":{"url":"https://eu-images.contentstack.com/v3/assets/blt66983808af36a8ef/blt0242302270d4c8c5/616053aef0756e7ad17a2766/TheEdge-Logo-K.png","__typename":"SysAsset"},"__typename":"SysAssetEdge"}],"__typename":"SysAssetConnection"},"image_alt_text":"The Edge Logo","link_text":"The Edge","link":"/edge","open_in_new_tab":true,"__typename":"DrNavigationV2FeatureLinksLinks"},{"brand_logoConnection":{"edges":[{"node":{"url":"https://eu-images.contentstack.com/v3/assets/blt66983808af36a8ef/blt13a7bb63bbc84ea1/615573a9486c9a5b53694fea/DR_Technology_Logo_Black.png","__typename":"SysAsset"},"__typename":"SysAssetEdge"}],"__typename":"SysAssetConnection"},"image_alt_text":"DR Technology Logo","link_text":"DR Technology","link":"/dr-tech","open_in_new_tab":true,"__typename":"DrNavigationV2FeatureLinksLinks"}],"__typename":"DrNavigationV2FeatureLinks"}],"events":{"enabled":true,"navigation_link_title":"Events","smartbox":[{"smartbox_entryConnection":{"edges":[{"node":{"type":"Live Events","title":"Events","system":{"uid":"blt8b6a33909c49602f","__typename":"EntrySystemField"},"__typename":"DrSmartbox"},"__typename":"DrNavigationV2EventsSmartboxSmartboxEntryEdge"}],"__typename":"DrNavigationV2EventsSmartboxSmartboxEntryConnection"},"__typename":"DrNavigationV2EventsSmartbox"},{"smartbox_entryConnection":{"edges":[{"node":{"type":"Webinars","title":"Webinars","system":{"uid":"blt8f82585c522cc0f5","__typename":"EntrySystemField"},"__typename":"DrSmartbox"},"__typename":"DrNavigationV2EventsSmartboxSmartboxEntryEdge"}],"__typename":"DrNavigationV2EventsSmartboxSmartboxEntryConnection"},"__typename":"DrNavigationV2EventsSmartbox"}],"__typename":"DrNavigationV2Events"},"topics":{"enabled":true,"navigation_link_title":"Sections","casual_links":{"topic_linkConnection":{"edges":[{"node":{"title":"Breaches","expanded_title":"Attacks / Breaches","url":"/attacks-breaches","system":{"uid":"blt785557489e965a0e","__typename":"EntrySystemField"},"__typename":"DrTopicPrimary"},"__typename":"DrNavigationV2TopicsCasualLinksTopicLinkEdge"},{"node":{"title":"Cloud","expanded_title":"Cloud","url":"/cloud","system":{"uid":"blte0b20eea18da92ac","__typename":"EntrySystemField"},"__typename":"DrTopicPrimary"},"__typename":"DrNavigationV2TopicsCasualLinksTopicLinkEdge"},{"node":{"title":"IoT","expanded_title":"IoT","url":"/iot","system":{"uid":"blt015364f303d8cd5c","__typename":"EntrySystemField"},"__typename":"DrTopicPrimary"},"__typename":"DrNavigationV2TopicsCasualLinksTopicLinkEdge"},{"node":{"title":"Physical","expanded_title":"Physical Security","url":"/physical-security","system":{"uid":"blt67964a3f25e5e5bc","__typename":"EntrySystemField"},"__typename":"DrTopicPrimary"},"__typename":"DrNavigationV2TopicsCasualLinksTopicLinkEdge"},{"node":{"title":"Perimeter","expanded_title":"Perimeter","url":"/perimeter","system":{"uid":"bltdad7410202520cf3","__typename":"EntrySystemField"},"__typename":"DrTopicPrimary"},"__typename":"DrNavigationV2TopicsCasualLinksTopicLinkEdge"},{"node":{"title":"Analytics","expanded_title":"Analytics","url":"/analytics","system":{"uid":"blt77fe1b1ed6a4cb2b","__typename":"EntrySystemField"},"__typename":"DrTopicPrimary"},"__typename":"DrNavigationV2TopicsCasualLinksTopicLinkEdge"},{"node":{"title":"App Sec","expanded_title":"App Sec","url":"/application-security","system":{"uid":"blt5becbd3781fc8e16","__typename":"EntrySystemField"},"__typename":"DrTopicPrimary"},"__typename":"DrNavigationV2TopicsCasualLinksTopicLinkEdge"},{"node":{"title":"Risk","expanded_title":"Risk","url":"/risk","system":{"uid":"bltb4fa098465367813","__typename":"EntrySystemField"},"__typename":"DrTopicPrimary"},"__typename":"DrNavigationV2TopicsCasualLinksTopicLinkEdge"},{"node":{"title":"Threat Intel","expanded_title":"Threat Intelligence","url":"/threat-intelligence","system":{"uid":"blta3feccd65c5cd514","__typename":"EntrySystemField"},"__typename":"DrTopicPrimary"},"__typename":"DrNavigationV2TopicsCasualLinksTopicLinkEdge"},{"node":{"title":"Endpoint","expanded_title":"Endpoint","url":"/endpoint","system":{"uid":"bltca5b5d25e0e89c28","__typename":"EntrySystemField"},"__typename":"DrTopicPrimary"},"__typename":"DrNavigationV2TopicsCasualLinksTopicLinkEdge"},{"node":{"title":"Vulns / Threats","expanded_title":"Vulnerabilities / Threats","url":"/vulnerabilities-threats","system":{"uid":"blt7299bec9b19d3040","__typename":"EntrySystemField"},"__typename":"DrTopicPrimary"},"__typename":"DrNavigationV2TopicsCasualLinksTopicLinkEdge"},{"node":{"title":"Ops","expanded_title":"Operations","url":"/operations","system":{"uid":"blt30a5d434863af8a0","__typename":"EntrySystemField"},"__typename":"DrTopicPrimary"},"__typename":"DrNavigationV2TopicsCasualLinksTopicLinkEdge"},{"node":{"title":"Remote Workforce","expanded_title":"Remote Workforce","url":"/remote-workforce","system":{"uid":"blt66841a34e87f9b7d","__typename":"EntrySystemField"},"__typename":"DrTopicPrimary"},"__typename":"DrNavigationV2TopicsCasualLinksTopicLinkEdge"}],"__typename":"DrNavigationV2TopicsCasualLinksTopicLinkConnection"},"__typename":"DrNavigationV2TopicsCasualLinks"},"__typename":"DrNavigationV2Topics"},"connect":{"brand_engagement_section":{"brand_engagement_moduleConnection":{"edges":[{"node":{"system":{"uid":"bltfd75a966494c9e3c","__typename":"EntrySystemField"},"section_1":{"cta_button_link":"https://www.darkreading.com/?ngAction=register","cta_button_text":"REGISTER","link_target":"Open in new window","section_description":"\u003cul\u003e\u003cli\u003eGain full access to resources (events, white paper, webinars, reports, etc.)\u003c/li\u003e\u003cli\u003eSingle sign-on to all Informa products\u003c/li\u003e\u003c/ul\u003e","section_eyebrow":"Register for a","section_title":"Dark Reading Account","__typename":"DrBrandEngagementSection1"},"section_2":{"cta_button_link":"https://www.darkreading.com/newsletter-signup/?_mc=dr_header","cta_button_text":"SUBSCRIBE","link_target":"Open in new window","section_description":"\u003cp\u003eGet daily Dark Reading top stories every morning straight into your inbox\u003c/p\u003e","section_eyebrow":"Subscribe to the","section_title":"Dark Reading newsletter","__typename":"DrBrandEngagementSection2"},"section_3":{"cta_button_link":"","cta_button_text":"","link_target":"Open in new window","section_description":"\u003cp\u003eFollow us @darkreading to stay up-to-date with the latest news \u0026 insider information about events \u0026 more\u003c/p\u003e","section_eyebrow":"Follow us","section_title":"@DarkReading","__typename":"DrBrandEngagementSection3"},"include_social_links_in_section_3":"Yes","__typename":"DrBrandEngagement"},"__typename":"DrNavigationV2ConnectBrandEngagementSectionBrandEngagementModuleEdge"}],"__typename":"DrNavigationV2ConnectBrandEngagementSectionBrandEngagementModuleConnection"},"__typename":"DrNavigationV2ConnectBrandEngagementSection"},"enabled":false,"navigation_link_title":"Connect","our_network_section":{"enabled":true,"label":"Our Network:","links":[{"brand_logoConnection":{"edges":[{"node":{"url":"https://eu-images.contentstack.com/v3/assets/blt66983808af36a8ef/blt365fc6c2647d15e5/60b1e96052bd6156414f3422/bh_logo_black_1.png","__typename":"SysAsset"},"__typename":"SysAssetEdge"}],"__typename":"SysAssetConnection"},"link":"https://www.blackhat.com/","link_text":"Black Hat","open_new_tab":false,"image_alt_text":"","__typename":"DrNavigationV2ConnectOurNetworkSectionLinks"},{"brand_logoConnection":{"edges":[{"node":{"url":"https://eu-images.contentstack.com/v3/assets/blt66983808af36a8ef/blt5e638427fb7992eb/60b9b81d1ffed8575f140e47/OMDIA_LOGO_BLACK_2_with_extra_height.png","__typename":"SysAsset"},"__typename":"SysAssetEdge"}],"__typename":"SysAssetConnection"},"link":"https://omdia.tech.informa.com/topic-pages/cybersecurity?promo=OmdiaDR","link_text":"OMDIA","open_new_tab":true,"image_alt_text":"","__typename":"DrNavigationV2ConnectOurNetworkSectionLinks"},{"brand_logoConnection":{"edges":[{"node":{"url":"https://eu-images.contentstack.com/v3/assets/blt66983808af36a8ef/blt621a6404bafa0c4d/60b1e8c8d64f195504537b9a/IWK-Color_heigh_adjusted.png","__typename":"SysAsset"},"__typename":"SysAssetEdge"}],"__typename":"SysAssetConnection"},"link":"https://www.informationweek.com","link_text":"InformationWeek","open_new_tab":true,"image_alt_text":"","__typename":"DrNavigationV2ConnectOurNetworkSectionLinks"}],"__typename":"DrNavigationV2ConnectOurNetworkSection"},"links":[{"link":"/about-us","link_text":"About us","open_in_new_tab":true,"__typename":"DrNavigationV2ConnectLinks"},{"link":"https://www.darkreading.com/advertise","link_text":"Advertise with us","open_in_new_tab":true,"__typename":"DrNavigationV2ConnectLinks"},{"link":"https://info.wrightsmedia.com/informa-licensing-reprints-request","link_text":"Reprints","open_in_new_tab":true,"__typename":"DrNavigationV2ConnectLinks"}],"__typename":"DrNavigationV2Connect"},"__typename":"DrNavigationV2"},"navPromotedTopics":{"topics":{"promoted_links":{"topic_linkConnection":{"edges":[{"node":{"title":"Black Hat news","url":"https://www.darkreading.com/black-hat.asp","system":{"uid":"blt58877ad235079f24","__typename":"EntrySystemField"},"__typename":"DrTopicOthers"},"__typename":"DrNavigationV2TopicsPromotedLinksTopicLinkEdge"},{"node":{"title":"Omdia Research","url":"https://www.darkreading.com/omdia","system":{"uid":"blt7757a7dced09e4cc","__typename":"EntrySystemField"},"__typename":"DrTopicOthers"},"__typename":"DrNavigationV2TopicsPromotedLinksTopicLinkEdge"},{"node":{"title":"Security Now","url":"https://www.darkreading.com/security-now.asp","system":{"uid":"blt62de504b94f13f55","__typename":"EntrySystemField"},"__typename":"DrTopicOthers"},"__typename":"DrNavigationV2TopicsPromotedLinksTopicLinkEdge"}],"__typename":"DrNavigationV2TopicsPromotedLinksTopicLinkConnection"},"__typename":"DrNavigationV2TopicsPromotedLinks"},"__typename":"DrNavigationV2Topics"},"__typename":"DrNavigationV2"},"navFeaturedTopics":{"topics":{"featured_sections":{"enabled":true,"topic_linkConnection":{"edges":[{"node":{"title":"The Edge","name":"The Edge","url":"/edge","system":{"uid":"blt1ac900de55b45e3b","__typename":"EntrySystemField"},"__typename":"DrTopicSecondary"},"__typename":"DrNavigationV2TopicsFeaturedSectionsTopicLinkEdge"},{"node":{"title":"Dr Tech","name":"Dark Reading Technology","url":"/dr-tech","system":{"uid":"blta9155e90e5f8030b","__typename":"EntrySystemField"},"__typename":"DrTopicSecondary"},"__typename":"DrNavigationV2TopicsFeaturedSectionsTopicLinkEdge"}],"__typename":"DrNavigationV2TopicsFeaturedSectionsTopicLinkConnection"},"__typename":"DrNavigationV2TopicsFeaturedSections"},"__typename":"DrNavigationV2Topics"},"__typename":"DrNavigationV2"},"topicsWithChild":[{"title":"Remote Workforce","url":"/remote-workforce","expanded_title":"Remote Workforce","topics_secondary":[],"seo":{"meta_title":"","meta_description":"","meta_keywords":"","canonical_url":""},"tags":[],"locale":"en-us","uid":"blt66841a34e87f9b7d","created_by":"bltfcb3d125bf8c49ee","updated_by":"bltfcb3d125bf8c49ee","created_at":"2022-03-03T19:13:38.062Z","updated_at":"2022-03-03T19:13:38.062Z","ACL":{},"_version":1,"_in_progress":false,"publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2022-03-03T19:14:08.678Z","user":"bltfcb3d125bf8c49ee"},"_owner":{"uid":"bltfcb3d125bf8c49ee","created_at":"2021-05-21T10:05:50.071Z","updated_at":"2022-03-31T16:30:43.090Z","email":"edward.canavan@informa.com","username":"edward_blt00302c2c","first_name":"edward","last_name":"canavan","org_uid":[],"shared_org_uid":["blt5948195ac13977b0"],"mobile_number":"07916365746","country_code":"44","tfa_status":"verified","authy_id":"374943478","active":true,"profile_type":"business","failed_attempts":0,"settings":{"preferences":{"global":[],"stack":[{"api_key":"blt66983808af36a8ef","key":"dashboard","value":{"recently_modified_assets":{"order":0,"visibility":"show"},"recently_modified_entries":{"order":1,"visibility":"show"},"prod_update":{"order":2,"visibility":"hide"},"doc_search":{"order":3,"visibility":"show"},"did_you_know":{"order":4,"visibility":"show"}}}]}},"last_login_at":"Thu Mar 31 2022 16:30:43 GMT+0000 (Coordinated Universal Time)"}},{"title":"Omdia","url":"/omdia","expanded_title":"Omdia","topics_secondary":[],"seo":{"meta_title":"","meta_description":"","meta_keywords":"","canonical_url":""},"tags":[],"locale":"en-us","uid":"bltcbdbf86a0551d8bb","created_by":"blta3dd47a38c602549","updated_by":"blta3dd47a38c602549","created_at":"2021-09-29T10:56:10.231Z","updated_at":"2021-09-29T10:56:10.231Z","ACL":{},"_version":1,"_in_progress":false,"publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-09-29T10:57:01.003Z","user":"blta3dd47a38c602549"},"_owner":{"uid":"blta3dd47a38c602549","created_at":"2021-05-21T10:05:50.070Z","updated_at":"2022-03-29T13:19:39.169Z","email":"john.ely@informa.com","username":"john_blt665706a5","first_name":"John","last_name":"Ely","org_uid":[],"shared_org_uid":["blt5948195ac13977b0"],"mobile_number":"07877953454","country_code":"44","tfa_status":"verified","authy_id":"378049479","active":true,"profile_type":"business","failed_attempts":0,"settings":{"preferences":{"global":[],"stack":[]}},"last_login_at":"Tue Mar 29 2022 13:19:39 GMT+0000 (Coordinated Universal Time)"}},{"title":"Vulns / Threats","url":"/vulnerabilities-threats","topics_secondary":[{"_version":6,"locale":"en-us","uid":"bltc0595d7ad0a824f9","ACL":{},"_in_progress":false,"created_at":"2021-05-29T07:24:46.154Z","created_by":"blt9a0fc67c46c47dd7","name":"Advanced Threats","seo":{"meta_title":"Advanced Threats","meta_description":"Advanced Threats","meta_keywords":"","canonical_url":""},"tags":[],"title":"[Vulnerabilities / Threats] Advanced Threats","updated_at":"2021-07-20T13:53:43.004Z","updated_by":"blta3dd47a38c602549","url":"/advanced-threats","_content_type_uid":"dr_topic_secondary","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-07-20T13:53:45.886Z","user":"blta3dd47a38c602549"}},{"_version":2,"locale":"en-us","uid":"blt48c537ccb149ce69","ACL":{},"_in_progress":false,"created_at":"2021-05-29T07:24:36.088Z","created_by":"blt9a0fc67c46c47dd7","name":"Insider Threats","seo":{"meta_title":"Insider Threats","meta_description":"Insider Threats","meta_keywords":"","canonical_url":""},"tags":[],"title":"[Vulnerabilities / Threats] Insider Threats","updated_at":"2021-07-20T13:50:08.841Z","updated_by":"blta3dd47a38c602549","url":"/insider-threats","_content_type_uid":"dr_topic_secondary","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-07-20T13:52:54.877Z","user":"blta3dd47a38c602549"}},{"_version":2,"locale":"en-us","uid":"blt841a890c83604b92","ACL":{},"_in_progress":false,"created_at":"2021-05-29T07:24:37.215Z","created_by":"blt9a0fc67c46c47dd7","name":"Vulnerability Management","seo":{"meta_title":"Vulnerability Management","meta_description":"Vulnerability Management","meta_keywords":"","canonical_url":""},"tags":[],"title":"[Vulnerabilities / Threats] Vulnerability Management","updated_at":"2021-07-20T13:49:38.788Z","updated_by":"blta3dd47a38c602549","url":"/vulnerability-management","_content_type_uid":"dr_topic_secondary","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-07-20T13:49:41.689Z","user":"blta3dd47a38c602549"}}],"seo":{"meta_title":"Vulnerabilities / Threats","meta_description":"Vulnerabilities / Threats","meta_keywords":"","canonical_url":""},"tags":[],"locale":"en-us","ACL":{},"expanded_title":"Vulnerabilities / Threats","uid":"blt7299bec9b19d3040","created_by":"blt9a0fc67c46c47dd7","updated_by":"blt441f3cf9519ce96f","created_at":"2021-05-29T07:24:52.174Z","updated_at":"2021-09-28T06:59:11.602Z","_version":8,"_in_progress":false,"publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-09-28T10:32:40.219Z","user":"blta3dd47a38c602549"}},{"_version":6,"locale":"en-us","uid":"blt30a5d434863af8a0","ACL":{},"_in_progress":false,"created_at":"2021-05-29T07:24:50.221Z","created_by":"blt9a0fc67c46c47dd7","expanded_title":"Operations","seo":{"meta_title":"Operations","meta_description":"Operations","meta_keywords":"","canonical_url":""},"tags":[],"title":"Ops","topics_secondary":[{"_version":2,"locale":"en-us","uid":"bltc66bc15dc564597f","ACL":{},"_in_progress":false,"created_at":"2021-05-29T07:24:45.214Z","created_by":"blt9a0fc67c46c47dd7","name":"Identity \u0026 Access Management","seo":{"meta_title":"Identity \u0026 Access Management","meta_description":"Identity \u0026 Access Management","meta_keywords":"","canonical_url":""},"tags":[],"title":"[Operations] Identity \u0026 Access Management","updated_at":"2021-07-20T13:49:05.230Z","updated_by":"blta3dd47a38c602549","url":"/identity-and-access-management","_content_type_uid":"dr_topic_secondary","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-07-20T13:49:08.073Z","user":"blta3dd47a38c602549"}},{"_version":11,"locale":"en-us","uid":"blte7df9c155852d974","ACL":{},"_in_progress":false,"created_at":"2021-05-29T07:24:47.100Z","created_by":"blt9a0fc67c46c47dd7","name":"Careers \u0026 People","seo":{"meta_title":"Careers \u0026 People","meta_description":"Careers \u0026 People","meta_keywords":"","canonical_url":""},"tags":[],"title":"[Operations] Careers \u0026 People","updated_at":"2021-07-20T12:08:28.689Z","updated_by":"blt986fc66e34c7b415","url":"/careers-and-people","_content_type_uid":"dr_topic_secondary","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-07-20T12:09:57.002Z","user":"blt986fc66e34c7b415"}}],"updated_at":"2021-07-21T15:26:00.567Z","updated_by":"blta3dd47a38c602549","url":"/operations","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-07-21T15:26:04.309Z","user":"blta3dd47a38c602549"}},{"_version":4,"locale":"en-us","uid":"blt015364f303d8cd5c","ACL":{},"_in_progress":false,"created_at":"2021-05-29T07:24:48.288Z","created_by":"blt9a0fc67c46c47dd7","expanded_title":"IoT","seo":{"meta_title":"IoT","meta_description":"IoT","meta_keywords":"","canonical_url":""},"tags":[],"title":"IoT","topics_secondary":[],"updated_at":"2021-07-20T13:40:09.253Z","updated_by":"blta3dd47a38c602549","url":"/iot","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-07-20T13:40:13.450Z","user":"blta3dd47a38c602549"}},{"_version":3,"locale":"en-us","uid":"blt5becbd3781fc8e16","ACL":{},"_in_progress":false,"created_at":"2021-05-29T07:24:49.312Z","created_by":"blt9a0fc67c46c47dd7","expanded_title":"App Sec","seo":{"meta_title":"Application Security","meta_description":"Application Security","meta_keywords":"","canonical_url":""},"tags":[],"title":"App Sec","topics_secondary":[{"_version":2,"locale":"en-us","uid":"blte50120ff0518141d","ACL":{},"_in_progress":false,"created_at":"2021-05-29T07:24:40.692Z","created_by":"blt9a0fc67c46c47dd7","name":"Database Security","seo":{"meta_title":"Database Security","meta_description":"Database Security","meta_keywords":"","canonical_url":""},"tags":[],"title":"[App Sec] Database Security","updated_at":"2021-07-20T13:57:36.610Z","updated_by":"blta3dd47a38c602549","url":"/database-security","_content_type_uid":"dr_topic_secondary","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-07-20T13:57:39.438Z","user":"blta3dd47a38c602549"}}],"updated_at":"2021-07-20T13:39:48.018Z","updated_by":"blta3dd47a38c602549","url":"/application-security","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-07-20T13:39:51.054Z","user":"blta3dd47a38c602549"}},{"_version":3,"locale":"en-us","uid":"blt8edc1edf78525eb9","ACL":{},"_in_progress":false,"created_at":"2021-05-29T07:25:00.989Z","created_by":"blt9a0fc67c46c47dd7","expanded_title":"The Edge","seo":{"meta_title":"The Edge","meta_description":"The Edge","meta_keywords":"","canonical_url":""},"tags":[],"title":"The Edge","topics_secondary":[],"updated_at":"2021-07-20T13:38:58.206Z","updated_by":"blta3dd47a38c602549","url":"/edge","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-07-20T13:39:02.803Z","user":"blta3dd47a38c602549"}},{"_version":3,"locale":"en-us","uid":"blt77fe1b1ed6a4cb2b","ACL":{},"_in_progress":false,"created_at":"2021-05-29T07:24:59.745Z","created_by":"blt9a0fc67c46c47dd7","expanded_title":"Analytics","seo":{"meta_title":"Security Analytics","meta_description":"Security Analytics","meta_keywords":"","canonical_url":""},"tags":[],"title":"Analytics","topics_secondary":[{"_version":2,"locale":"en-us","uid":"blta62ac100505a8b0e","ACL":{},"_in_progress":false,"created_at":"2021-05-29T07:24:38.443Z","created_by":"blt9a0fc67c46c47dd7","name":"Security Monitoring","seo":{"meta_title":"Security Monitoring","meta_description":"Security Monitoring","meta_keywords":"","canonical_url":""},"tags":[],"title":"[Analytics] Security Monitoring","updated_at":"2021-07-20T13:56:52.288Z","updated_by":"blta3dd47a38c602549","url":"/security-monitoring","_content_type_uid":"dr_topic_secondary","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-07-20T13:56:55.022Z","user":"blta3dd47a38c602549"}}],"updated_at":"2021-07-20T13:33:48.424Z","updated_by":"blta3dd47a38c602549","url":"/analytics","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-07-20T13:33:51.625Z","user":"blta3dd47a38c602549"}},{"_version":3,"locale":"en-us","uid":"bltdad7410202520cf3","ACL":{},"_in_progress":false,"created_at":"2021-05-29T07:24:56.377Z","created_by":"blt9a0fc67c46c47dd7","expanded_title":"Perimeter","seo":{"meta_title":"Network Perimeter Security","meta_description":"Network Perimeter Security","meta_keywords":"","canonical_url":""},"tags":[],"title":"Perimeter","topics_secondary":[],"updated_at":"2021-07-20T13:33:14.890Z","updated_by":"blta3dd47a38c602549","url":"/perimeter","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-07-20T13:33:17.858Z","user":"blta3dd47a38c602549"}},{"_version":3,"locale":"en-us","uid":"bltb4fa098465367813","ACL":{},"_in_progress":false,"created_at":"2021-05-29T07:24:54.324Z","created_by":"blt9a0fc67c46c47dd7","expanded_title":"Risk","seo":{"meta_title":"Risk Management","meta_description":"Risk Management","meta_keywords":"","canonical_url":""},"tags":[],"title":"Risk","topics_secondary":[{"_version":2,"locale":"en-us","uid":"bltb0f5be1fbdfcb41a","ACL":{},"_in_progress":false,"created_at":"2021-05-29T07:24:44.181Z","created_by":"blt9a0fc67c46c47dd7","name":"Compliance","seo":{"meta_title":"Compliance","meta_description":"Compliance","meta_keywords":"","canonical_url":""},"tags":[],"title":"[Risk] Compliance","updated_at":"2021-07-20T13:55:48.317Z","updated_by":"blta3dd47a38c602549","url":"/compliance","_content_type_uid":"dr_topic_secondary","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-07-20T13:55:51.514Z","user":"blta3dd47a38c602549"}}],"updated_at":"2021-07-20T13:32:29.960Z","updated_by":"blta3dd47a38c602549","url":"/risk","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-07-20T13:32:33.370Z","user":"blta3dd47a38c602549"}},{"_version":3,"locale":"en-us","uid":"bltca5b5d25e0e89c28","ACL":{},"_in_progress":false,"created_at":"2021-05-29T07:24:55.338Z","created_by":"blt9a0fc67c46c47dd7","expanded_title":"Endpoint","seo":{"meta_title":"Endpoint Security","meta_description":"Endpoint Security","meta_keywords":"","canonical_url":""},"tags":[],"title":"Endpoint","topics_secondary":[{"_version":2,"locale":"en-us","uid":"bltfe4d91925f7db0e1","ACL":{},"_in_progress":false,"created_at":"2021-05-29T07:24:39.671Z","created_by":"blt9a0fc67c46c47dd7","name":"Authentication","seo":{"meta_title":"Authentication","meta_description":"Authentication","meta_keywords":"","canonical_url":""},"tags":[],"title":"[Endpoint] Authentication","updated_at":"2021-07-20T13:54:16.648Z","updated_by":"blta3dd47a38c602549","url":"/authentication","_content_type_uid":"dr_topic_secondary","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-07-20T13:54:19.302Z","user":"blta3dd47a38c602549"}},{"_version":2,"locale":"en-us","uid":"bltbce9bffab0b743c9","ACL":{},"_in_progress":false,"created_at":"2021-05-29T07:24:42.861Z","created_by":"blt9a0fc67c46c47dd7","name":"Mobile Security","seo":{"meta_title":"Mobile Security","meta_description":"Mobile Security","meta_keywords":"","canonical_url":""},"tags":[],"title":"[Endpoint] Mobile","updated_at":"2021-07-20T13:55:17.618Z","updated_by":"blta3dd47a38c602549","url":"/mobile","_content_type_uid":"dr_topic_secondary","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-07-20T13:55:20.835Z","user":"blta3dd47a38c602549"}},{"_version":2,"locale":"en-us","uid":"bltd4b54e4cff686e47","ACL":{},"_in_progress":false,"created_at":"2021-05-29T07:24:41.940Z","created_by":"blt9a0fc67c46c47dd7","name":"Privacy","seo":{"meta_title":"Privacy","meta_description":"Privacy","meta_keywords":"","canonical_url":""},"tags":[],"title":"[Endpoint] Privacy","updated_at":"2021-07-20T13:54:46.246Z","updated_by":"blta3dd47a38c602549","url":"/privacy","_content_type_uid":"dr_topic_secondary","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-07-20T13:54:49.414Z","user":"blta3dd47a38c602549"}}],"updated_at":"2021-07-20T13:32:03.273Z","updated_by":"blta3dd47a38c602549","url":"/endpoint","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-07-20T13:32:06.396Z","user":"blta3dd47a38c602549"}},{"_version":3,"locale":"en-us","uid":"blt67964a3f25e5e5bc","ACL":{},"_in_progress":false,"created_at":"2021-05-29T07:24:53.196Z","created_by":"blt9a0fc67c46c47dd7","expanded_title":"Physical Security","seo":{"meta_title":"Physical Security","meta_description":"Physical Security","meta_keywords":"","canonical_url":""},"tags":[],"title":"Physical","topics_secondary":[],"updated_at":"2021-07-20T13:30:47.664Z","updated_by":"blta3dd47a38c602549","url":"/physical-security","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-07-20T13:30:50.834Z","user":"blta3dd47a38c602549"}},{"_version":6,"locale":"en-us","uid":"blta3feccd65c5cd514","ACL":{},"_in_progress":false,"created_at":"2021-05-29T07:24:51.151Z","created_by":"blt9a0fc67c46c47dd7","expanded_title":"Threat Intelligence","seo":{"meta_title":"Threat Intel","meta_description":"Threat Intel","meta_keywords":"","canonical_url":""},"tags":[],"title":"Threat Intel","topics_secondary":[],"updated_at":"2021-07-20T13:26:19.607Z","updated_by":"blta3dd47a38c602549","url":"/threat-intelligence","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-07-20T13:26:22.770Z","user":"blta3dd47a38c602549"}},{"_version":3,"locale":"en-us","uid":"blte0b20eea18da92ac","ACL":{},"_in_progress":false,"created_at":"2021-05-29T07:24:58.718Z","created_by":"blt9a0fc67c46c47dd7","expanded_title":"Cloud","seo":{"meta_title":"Cloud","meta_description":"Cloud","meta_keywords":"","canonical_url":""},"tags":[],"title":"Cloud","topics_secondary":[],"updated_at":"2021-07-20T12:12:46.726Z","updated_by":"blta3dd47a38c602549","url":"/cloud","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-07-20T12:12:50.045Z","user":"blta3dd47a38c602549"}},{"_version":3,"locale":"en-us","uid":"blt785557489e965a0e","ACL":{},"_in_progress":false,"created_at":"2021-05-29T07:24:57.504Z","created_by":"blt9a0fc67c46c47dd7","expanded_title":"Attacks / Breaches","seo":{"meta_title":"Attacks / Breaches","meta_description":"Attacks / Breaches","meta_keywords":"","canonical_url":""},"tags":[],"title":"Breaches","topics_secondary":[],"updated_at":"2021-07-20T12:11:31.270Z","updated_by":"blta3dd47a38c602549","url":"/attacks-breaches","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-07-20T12:11:34.853Z","user":"blta3dd47a38c602549"}},{"title":"Topic primary 1","url":"/topic-primary-1","expanded_title":"topic primary 1","topics_secondary":[{"_version":11,"locale":"en-us","uid":"blte7df9c155852d974","ACL":{},"_in_progress":false,"created_at":"2021-05-29T07:24:47.100Z","created_by":"blt9a0fc67c46c47dd7","name":"Careers \u0026 People","seo":{"meta_title":"Careers \u0026 People","meta_description":"Careers \u0026 People","meta_keywords":"","canonical_url":""},"tags":[],"title":"[Operations] Careers \u0026 People","updated_at":"2021-07-20T12:08:28.689Z","updated_by":"blt986fc66e34c7b415","url":"/careers-and-people","_content_type_uid":"dr_topic_secondary","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-07-20T12:09:57.002Z","user":"blt986fc66e34c7b415"}},{"_version":6,"locale":"en-us","uid":"bltc0595d7ad0a824f9","ACL":{},"_in_progress":false,"created_at":"2021-05-29T07:24:46.154Z","created_by":"blt9a0fc67c46c47dd7","name":"Advanced Threats","seo":{"meta_title":"Advanced Threats","meta_description":"Advanced Threats","meta_keywords":"","canonical_url":""},"tags":[],"title":"[Vulnerabilities / Threats] Advanced Threats","updated_at":"2021-07-20T13:53:43.004Z","updated_by":"blta3dd47a38c602549","url":"/advanced-threats","_content_type_uid":"dr_topic_secondary","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-07-20T13:53:45.886Z","user":"blta3dd47a38c602549"}},{"_version":2,"locale":"en-us","uid":"bltc66bc15dc564597f","ACL":{},"_in_progress":false,"created_at":"2021-05-29T07:24:45.214Z","created_by":"blt9a0fc67c46c47dd7","name":"Identity \u0026 Access Management","seo":{"meta_title":"Identity \u0026 Access Management","meta_description":"Identity \u0026 Access Management","meta_keywords":"","canonical_url":""},"tags":[],"title":"[Operations] Identity \u0026 Access Management","updated_at":"2021-07-20T13:49:05.230Z","updated_by":"blta3dd47a38c602549","url":"/identity-and-access-management","_content_type_uid":"dr_topic_secondary","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-07-20T13:49:08.073Z","user":"blta3dd47a38c602549"}},{"_version":2,"locale":"en-us","uid":"bltb0f5be1fbdfcb41a","ACL":{},"_in_progress":false,"created_at":"2021-05-29T07:24:44.181Z","created_by":"blt9a0fc67c46c47dd7","name":"Compliance","seo":{"meta_title":"Compliance","meta_description":"Compliance","meta_keywords":"","canonical_url":""},"tags":[],"title":"[Risk] Compliance","updated_at":"2021-07-20T13:55:48.317Z","updated_by":"blta3dd47a38c602549","url":"/compliance","_content_type_uid":"dr_topic_secondary","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-07-20T13:55:51.514Z","user":"blta3dd47a38c602549"}},{"_version":2,"locale":"en-us","uid":"bltbce9bffab0b743c9","ACL":{},"_in_progress":false,"created_at":"2021-05-29T07:24:42.861Z","created_by":"blt9a0fc67c46c47dd7","name":"Mobile Security","seo":{"meta_title":"Mobile Security","meta_description":"Mobile Security","meta_keywords":"","canonical_url":""},"tags":[],"title":"[Endpoint] Mobile","updated_at":"2021-07-20T13:55:17.618Z","updated_by":"blta3dd47a38c602549","url":"/mobile","_content_type_uid":"dr_topic_secondary","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-07-20T13:55:20.835Z","user":"blta3dd47a38c602549"}},{"_version":2,"locale":"en-us","uid":"bltd4b54e4cff686e47","ACL":{},"_in_progress":false,"created_at":"2021-05-29T07:24:41.940Z","created_by":"blt9a0fc67c46c47dd7","name":"Privacy","seo":{"meta_title":"Privacy","meta_description":"Privacy","meta_keywords":"","canonical_url":""},"tags":[],"title":"[Endpoint] Privacy","updated_at":"2021-07-20T13:54:46.246Z","updated_by":"blta3dd47a38c602549","url":"/privacy","_content_type_uid":"dr_topic_secondary","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-07-20T13:54:49.414Z","user":"blta3dd47a38c602549"}}],"seo":{"meta_title":"","meta_description":"","meta_keywords":"","canonical_url":""},"tags":[],"locale":"en-us","uid":"blt7b335051f439bf6d","created_by":"blt986fc66e34c7b415","updated_by":"blt986fc66e34c7b415","created_at":"2021-07-13T09:41:01.186Z","updated_at":"2021-07-13T09:41:01.186Z","ACL":{},"_version":1,"_in_progress":false,"publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-07-14T09:45:45.870Z","user":"blt8d6e4671551ab970"},"_owner":{"uid":"blt986fc66e34c7b415","created_at":"2021-05-21T10:05:50.073Z","updated_at":"2022-04-03T13:19:15.969Z","email":"thao.pham@xpondigital.com","username":"thao_blt340f44d8","first_name":"Thao","last_name":"Pham","org_uid":[],"shared_org_uid":["blt5948195ac13977b0"],"mobile_number":"932225058","country_code":"84","tfa_status":"verified","authy_id":"378405624","active":true,"profile_type":"developer","failed_attempts":0,"settings":{"preferences":{"global":[],"stack":[]}},"last_login_at":"Sun Apr 03 2022 13:19:15 GMT+0000 (Coordinated Universal Time)"}}],"categories":[{"_version":16,"locale":"en-us","uid":"blt0db4b40b15bb3ca2","ACL":{},"_in_progress":false,"branding":{"image_alt_text":"Dark Reading Technology Logo","hub_page_color":"000000","hub_page_description_with_hyperlink":"\u003cp\u003eTech News and Analysis\u003c/p\u003e","hub_page_logo":{"parent_uid":"blt966fbf792d032939","uid":"blte2d0d4f2e812b871","created_by":"blta3dd47a38c602549","updated_by":"blta3dd47a38c602549","created_at":"2021-09-30T08:22:01.619Z","updated_at":"2021-09-30T08:22:01.619Z","content_type":"image/png","file_size":"8009","filename":"DR_Technology_Logo_White.png","title":"DR_Technology_Logo_White.png","ACL":[],"_version":1,"is_dir":false,"tags":[],"publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-10-01T12:34:45.120Z","user":"blta3dd47a38c602549"},"url":"https://eu-images.contentstack.com/v3/assets/blt66983808af36a8ef/blte2d0d4f2e812b871/615573a972a0487ccb343d41/DR_Technology_Logo_White.png"}},"created_at":"2021-09-10T17:46:13.387Z","created_by":"blta3dd47a38c602549","display_options":"Modular View","icon":null,"image_alt_text":"Darktrace is the sponsor for Dark Reading Technology.","modules":{"module_blocks":[{"uid":"blt2bf72304a6aba7a2","_content_type_uid":"dr_featured_content"},{"uid":"blt81cfb8f03ba8dbbd","_content_type_uid":"dr_module_article_promo"},{"uid":"blt60343bf2d91f1598","_content_type_uid":"dr_module_article_promo"},{"uid":"bltb2833b9c1bc25adc","_content_type_uid":"dr_module_latest_content"}]},"over_the_edge":[],"secondary_categories":[{"title":"[DR-TECH] The Cyber Future","secondary_category_name":"The Cyber Future","slug":"the-cyber-future","shown_in_header":true,"branding":{"hub_page_logo":null,"image_alt_text":"","hub_page_description":"","hub_page_color":""},"sponsor_text":"","sponsor_logo":null,"image_alt_text":"","over_the_edge":[],"display_options":"Standard View","modules":{"module_blocks":[]},"seo":{"meta_title":"","meta_description":"","meta_keywords":"","canonical_url":""},"icon":null,"topic_page_description":"","tags":[],"locale":"en-us","uid":"bltc11ff98f98398512","created_by":"blta3dd47a38c602549","updated_by":"blta3dd47a38c602549","created_at":"2021-09-10T17:49:59.274Z","updated_at":"2021-09-10T17:49:59.274Z","_content_type_uid":"dr_category_secondary","ACL":{},"_version":1,"_in_progress":false,"publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-10-01T12:34:45.095Z","user":"blta3dd47a38c602549"}},{"_version":1,"locale":"en-us","uid":"bltb60f3c528a3177f8","ACL":{},"_in_progress":false,"branding":{"hub_page_logo":null,"image_alt_text":"","hub_page_description":"","hub_page_color":""},"created_at":"2021-09-10T17:49:23.472Z","created_by":"blta3dd47a38c602549","display_options":"Standard View","icon":null,"image_alt_text":"","modules":{"module_blocks":[]},"over_the_edge":[],"secondary_category_name":"Emerging Tech","seo":{"meta_title":"","meta_description":"","meta_keywords":"","canonical_url":""},"shown_in_header":true,"slug":"emerging-tech","sponsor_logo":null,"sponsor_text":"","tags":[],"title":"[DR-TECH] Emerging Tech","topic_page_description":"","updated_at":"2021-09-10T17:49:23.472Z","updated_by":"blta3dd47a38c602549","_content_type_uid":"dr_category_secondary","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-10-01T14:12:01.048Z","user":"blta3dd47a38c602549"}},{"title":"[DR-TECH] Tech Talks","secondary_category_name":"Tech Talks","slug":"tech-talks","shown_in_header":true,"branding":{"hub_page_logo":null,"image_alt_text":"","hub_page_description":"","hub_page_color":""},"sponsor_text":"","sponsor_logo":null,"image_alt_text":"","over_the_edge":[],"display_options":"Standard View","modules":{"module_blocks":[]},"seo":{"meta_title":"","meta_description":"","meta_keywords":"","canonical_url":""},"icon":null,"topic_page_description":"","tags":[],"locale":"en-us","uid":"bltb9fce7117e1d3083","created_by":"blta3dd47a38c602549","updated_by":"blta3dd47a38c602549","created_at":"2021-09-10T17:48:56.310Z","updated_at":"2021-09-10T17:48:56.310Z","_content_type_uid":"dr_category_secondary","ACL":{},"_version":1,"_in_progress":false,"publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-10-01T12:34:45.102Z","user":"blta3dd47a38c602549"}},{"title":"[DR-TECH] Tech Trends","secondary_category_name":"Tech Trends","slug":"tech-trends","shown_in_header":true,"branding":{"hub_page_logo":null,"image_alt_text":"","hub_page_description":"","hub_page_color":""},"sponsor_text":"","sponsor_logo":null,"image_alt_text":"","over_the_edge":[],"display_options":"Standard View","modules":{"module_blocks":[]},"seo":{"meta_title":"","meta_description":"","meta_keywords":"","canonical_url":""},"icon":null,"topic_page_description":"","tags":[],"locale":"en-us","uid":"blt54beaadb3c555193","created_by":"blta3dd47a38c602549","updated_by":"blta3dd47a38c602549","created_at":"2021-09-10T17:48:10.159Z","updated_at":"2021-09-10T17:48:10.159Z","_content_type_uid":"dr_category_secondary","ACL":{},"_version":1,"_in_progress":false,"publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-10-01T12:34:45.114Z","user":"blta3dd47a38c602549"}}],"seo":{"meta_title":"","meta_description":"Cybersecurity technology and product news, analysis, expert commentary, and in-depth feature articles.","meta_keywords":"","canonical_url":""},"slug":"dr-tech","sponsor_logo":{"_version":1,"is_dir":false,"uid":"blt482910e3b2c34b48","ACL":{},"content_type":"image/png","created_at":"2022-05-16T18:24:05.263Z","created_by":"blt7639e1b0bae9533a","file_size":"730844","filename":"Dark_Logo.png","parent_uid":null,"tags":[],"title":"Dark_Logo.png","updated_at":"2022-05-16T18:24:05.263Z","updated_by":"blt7639e1b0bae9533a","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2022-05-16T18:28:09.689Z","user":"blt7639e1b0bae9533a"},"url":"https://eu-images.contentstack.com/v3/assets/blt66983808af36a8ef/blt482910e3b2c34b48/628296c5842aa97d937eed52/Dark_Logo.png"},"sponsor_text":"Brought to you by:","tags":[],"title":"DR Tech","topic_page_description":"Cybersecurity technology and product news, analysis, expert commentary, and in-depth feature articles.","updated_at":"2022-05-16T18:24:30.654Z","updated_by":"blt7639e1b0bae9533a","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2022-05-16T18:28:09.704Z","user":"blt7639e1b0bae9533a"},"_owner":{"uid":"blta3dd47a38c602549","created_at":"2021-05-21T10:05:50.070Z","updated_at":"2022-05-11T12:03:32.759Z","email":"john.ely@informa.com","username":"john_blt665706a5","first_name":"John","last_name":"Ely","org_uid":[],"shared_org_uid":["blt5948195ac13977b0"],"mobile_number":"07877953454","country_code":"44","tfa_status":"verified","authy_id":"378049479","active":true,"profile_type":"business","failed_attempts":0,"settings":{"preferences":{"global":[],"stack":[]}},"last_login_at":"Wed May 11 2022 12:03:32 GMT+0000 (Coordinated Universal Time)"}},{"_version":6,"locale":"en-us","uid":"blta6cab0108fb2fe2d","ACL":{},"_in_progress":false,"branding":{"hub_page_color":"000000","hub_page_description_with_hyperlink":"","hub_page_logo":null,"image_alt_text":""},"created_at":"2021-05-29T07:25:21.501Z","created_by":"blt9a0fc67c46c47dd7","display_options":"Standard View","icon":null,"image_alt_text":"","modules":{"module_blocks":[]},"over_the_edge":[],"secondary_categories":[{"_version":2,"locale":"en-us","uid":"blt3a07a5f6f122df83","ACL":{},"_in_progress":false,"branding":{"hub_page_color":"","hub_page_description":"","hub_page_logo":null},"created_at":"2021-05-29T07:25:45.829Z","created_by":"blt9a0fc67c46c47dd7","display_options":"Standard View","icon":null,"modules":{"module_blocks":[]},"over_the_edge":[],"secondary_category_name":"Advanced Threats","seo":{"canonical_url":"","meta_description":"Advanced Threats","meta_keywords":"","meta_title":"Advanced Threats"},"shown_in_header":true,"slug":"advanced-threats","sponsor_logo":null,"sponsor_text":"","tags":[],"title":"[Vulnerabilities/Threats] Advanced Threats","topic_page_description":"","updated_at":"2021-07-16T11:10:36.838Z","updated_by":"blta3dd47a38c602549","_content_type_uid":"dr_category_secondary","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-07-20T11:43:56.836Z","user":"blta3dd47a38c602549"}},{"_version":2,"locale":"en-us","uid":"blt2e8d75e7e5494295","ACL":{},"_in_progress":false,"branding":{"hub_page_color":"","hub_page_description":"","hub_page_logo":null},"created_at":"2021-05-29T07:25:44.920Z","created_by":"blt9a0fc67c46c47dd7","display_options":"Standard View","icon":null,"modules":{"module_blocks":[]},"over_the_edge":[],"secondary_category_name":"Insider Threats","seo":{"canonical_url":"","meta_description":"Insider Threats","meta_keywords":"","meta_title":"Insider Threats"},"shown_in_header":true,"slug":"insider-threats","sponsor_logo":null,"sponsor_text":"","tags":[],"title":"[Vulnerabilities/Threats] Insider Threats","topic_page_description":"","updated_at":"2021-07-16T11:07:19.341Z","updated_by":"blta3dd47a38c602549","_content_type_uid":"dr_category_secondary","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-07-20T11:43:31.039Z","user":"blta3dd47a38c602549"}},{"_version":3,"locale":"en-us","uid":"blteb326d2311783787","ACL":{},"_in_progress":false,"branding":{"hub_page_color":"","hub_page_description":"","hub_page_logo":null},"created_at":"2021-05-29T07:25:47.773Z","created_by":"blt9a0fc67c46c47dd7","display_options":"Standard View","icon":null,"modules":{"module_blocks":[]},"over_the_edge":[],"secondary_category_name":"Vulnerability Management","seo":{"canonical_url":"","meta_description":"Vulnerability Management","meta_keywords":"","meta_title":"Vulnerability Management"},"shown_in_header":true,"slug":"vulnerability-management","sponsor_logo":null,"sponsor_text":"","tags":[],"title":"{Vulnerabilities/Threats] Vulnerability Management","topic_page_description":"","updated_at":"2021-07-20T08:20:16.855Z","updated_by":"blt986fc66e34c7b415","_content_type_uid":"dr_category_secondary","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-07-20T11:42:56.421Z","user":"blta3dd47a38c602549"}}],"seo":{"canonical_url":"","meta_description":"Breaking news, analysis, and expert commentary on software \u0026 hardware vulnerabilities and cyber threats, and the tools, tech, and practices for addressing them","meta_keywords":"","meta_title":"Vulnerabilities / Threats"},"slug":"vulnerabilities-threats","sponsor_logo":null,"sponsor_text":"","tags":[],"title":"Vulnerabilities/Threats","topic_page_description":"Breaking news, news analysis, and expert commentary on cybersecurity threat intelligence, including tools \u0026 technologies. ","updated_at":"2022-02-28T13:38:26.594Z","updated_by":"bltfcb3d125bf8c49ee","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2022-02-28T13:38:32.017Z","user":"bltfcb3d125bf8c49ee"}},{"_version":4,"locale":"en-us","uid":"bltdeb10b926a7ccf5c","ACL":{},"_in_progress":false,"branding":{"hub_page_color":"000000","hub_page_description_with_hyperlink":"","hub_page_logo":null,"image_alt_text":""},"created_at":"2021-05-29T07:25:17.673Z","created_by":"blt9a0fc67c46c47dd7","display_options":"Standard View","icon":null,"image_alt_text":"","modules":{"module_blocks":[]},"over_the_edge":[],"secondary_categories":[],"seo":{"canonical_url":"","meta_description":"Breaking news, news analysis, and expert commentary on cybersecurity threat intelligence, including tools \u0026 technologies","meta_keywords":"","meta_title":"Threat Intelligence"},"slug":"threat-intelligence","sponsor_logo":null,"sponsor_text":"","tags":[],"title":"Threat Intelligence","topic_page_description":"Breaking news, news analysis, and expert commentary on cybersecurity threat intelligence, including tools \u0026 technologies.","updated_at":"2022-02-28T13:36:02.565Z","updated_by":"bltfcb3d125bf8c49ee","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2022-02-28T13:36:07.579Z","user":"bltfcb3d125bf8c49ee"}},{"_version":2,"locale":"en-us","uid":"blt000a3e5dc1d51c08","ACL":{},"_in_progress":false,"branding":{"hub_page_color":"","hub_page_description_with_hyperlink":"","hub_page_logo":null,"image_alt_text":""},"created_at":"2021-06-16T21:13:39.947Z","created_by":"blt9488f204761710b3","display_options":"Standard View","icon":null,"image_alt_text":"","modules":{"module_blocks":[]},"over_the_edge":[],"secondary_categories":[],"seo":{"canonical_url":"","meta_description":"Archive of cybersecurity news articles, expert commentary, and detailed analysis published by the former Security Now website, now part of Dark Reading.","meta_keywords":"","meta_title":""},"slug":"security-now","sponsor_logo":null,"sponsor_text":"","tags":[],"title":"Security Now","topic_page_description":"In 2020, Security Now became part of Dark Reading. This page contains an archive of cybersecurity news articles, detailed analysis, and expert commentary published by Security Now. ","updated_at":"2022-02-28T13:34:44.576Z","updated_by":"bltfcb3d125bf8c49ee","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2022-02-28T13:34:49.315Z","user":"bltfcb3d125bf8c49ee"},"_owner":{"uid":"blt9488f204761710b3","created_at":"2021-05-21T10:05:50.071Z","updated_at":"2022-05-03T14:00:56.191Z","email":"roma.nowak@informa.com","username":"roma_blt4d352a9b","first_name":"roma","last_name":"nowak","org_uid":[],"shared_org_uid":["blt5948195ac13977b0"],"mobile_number":"5167901481","country_code":"1","tfa_status":"verified","authy_id":"375656345","active":true,"profile_type":"business","failed_attempts":0,"settings":{"global":[{"key":"favorite_stacks","value":[{"org_uid":"blt5948195ac13977b0","stacks":[{"api_key":"bltbbbdd615c0ee9096"},{"api_key":"blt95b381df7c12c15d"},{"api_key":"blt66983808af36a8ef"}]}]}]},"last_login_at":"Tue May 03 2022 14:00:56 GMT+0000 (Coordinated Universal Time)"}},{"_version":4,"locale":"en-us","uid":"blt7095e7265cf0f380","ACL":{},"_in_progress":false,"branding":{"hub_page_color":"000000","hub_page_description_with_hyperlink":"","hub_page_logo":null,"image_alt_text":""},"created_at":"2021-05-29T07:25:22.491Z","created_by":"blt9a0fc67c46c47dd7","display_options":"Standard View","icon":null,"image_alt_text":"","modules":{"module_blocks":[]},"over_the_edge":[],"secondary_categories":[{"_version":2,"locale":"en-us","uid":"blt9d07d0a4c0d8cb54","ACL":{},"_in_progress":false,"branding":{"hub_page_color":"","hub_page_description":"","hub_page_logo":null},"created_at":"2021-05-29T07:25:43.070Z","created_by":"blt9a0fc67c46c47dd7","display_options":"Standard View","icon":null,"modules":{"module_blocks":[]},"over_the_edge":[],"secondary_category_name":"Compliance","seo":{"canonical_url":"","meta_description":"Compliance","meta_keywords":"","meta_title":"Compliance"},"shown_in_header":true,"slug":"compliance","sponsor_logo":null,"sponsor_text":"","tags":[],"title":"[Risk] Compliance","topic_page_description":"","updated_at":"2021-07-16T11:20:24.692Z","updated_by":"blta3dd47a38c602549","_content_type_uid":"dr_category_secondary","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-07-20T11:46:22.899Z","user":"blta3dd47a38c602549"}}],"seo":{"canonical_url":"","meta_description":"Breaking news, news analysis, and expert commentary on cybersecurity risk, and the tools, technologies, and practices for assessing risk","meta_keywords":"","meta_title":"Risk"},"slug":"risk","sponsor_logo":null,"sponsor_text":"","tags":[],"title":"Risk","topic_page_description":"Breaking news, news analysis, and expert commentary on cybersecurity risk, and the tools, technologies, and practices for assessing risk.","updated_at":"2022-02-28T13:33:37.389Z","updated_by":"bltfcb3d125bf8c49ee","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2022-02-28T13:33:43.718Z","user":"bltfcb3d125bf8c49ee"}},{"_version":4,"locale":"en-us","uid":"bltaebee183784263bf","ACL":{},"_in_progress":false,"branding":{"hub_page_color":"000000","hub_page_description_with_hyperlink":"","hub_page_logo":null,"image_alt_text":""},"created_at":"2021-05-29T07:25:18.693Z","created_by":"blt9a0fc67c46c47dd7","display_options":"Standard View","icon":null,"image_alt_text":"","modules":{"module_blocks":[]},"over_the_edge":[],"secondary_categories":[],"seo":{"canonical_url":"","meta_description":"Breaking news, news analysis, and expert commentary on the intersection of cybersecurity and physical security","meta_keywords":"","meta_title":"Physical Security"},"slug":"physical-security","sponsor_logo":null,"sponsor_text":"","tags":[],"title":"Physical Security","topic_page_description":"Breaking news, news analysis, and expert commentary on the intersection of cybersecurity and physical security.","updated_at":"2022-02-28T13:31:50.971Z","updated_by":"bltfcb3d125bf8c49ee","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2022-02-28T13:32:02.329Z","user":"bltfcb3d125bf8c49ee"}},{"_version":5,"locale":"en-us","uid":"blta96d37f2f5d942cf","ACL":{},"_in_progress":false,"branding":{"hub_page_color":"000000","hub_page_description_with_hyperlink":"","hub_page_logo":null,"image_alt_text":""},"created_at":"2021-05-29T07:25:15.618Z","created_by":"blt9a0fc67c46c47dd7","display_options":"Standard View","icon":null,"image_alt_text":"","modules":{"module_blocks":[]},"over_the_edge":[],"secondary_categories":[],"seo":{"canonical_url":"","meta_description":"Breaking news, news analysis, and expert commentary on threats to the network perimeter, and the tools \u0026 technologies for securing it","meta_keywords":"","meta_title":"Perimeter"},"slug":"perimeter","sponsor_logo":null,"sponsor_text":"","tags":[],"title":"Perimeter","topic_page_description":"Breaking news, news analysis, and expert commentary on threats to the network perimeter, and the tools \u0026 technologies for securing it.","updated_at":"2022-02-28T13:17:18.892Z","updated_by":"bltfcb3d125bf8c49ee","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2022-02-28T13:29:22.075Z","user":"bltfcb3d125bf8c49ee"}},{"_version":4,"locale":"en-us","uid":"blt072b989d237a00d2","ACL":{},"_in_progress":false,"branding":{"hub_page_color":"000000","hub_page_description_with_hyperlink":"","hub_page_logo":null,"image_alt_text":""},"created_at":"2021-05-29T07:25:19.615Z","created_by":"blt9a0fc67c46c47dd7","display_options":"Standard View","icon":null,"image_alt_text":"","modules":{"module_blocks":[]},"over_the_edge":[],"secondary_categories":[{"_version":4,"locale":"en-us","uid":"blt1922da536f26f75a","ACL":{},"_in_progress":false,"branding":{"hub_page_color":"","hub_page_description":"","hub_page_logo":null},"created_at":"2021-05-29T07:25:46.834Z","created_by":"blt9a0fc67c46c47dd7","display_options":"Standard View","icon":null,"modules":{"module_blocks":[]},"over_the_edge":[],"secondary_category_name":"Identity \u0026 Access Management","seo":{"canonical_url":"","meta_description":"Identity \u0026 Access Management","meta_keywords":"","meta_title":"Identity \u0026 Access Management"},"shown_in_header":true,"slug":"identity-and-access-management","sponsor_logo":null,"sponsor_text":"","tags":[],"title":"[Operations] Identity \u0026 Access Management","topic_page_description":"","updated_at":"2021-07-20T12:02:06.708Z","updated_by":"blt986fc66e34c7b415","_content_type_uid":"dr_category_secondary","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-07-20T12:09:06.252Z","user":"blt986fc66e34c7b415"}}],"seo":{"canonical_url":"","meta_description":"Breaking news, news analysis, and expert commentary on cybersecurity operations, and the tools \u0026 technologies for security teams","meta_keywords":"","meta_title":"Operations"},"slug":"operations","sponsor_logo":null,"sponsor_text":"","tags":[],"title":"Operations","topic_page_description":"Breaking news, news analysis, and expert commentary on cybersecurity operations, and the tools \u0026 technologies for security teams.","updated_at":"2022-02-28T13:16:25.930Z","updated_by":"bltfcb3d125bf8c49ee","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2022-02-28T13:16:33.681Z","user":"bltfcb3d125bf8c49ee"}},{"_version":155,"locale":"en-us","uid":"blt7a29bd8a29d3130b","ACL":{},"_in_progress":false,"branding":{"hub_page_color":"000000","image_alt_text":"Edge Logo","hub_page_description_with_hyperlink":"\u003cp\u003eCybersecurity In-Depth\u003c/p\u003e","hub_page_logo":{"parent_uid":"blt966fbf792d032939","uid":"blt482d47e4fd046239","created_by":"blta3dd47a38c602549","updated_by":"blta3dd47a38c602549","created_at":"2021-10-08T14:20:30.584Z","updated_at":"2021-10-08T14:20:30.584Z","content_type":"image/png","file_size":"4884","filename":"TheEdge-Logo-0.png","title":"TheEdge-Logo-0.png","ACL":[],"_version":1,"is_dir":false,"tags":[],"publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-10-08T14:21:25.169Z","user":"blta3dd47a38c602549"},"url":"https://eu-images.contentstack.com/v3/assets/blt66983808af36a8ef/blt482d47e4fd046239/616053ae5cf2461e097404d8/TheEdge-Logo-0.png"}},"created_at":"2021-05-29T07:25:25.978Z","created_by":"blt9a0fc67c46c47dd7","display_options":"Modular View","icon":null,"image_alt_text":"","modules":{"module_blocks":[{"uid":"blt0a4a76389ec40ec6","_content_type_uid":"dr_featured_content"},{"uid":"blt2a13fe94a98405cd","_content_type_uid":"dr_module_article_promo"},{"uid":"bltefdbbe29deef8414","_content_type_uid":"dr_module_article_promo"},{"uid":"blt801b94c10208828e","_content_type_uid":"dr_module_latest_content"}]},"over_the_edge":[],"secondary_categories":[{"_content_type_uid":"dr_category_secondary","_version":40,"locale":"en-us","uid":"bltb7711dfcd24f1fc0","ACL":{},"_in_progress":false,"branding":{"hub_page_color":"000000","hub_page_logo":{"_version":1,"is_dir":false,"uid":"blt2bc2d9dd689b0def","ACL":{},"content_type":"image/png","created_at":"2021-06-07T21:43:29.490Z","created_by":"bltfcb3d125bf8c49ee","file_size":"4813","filename":"TheEdge-Logo.png","tags":[],"title":"TheEdge-Logo.png","updated_at":"2021-06-07T21:43:29.490Z","updated_by":"bltfcb3d125bf8c49ee","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-07-15T11:49:43.071Z","user":"blt986fc66e34c7b415"},"url":"https://eu-images.contentstack.com/v3/assets/blt66983808af36a8ef/blt2bc2d9dd689b0def/60be930173c30c216ca2a004/TheEdge-Logo.png"},"image_alt_text":"","hub_page_description_with_hyperlink":""},"created_at":"2021-05-29T07:25:49.625Z","created_by":"blt9a0fc67c46c47dd7","display_options":"Standard View","icon":{"uid":"bltf050bd5685cd6a94","created_by":"blt6fb043d513578596","updated_by":"blt6fb043d513578596","created_at":"2021-07-06T15:53:38.409Z","updated_at":"2021-07-06T15:53:38.409Z","content_type":"image/svg+xml","file_size":"3222","filename":"edge-article-icon.svg","title":"edge-article-icon.svg","ACL":[],"_version":1,"is_dir":false,"tags":[],"publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-07-15T11:54:17.246Z","user":"blt986fc66e34c7b415"},"url":"https://eu-images.contentstack.com/v3/assets/blt66983808af36a8ef/bltf050bd5685cd6a94/60e47c8244e9812aec444767/edge-article-icon.svg"},"image_alt_text":"","modules":{"module_blocks":[]},"over_the_edge":[],"secondary_category_name":"Edge Articles","seo":{"canonical_url":"","meta_description":"In-Depth feature articles, analysis, and commentary on cybersecurity trends and best practices.","meta_keywords":"","meta_title":"Edge Articles"},"shown_in_header":true,"slug":"edge-articles","sponsor_logo":null,"sponsor_text":"Brought to you by","tags":[],"title":"[Edge] Edge Articles","topic_page_description":"In-Depth feature articles, analysis, and commentary on cybersecurity trends and best practices.","updated_at":"2022-03-23T20:45:39.501Z","updated_by":"bltfcb3d125bf8c49ee","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2022-03-23T20:45:50.888Z","user":"bltfcb3d125bf8c49ee"}},{"_version":38,"locale":"en-us","uid":"blt3a5a059746d0ef60","ACL":{},"_in_progress":false,"branding":{"hub_page_color":"","hub_page_description":"","hub_page_logo":null},"created_at":"2021-05-29T07:25:48.749Z","created_by":"blt9a0fc67c46c47dd7","display_options":"Standard View","icon":null,"modules":{"module_blocks":[{"uid":"blt0a4a76389ec40ec6","_content_type_uid":"dr_featured_content"},{"uid":"bltefdbbe29deef8414","_content_type_uid":"dr_module_article_promo"},{"uid":"blt2a13fe94a98405cd","_content_type_uid":"dr_module_article_promo"},{"uid":"blt801b94c10208828e","_content_type_uid":"dr_module_latest_content"}]},"over_the_edge":[],"secondary_category_name":"Edge Ask the Experts","seo":{"canonical_url":"","meta_description":"A forum for cybersecurity professionals to ask questions and get answers about IT security threats and best practices.","meta_keywords":"","meta_title":"Edge Ask the Experts"},"shown_in_header":true,"slug":"edge-ask-the-experts","sponsor_logo":null,"sponsor_text":"","tags":[],"title":"[Edge] Edge Ask the Experts","topic_page_description":"A forum for cybersecurity professionals to ask questions and get answers about IT security threats and best practices.","updated_at":"2021-07-21T02:55:50.043Z","updated_by":"blt986fc66e34c7b415","_content_type_uid":"dr_category_secondary","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-07-21T02:55:54.234Z","user":"blt986fc66e34c7b415"}},{"_version":12,"locale":"en-us","uid":"blt224b0dfefd4bcafa","ACL":{},"_in_progress":false,"branding":{"hub_page_color":"000000","hub_page_logo":{"_version":1,"is_dir":false,"uid":"blt2bc2d9dd689b0def","ACL":{},"content_type":"image/png","created_at":"2021-06-07T21:43:29.490Z","created_by":"bltfcb3d125bf8c49ee","file_size":"4813","filename":"TheEdge-Logo.png","tags":[],"title":"TheEdge-Logo.png","updated_at":"2021-06-07T21:43:29.490Z","updated_by":"bltfcb3d125bf8c49ee","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-07-15T11:49:43.071Z","user":"blt986fc66e34c7b415"},"url":"https://eu-images.contentstack.com/v3/assets/blt66983808af36a8ef/blt2bc2d9dd689b0def/60be930173c30c216ca2a004/TheEdge-Logo.png"},"image_alt_text":"","hub_page_description_with_hyperlink":""},"created_at":"2021-05-29T07:25:38.968Z","created_by":"blt9a0fc67c46c47dd7","display_options":"Standard View","icon":null,"image_alt_text":"","modules":{"module_blocks":[]},"over_the_edge":[],"secondary_category_name":"Edge Slideshows","seo":{"canonical_url":"","meta_description":"Images, illustrations, and graphics describing emerging cybersecurity threats and best practices.","meta_keywords":"","meta_title":"Edge Slideshows | Dark Reading"},"shown_in_header":true,"slug":"edge-slideshows","sponsor_logo":null,"sponsor_text":"Brought to you by","tags":[],"title":"[Edge] Edge Slideshows","topic_page_description":"Images, illustrations, and graphics describing emerging cybersecurity threats and best practices.","updated_at":"2022-03-24T17:23:46.177Z","updated_by":"blt9488f204761710b3","_content_type_uid":"dr_category_secondary","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2022-03-24T17:23:56.621Z","user":"blt9488f204761710b3"}},{"_version":16,"locale":"en-us","uid":"bltcda9b1fc00b570f2","ACL":{},"_in_progress":false,"branding":{"hub_page_color":"000000","hub_page_logo":null,"hub_page_description_with_hyperlink":"","image_alt_text":""},"created_at":"2021-05-29T07:25:51.768Z","created_by":"blt9a0fc67c46c47dd7","display_options":"Standard View","icon":null,"image_alt_text":"","modules":{"module_blocks":[]},"over_the_edge":[],"secondary_category_name":"Edge Threat Monitor","seo":{"canonical_url":"","meta_description":"Graphic data and analysis of emerging cybersecurity attacks, threats, and trends.","meta_keywords":"","meta_title":"Edge Threat Monitor"},"shown_in_header":true,"slug":"edge-threat-monitor","sponsor_logo":null,"sponsor_text":"Brought to you by","tags":[],"title":"[Edge] Edge Threat Monitor","topic_page_description":"Graphic data and analysis of emerging cybersecurity attacks, threats, and trends.","updated_at":"2022-03-24T17:19:59.274Z","updated_by":"blt9488f204761710b3","_content_type_uid":"dr_category_secondary","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2022-03-24T17:20:08.918Z","user":"blt9488f204761710b3"}}],"seo":{"canonical_url":"","meta_description":"In-Depth feature articles, analysis, and expert expert commentary on cybersecurity trends and best practices","meta_keywords":"","meta_title":"Edge"},"slug":"edge","sponsor_logo":null,"sponsor_text":"","tags":[],"title":"Edge","topic_page_description":"In-Depth feature articles, analysis, and expert commentary on cybersecurity trends and best practices.","updated_at":"2022-02-25T15:46:20.858Z","updated_by":"blt31bd4bcd14669cc0","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2022-02-25T15:46:31.216Z","user":"blt31bd4bcd14669cc0"}},{"_version":9,"locale":"en-us","uid":"blt318dca99b92ea6b7","ACL":{},"_in_progress":false,"branding":{"hub_page_color":"000000","hub_page_description_with_hyperlink":"","hub_page_logo":null,"image_alt_text":""},"created_at":"2021-05-29T07:25:13.674Z","created_by":"blt9a0fc67c46c47dd7","display_options":"Standard View","icon":null,"image_alt_text":"","modules":{"module_blocks":[]},"over_the_edge":[],"secondary_categories":[],"seo":{"canonical_url":"","meta_description":"Breaking news, news analysis, and expert commentary on cybersecurity threats to the cloud as well as coverage of cloud security tools \u0026 technologiesBreaking new","meta_keywords":"","meta_title":"Cloud"},"slug":"cloud","sponsor_logo":null,"sponsor_text":"","tags":[],"title":"Cloud","topic_page_description":"Breaking news, news analysis, and expert commentary on cybersecurity threats to the cloud as well as security tools \u0026 technologies to protect it.","updated_at":"2022-02-25T15:40:37.460Z","updated_by":"blt31bd4bcd14669cc0","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2022-02-25T15:40:48.099Z","user":"blt31bd4bcd14669cc0"}},{"_version":6,"locale":"en-us","uid":"blta1a9507fc4e576e5","ACL":{},"_in_progress":false,"branding":{"hub_page_color":"000000","hub_page_description_with_hyperlink":"","hub_page_logo":null,"image_alt_text":""},"created_at":"2021-05-29T07:25:14.614Z","created_by":"blt9a0fc67c46c47dd7","display_options":"Standard View","icon":null,"image_alt_text":"","modules":{"module_blocks":[]},"over_the_edge":[],"secondary_categories":[],"seo":{"canonical_url":"","meta_description":"Breaking news, news analysis, and expert commentary on cyberattacks and data breaches, as well as tools, technologies, and practices for threat defense","meta_keywords":"","meta_title":"Attacks / Breaches"},"slug":"attacks-breaches","sponsor_logo":null,"sponsor_text":"","tags":[],"title":"Attacks/Breaches","topic_page_description":"Breaking news, news analysis, and expert commentary on cyberattacks and data breaches, as well as the tools, technologies, and practices for defense.","updated_at":"2022-02-25T15:33:04.411Z","updated_by":"bltfcb3d125bf8c49ee","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2022-02-25T15:33:11.389Z","user":"bltfcb3d125bf8c49ee"}},{"_version":4,"locale":"en-us","uid":"bltf294cb1507e8f8f0","ACL":{},"_in_progress":false,"branding":{"hub_page_color":"000000","hub_page_description_with_hyperlink":"","hub_page_logo":null,"image_alt_text":""},"created_at":"2021-05-29T07:25:23.818Z","created_by":"blt9a0fc67c46c47dd7","display_options":"Standard View","icon":null,"image_alt_text":"","modules":{"module_blocks":[]},"over_the_edge":[],"secondary_categories":[],"seo":{"canonical_url":"","meta_description":"Breaking news, news analysis, and expert commentary on cyber threats to mobile devices and the tools \u0026 technologies to protect them.","meta_keywords":"","meta_title":"Mobile"},"slug":"mobile","sponsor_logo":null,"sponsor_text":"","tags":[],"title":"Mobile","topic_page_description":"Breaking news, news analysis, and expert commentary on cyber threats to mobile devices and the tools \u0026 technologies to protect them.","updated_at":"2022-02-23T16:40:39.389Z","updated_by":"bltfcb3d125bf8c49ee","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2022-02-23T16:40:47.486Z","user":"bltfcb3d125bf8c49ee"}},{"_version":23,"locale":"en-us","uid":"blt2ad9c5595f143d37","ACL":{},"_in_progress":false,"branding":{"hub_page_color":"000000","hub_page_description_with_hyperlink":"","hub_page_logo":null,"image_alt_text":""},"created_at":"2021-05-29T07:25:16.736Z","created_by":"blt9a0fc67c46c47dd7","display_options":"Standard View","icon":null,"image_alt_text":"","modules":{"module_blocks":[]},"over_the_edge":[],"secondary_categories":[],"seo":{"canonical_url":"","meta_description":"Breaking news, news analysis, and expert commentary on cybersecurity threats to Internet of Things (IoT) devices, and the tools \u0026 technologies to protect them","meta_keywords":"","meta_title":"IoT"},"slug":"iot","sponsor_logo":null,"sponsor_text":"","tags":[],"title":"IoT","topic_page_description":"Breaking news, news analysis, and expert commentary on cyber threats to Internet of Things (IoT) devices and the tools \u0026 technologies to protect them.","updated_at":"2022-02-23T16:38:34.620Z","updated_by":"bltfcb3d125bf8c49ee","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2022-02-23T16:38:40.328Z","user":"bltfcb3d125bf8c49ee"}},{"_version":4,"locale":"en-us","uid":"blt88fe329e8d35e99f","ACL":{},"_in_progress":false,"branding":{"hub_page_color":"000000","hub_page_description_with_hyperlink":"","hub_page_logo":null,"image_alt_text":""},"created_at":"2021-05-29T07:25:20.552Z","created_by":"blt9a0fc67c46c47dd7","display_options":"Standard View","icon":null,"image_alt_text":"","modules":{"module_blocks":[]},"over_the_edge":[],"secondary_categories":[{"_version":2,"locale":"en-us","uid":"blt038394f2fc302955","ACL":{},"_in_progress":false,"branding":{"hub_page_color":"","hub_page_description":"","hub_page_logo":null},"created_at":"2021-05-29T07:25:41.005Z","created_by":"blt9a0fc67c46c47dd7","display_options":"Standard View","icon":null,"modules":{"module_blocks":[]},"over_the_edge":[],"secondary_category_name":"Authentication","seo":{"canonical_url":"","meta_description":"Authentication","meta_keywords":"","meta_title":"Authentication"},"shown_in_header":true,"slug":"authentication","sponsor_logo":null,"sponsor_text":"","tags":[],"title":"[Endpoint] Authentication","topic_page_description":"","updated_at":"2021-07-15T08:43:26.396Z","updated_by":"blt986fc66e34c7b415","_content_type_uid":"dr_category_secondary","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-07-20T11:44:33.457Z","user":"blta3dd47a38c602549"}},{"_version":2,"locale":"en-us","uid":"blt9f22a744d7b136d6","ACL":{},"_in_progress":false,"branding":{"hub_page_color":"","hub_page_description":"","hub_page_logo":null},"created_at":"2021-05-29T07:25:44.029Z","created_by":"blt9a0fc67c46c47dd7","display_options":"Standard View","icon":null,"modules":{"module_blocks":[]},"over_the_edge":[],"secondary_category_name":"Privacy","seo":{"canonical_url":"","meta_description":"Privacy","meta_keywords":"","meta_title":"Privacy"},"shown_in_header":true,"slug":"privacy","sponsor_logo":null,"sponsor_text":"","tags":[],"title":"[Endpoint] Privacy","topic_page_description":"","updated_at":"2021-07-16T11:18:55.988Z","updated_by":"blta3dd47a38c602549","_content_type_uid":"dr_category_secondary","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-07-20T11:44:57.811Z","user":"blta3dd47a38c602549"}}],"seo":{"canonical_url":"","meta_description":"Breaking news, news analysis, and expert commentary on endpoint security, including tools \u0026 technologies","meta_keywords":"","meta_title":"Endpoint"},"slug":"endpoint","sponsor_logo":null,"sponsor_text":"","tags":[],"title":"Endpoint","topic_page_description":"Breaking news, news analysis, and expert commentary on endpoint security, including tools \u0026 technologies.","updated_at":"2022-02-23T16:36:06.407Z","updated_by":"bltfcb3d125bf8c49ee","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2022-02-23T16:36:30.291Z","user":"bltfcb3d125bf8c49ee"}},{"_version":4,"locale":"en-us","uid":"bltd3cfe11c117abf74","ACL":{},"_in_progress":false,"branding":{"hub_page_logo":null,"image_alt_text":"","hub_page_description_with_hyperlink":"","hub_page_color":""},"created_at":"2022-01-31T10:12:03.498Z","created_by":"bltfcb3d125bf8c49ee","display_options":"Standard View","icon":null,"image_alt_text":"","modules":{"module_blocks":[]},"over_the_edge":[],"secondary_categories":[],"seo":{"meta_title":"","meta_description":"Breaking news, news analysis, and expert commentary on cyber threats targeting remote users and their devices, and the tools \u0026 technologies to protect them.","meta_keywords":"","canonical_url":""},"slug":"remote-workforce","sponsor_logo":null,"sponsor_text":"","tags":[],"title":"Remote Workforce","topic_page_description":"Breaking news, news analysis, and expert commentary on cybersecurity threats that target remote users and their devices and the tools \u0026 technologies to protect them.","updated_at":"2022-02-23T15:58:45.216Z","updated_by":"bltfcb3d125bf8c49ee","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2022-02-23T15:58:50.081Z","user":"bltfcb3d125bf8c49ee"},"_owner":{"uid":"bltfcb3d125bf8c49ee","created_at":"2021-05-21T10:05:50.071Z","updated_at":"2022-03-31T16:30:43.090Z","email":"edward.canavan@informa.com","username":"edward_blt00302c2c","first_name":"edward","last_name":"canavan","org_uid":[],"shared_org_uid":["blt5948195ac13977b0"],"mobile_number":"07916365746","country_code":"44","tfa_status":"verified","authy_id":"374943478","active":true,"profile_type":"business","failed_attempts":0,"settings":{"preferences":{"global":[],"stack":[{"api_key":"blt66983808af36a8ef","key":"dashboard","value":{"recently_modified_assets":{"order":0,"visibility":"show"},"recently_modified_entries":{"order":1,"visibility":"show"},"prod_update":{"order":2,"visibility":"hide"},"doc_search":{"order":3,"visibility":"show"},"did_you_know":{"order":4,"visibility":"show"}}}]}},"last_login_at":"Thu Mar 31 2022 16:30:43 GMT+0000 (Coordinated Universal Time)"}},{"_version":4,"locale":"en-us","uid":"bltd1eb4d6946b90153","ACL":{},"_in_progress":false,"branding":{"hub_page_color":"000000","hub_page_description_with_hyperlink":"","hub_page_logo":null,"image_alt_text":""},"created_at":"2021-05-29T07:25:27.087Z","created_by":"blt9a0fc67c46c47dd7","display_options":"Standard View","icon":null,"image_alt_text":"","modules":{"module_blocks":[]},"over_the_edge":[],"secondary_categories":[],"seo":{"canonical_url":"","meta_description":"Breaking news, news analysis and expert commentary on cybersecurity careers and industry leaders","meta_keywords":"","meta_title":"Careers \u0026 People"},"slug":"careers-and-people","sponsor_logo":null,"sponsor_text":"","tags":[],"title":"Careers \u0026 People","topic_page_description":"Breaking news, news analysis, and expert commentary on cybersecurity careers and industry leaders.","updated_at":"2022-02-23T15:53:43.785Z","updated_by":"bltfcb3d125bf8c49ee","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2022-02-23T15:54:44.662Z","user":"bltfcb3d125bf8c49ee"}},{"_version":2,"locale":"en-us","uid":"blt8622595eba1da383","ACL":{},"_in_progress":false,"branding":{"hub_page_color":"","hub_page_description_with_hyperlink":"","hub_page_logo":null,"image_alt_text":""},"created_at":"2021-06-16T21:13:12.377Z","created_by":"blt9488f204761710b3","display_options":"Standard View","icon":null,"image_alt_text":"","modules":{"module_blocks":[]},"over_the_edge":[],"secondary_categories":[],"seo":{"canonical_url":"","meta_description":"Updates and insights from the Black Hat cybersecurity conference","meta_keywords":"","meta_title":""},"slug":"black-hat","sponsor_logo":null,"sponsor_text":"","tags":[],"title":"Black Hat","topic_page_description":"Updates and insights from Black Hat.","updated_at":"2022-02-23T15:51:00.562Z","updated_by":"bltfcb3d125bf8c49ee","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2022-02-23T15:51:06.623Z","user":"bltfcb3d125bf8c49ee"},"_owner":{"uid":"blt9488f204761710b3","created_at":"2021-05-21T10:05:50.071Z","updated_at":"2022-05-03T14:00:56.191Z","email":"roma.nowak@informa.com","username":"roma_blt4d352a9b","first_name":"roma","last_name":"nowak","org_uid":[],"shared_org_uid":["blt5948195ac13977b0"],"mobile_number":"5167901481","country_code":"1","tfa_status":"verified","authy_id":"375656345","active":true,"profile_type":"business","failed_attempts":0,"settings":{"global":[{"key":"favorite_stacks","value":[{"org_uid":"blt5948195ac13977b0","stacks":[{"api_key":"bltbbbdd615c0ee9096"},{"api_key":"blt95b381df7c12c15d"},{"api_key":"blt66983808af36a8ef"}]}]}]},"last_login_at":"Tue May 03 2022 14:00:56 GMT+0000 (Coordinated Universal Time)"}},{"_version":4,"locale":"en-us","uid":"blt153276da84f3050e","ACL":{},"_in_progress":false,"branding":{"hub_page_color":"000000","hub_page_description_with_hyperlink":"","hub_page_logo":null,"image_alt_text":""},"created_at":"2021-05-29T07:25:24.935Z","created_by":"blt9a0fc67c46c47dd7","display_options":"Standard View","icon":null,"image_alt_text":"","modules":{"module_blocks":[]},"over_the_edge":[],"secondary_categories":[{"title":"[App-Sec] Database Security","secondary_category_name":"Database Security","slug":"database-security","shown_in_header":true,"tags":[],"locale":"en-us","ACL":{},"uid":"blt185c79bc5185685f","created_by":"blt9a0fc67c46c47dd7","updated_by":"blta3dd47a38c602549","created_at":"2021-05-29T07:25:42.038Z","updated_at":"2021-07-16T11:21:34.290Z","_content_type_uid":"dr_category_secondary","_version":2,"_in_progress":false,"branding":{"hub_page_color":"","hub_page_description":"","hub_page_logo":null},"display_options":"Standard View","icon":null,"modules":{"module_blocks":[]},"over_the_edge":[],"seo":{"canonical_url":"","meta_description":"Database Security","meta_keywords":"","meta_title":"Database Security"},"sponsor_logo":null,"sponsor_text":"","topic_page_description":"","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-07-20T11:41:13.664Z","user":"blta3dd47a38c602549"}}],"seo":{"canonical_url":"","meta_description":"Breaking news, news analysis, and expert commentary on application security, including tools \u0026 technologies","meta_keywords":"","meta_title":"Application Security"},"slug":"application-security","sponsor_logo":null,"sponsor_text":"","tags":[],"title":"Application Security","topic_page_description":"Breaking news, news analysis, and expert commentary on application security, including tools \u0026 technologies.","updated_at":"2022-02-23T15:22:10.587Z","updated_by":"bltfcb3d125bf8c49ee","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2022-02-23T15:22:20.056Z","user":"bltfcb3d125bf8c49ee"}},{"_version":7,"locale":"en-us","uid":"bltf8dd78a4e0baf1e3","ACL":{},"_in_progress":false,"branding":{"hub_page_color":"000000","hub_page_description_with_hyperlink":"\u003cp\u003e\u003c/p\u003e\n\u003cp\u003e\u003cbr\u003e\u003c/p\u003e\n\u003cp\u003e\u003c/p\u003e","hub_page_logo":null,"image_alt_text":""},"created_at":"2021-05-29T07:25:12.643Z","created_by":"blt9a0fc67c46c47dd7","display_options":"Standard View","icon":null,"image_alt_text":"","modules":{"module_blocks":[]},"over_the_edge":[],"secondary_categories":[{"_version":6,"locale":"en-us","uid":"blt510176d85efe2f04","ACL":{},"_in_progress":false,"branding":{"hub_page_color":"","hub_page_description":"","hub_page_logo":null},"created_at":"2021-05-29T07:25:39.882Z","created_by":"blt9a0fc67c46c47dd7","display_options":"Standard View","icon":null,"modules":{"module_blocks":[]},"over_the_edge":[],"secondary_category_name":"Security Monitoring","seo":{"canonical_url":"","meta_description":"Security Monitoring","meta_keywords":"","meta_title":"Security Monitoring"},"shown_in_header":true,"slug":"security-monitoring","sponsor_logo":null,"sponsor_text":"Sponsor Text","tags":[],"title":"[Analytics] Security Monitoring","topic_page_description":"","updated_at":"2021-07-20T11:46:58.515Z","updated_by":"blta3dd47a38c602549","_content_type_uid":"dr_category_secondary","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-07-20T11:47:01.191Z","user":"blta3dd47a38c602549"}}],"seo":{"canonical_url":"","meta_description":"Breaking news, news analysis, and expert commentary about cybersecurity data analytics, including tools \u0026 technologies","meta_keywords":"analytics,data analytics,security,cybersecurity","meta_title":"Breaking news, news analysis, commentary on security data analytics."},"slug":"analytics","sponsor_logo":null,"sponsor_text":"","tags":[],"title":"Analytics","topic_page_description":"Breaking news, news analysis, and expert commentary about cybersecurity data analytics, including tools \u0026 technologies.","updated_at":"2022-02-23T15:17:04.315Z","updated_by":"bltfcb3d125bf8c49ee","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2022-02-23T15:17:13.080Z","user":"bltfcb3d125bf8c49ee"}},{"_version":26,"locale":"en-us","uid":"blt47ebc4f3a45cfe48","ACL":{},"_in_progress":false,"branding":{"hub_page_color":"000000","image_alt_text":"Omdia Logo","hub_page_description_with_hyperlink":"\u003cp\u003eEnterprise cybersecurity technology\u003c/p\u003e\n\u003cp\u003eresearch that connects the dots \u003cstrong\u003e|\u003c/strong\u003e\u0026nbsp;\u003ca href=\"https://omdia.tech.informa.com/\" target=\"_blank\"\u003eLearn more\u003c/a\u003e\u003c/p\u003e","hub_page_logo":{"uid":"blt41661bfd68149993","created_by":"blt986fc66e34c7b415","updated_by":"blt986fc66e34c7b415","created_at":"2021-09-23T02:34:37.142Z","updated_at":"2021-09-23T02:34:37.142Z","content_type":"image/png","file_size":"9803","filename":"Vector.png","title":"Vector.png","ACL":[],"_version":1,"is_dir":false,"tags":[],"publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-10-25T13:38:23.525Z","user":"blt9488f204761710b3"},"url":"https://eu-images.contentstack.com/v3/assets/blt66983808af36a8ef/blt41661bfd68149993/614be7bd6db99f25817e6c21/Vector.png"}},"created_at":"2021-06-16T21:12:18.733Z","created_by":"blt9488f204761710b3","display_options":"Modular View","icon":null,"image_alt_text":"","modules":{"module_blocks":[{"uid":"blt7ef981a3c49f83e4","_content_type_uid":"dr_module_article_promo"},{"uid":"blt06b0e4fcb74a2904","_content_type_uid":"dr_module_jobs"},{"uid":"bltf0145cf743710573","_content_type_uid":"dr_module_latest_content_grid"},{"uid":"blt74c7a7dbe5919173","_content_type_uid":"dr_module_article_promo"},{"uid":"bltb08e2126c3aea60b","_content_type_uid":"dr_modular_external_link"}]},"over_the_edge":[],"secondary_categories":[],"seo":{"canonical_url":"","meta_description":"","meta_keywords":"","meta_title":""},"slug":"omdia","sponsor_logo":null,"sponsor_text":"","tags":[],"title":"Omdia","topic_page_description":"","updated_at":"2021-12-15T21:17:16.402Z","updated_by":"bltb9dc8193e565cad1","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-12-15T21:17:26.312Z","user":"bltb9dc8193e565cad1"},"_owner":{"uid":"blt9488f204761710b3","created_at":"2021-05-21T10:05:50.071Z","updated_at":"2022-05-03T14:00:56.191Z","email":"roma.nowak@informa.com","username":"roma_blt4d352a9b","first_name":"roma","last_name":"nowak","org_uid":[],"shared_org_uid":["blt5948195ac13977b0"],"mobile_number":"5167901481","country_code":"1","tfa_status":"verified","authy_id":"375656345","active":true,"profile_type":"business","failed_attempts":0,"settings":{"global":[{"key":"favorite_stacks","value":[{"org_uid":"blt5948195ac13977b0","stacks":[{"api_key":"bltbbbdd615c0ee9096"},{"api_key":"blt95b381df7c12c15d"},{"api_key":"blt66983808af36a8ef"}]}]}]},"last_login_at":"Tue May 03 2022 14:00:56 GMT+0000 (Coordinated Universal Time)"}},{"_version":11,"locale":"en-us","uid":"bltb87a73f19a122791","ACL":{},"_in_progress":false,"branding":{"hub_page_color":"000000","image_alt_text":"","hub_page_description_with_hyperlink":"","hub_page_logo":null},"created_at":"2021-05-29T07:25:11.415Z","created_by":"blt9a0fc67c46c47dd7","display_options":"Standard View","icon":null,"image_alt_text":"","modules":{"module_blocks":[]},"over_the_edge":[],"secondary_categories":[{"uid":"blt5159acef8bbbdbd2","_content_type_uid":"dr_category_secondary"},{"uid":"bltf061b9cae7114970","_content_type_uid":"dr_category_secondary"},{"uid":"bltf3b52db640ece380","_content_type_uid":"dr_category_secondary"},{"uid":"blt13d8c03c3780161b","_content_type_uid":"dr_category_secondary"},{"uid":"blt080f0617df413219","_content_type_uid":"dr_category_secondary"},{"uid":"blta82e51ec93e2fac1","_content_type_uid":"dr_category_secondary"},{"uid":"bltdce9206e9328d201","_content_type_uid":"dr_category_secondary"},{"uid":"blt9ca336358f505cf7","_content_type_uid":"dr_category_secondary"},{"uid":"blt759bfac36f41d33f","_content_type_uid":"dr_category_secondary"},{"uid":"blt8de203de1204fefa","_content_type_uid":"dr_category_secondary"},{"uid":"blt0857e3accb1bca3c","_content_type_uid":"dr_category_secondary"},{"_version":2,"locale":"en-us","uid":"blt0f2b2ba95fdf65ba","ACL":{},"_in_progress":false,"branding":{"hub_page_logo":null,"image_alt_text":"","hub_page_description_with_hyperlink":"","hub_page_color":""},"created_at":"2021-10-28T15:37:45.384Z","created_by":"bltfcb3d125bf8c49ee","display_options":"Standard View","icon":null,"image_alt_text":"","modules":{"module_blocks":[]},"over_the_edge":[],"secondary_category_name":"CrowdStrike","seo":{"meta_title":"","meta_description":"","meta_keywords":"","canonical_url":""},"shown_in_header":true,"slug":"crowdstrike","sponsor_logo":null,"sponsor_text":"","tags":[],"title":"[Partner Perspectives] CrowdStrike","topic_page_description":"","updated_at":"2021-10-28T15:41:17.530Z","updated_by":"bltfcb3d125bf8c49ee","_content_type_uid":"dr_category_secondary","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-12-06T21:12:52.566Z","user":"bltfcb3d125bf8c49ee"}},{"_version":1,"locale":"en-us","uid":"blt81e53b0d8a1f159a","ACL":{},"_in_progress":false,"branding":{"hub_page_logo":null,"image_alt_text":"","hub_page_description_with_hyperlink":"","hub_page_color":""},"created_at":"2021-10-28T15:38:57.813Z","created_by":"bltfcb3d125bf8c49ee","display_options":"Standard View","icon":null,"image_alt_text":"","modules":{"module_blocks":[]},"over_the_edge":[],"secondary_category_name":"Darktrace","seo":{"meta_title":"","meta_description":"","meta_keywords":"","canonical_url":""},"shown_in_header":true,"slug":"darktrace","sponsor_logo":null,"sponsor_text":"","tags":[],"title":"{Partner Perspectives] Darktrace","topic_page_description":"","updated_at":"2021-10-28T15:38:57.813Z","updated_by":"bltfcb3d125bf8c49ee","_content_type_uid":"dr_category_secondary","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2022-01-05T22:48:48.368Z","user":"bltfcb3d125bf8c49ee"}}],"seo":{"canonical_url":"","meta_description":"Partner Perspectives","meta_keywords":"","meta_title":"Partner Perspectives"},"slug":"partner-perspectives","sponsor_logo":null,"sponsor_text":"","tags":[],"title":"Partner Perspectives","topic_page_description":"","updated_at":"2021-10-28T15:47:32.052Z","updated_by":"bltfcb3d125bf8c49ee","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2022-01-05T22:50:01.712Z","user":"bltfcb3d125bf8c49ee"}}],"smartbox":[{"feed":{"href":"http://smartbox.techweb.com/smartbox/externalsmartbox?site_id=162801002\u0026taxonomy_ids=\u0026num_display=10\u0026article_type=analytics\u0026output_type=xml","title":"Reports","__typename":"Link"},"read_more_link":{"href":"/must-reads","title":"More Reports","__typename":"Link"},"title":"Reports","type":"Reports","system":{"publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2022-03-17T18:38:06.901Z","user":"bltfcb3d125bf8c49ee","__typename":"SystemPublishDetails"},"uid":"blt5145c70334f61d02","__typename":"EntrySystemField"},"hidden":true,"ordinal":1,"__typename":"DrSmartbox","articles":[{"title":["Incorporating a Prevention Mindset into Threat Detection and Response"],"link":["https://www.informationweek.com/whitepaper/network-and-perimeter-security/networking/incorporating-a-prevention-mindset-into-threat-detection-and-response/439373?cid=smartbox_techweb_analytics_7.300005934\u0026_mc=smartbox_techweb_analytics_7.300005934"],"publishedSite":[""],"publishedSiteURL":[""]},{"title":["Practical Network Security Approaches for a Multicloud, Hybrid IT World"],"link":["https://www.informationweek.com/whitepaper/cloud-security/network-and-perimeter-security/practical-network-security-approaches-for-a-multicloud,-hybrid-it-world/438913?cid=smartbox_techweb_analytics_7.300005932\u0026_mc=smartbox_techweb_analytics_7.300005932"],"publishedSite":[""],"publishedSiteURL":[""],"description":["The report covers areas enterprises should focus on for their multicloud/hybrid cloud security strategy:\r\n-increase visibility over the environment\r\n-learning cloud-specific skills\r\n-relying on established security frameworks\r\n-re-architecting the network\r\n"]},{"title":["State of the Cloud: A Security Perspective"],"link":["https://www.informationweek.com/whitepaper/cloud-security/cybersecurity/state-of-the-cloud-a-security-perspective/438333?cid=smartbox_techweb_analytics_7.300005931\u0026_mc=smartbox_techweb_analytics_7.300005931"],"publishedSite":[""],"publishedSiteURL":[""],"description":["Cloud computing has evolved over the years from a nice-to-have item on the IT wish list to a core technology driving business initiatives. But despite widespread adoption, cloud-based IT systems continue to be saddled with issues related to data security, privacy, and resilience.\r\n\r\nDownload this report from Dark Reading for an in-depth look at what IT security teams are thinking and doing when it comes to the cloud."]},{"title":["Understanding DNS Threats and How to Use DNS to Expand Your Cybersecurity Arsenal"],"link":["https://www.informationweek.com/whitepaper/cybersecurity/security/understanding-dns-threats-and-how-to-use-dns-to-expand-your-cybersecurity-arsenal/437963?cid=smartbox_techweb_analytics_7.300005930\u0026_mc=smartbox_techweb_analytics_7.300005930"],"publishedSite":[""],"publishedSiteURL":[""],"description":["With attacks and breaches on the rise, enterprise security teams need full visibility over what they have in their network. DNS is a key tool for visibility and asset discovery. Proactive DNS-layer security - such as using DNS data to mitigate threats that network-based controls may miss - is about blocking threats before they compromise the enterprise."]},{"title":["Rethinking Endpoint Security in a Pandemic and Beyond"],"link":["https://www.informationweek.com/whitepaper/endpoint-security/cloud-security/how-enterprises-are-securing-the-application-environment/437053?cid=smartbox_techweb_analytics_7.300005929\u0026_mc=smartbox_techweb_analytics_7.300005929"],"publishedSite":[""],"publishedSiteURL":[""],"description":["IT security teams are expending the concept of \"endpoint security\" as companies adjust to a distributed workforce. How much responsibility will enterprise IT take for the security of personal devices such as printers. How will they manage identities across multiple cloud services?\r\n\r\nThe report covers areas enterprises should focus on for their endpoint security strategy:\r\n-Managing identities and credentials\r\n-Vulnerability scanning and remediation\r\n-Quarantining at-risk endpoints\r\n-Reviewing suspect accounts\r\n"]},{"title":["How Enterprises Are Securing the Application Environment"],"link":["https://www.informationweek.com/whitepaper/cybersecurity/cloud-security/how-enterprises-are-securing-the-application-environment/437083?cid=smartbox_techweb_analytics_7.300005928\u0026_mc=smartbox_techweb_analytics_7.300005928"],"publishedSite":[""],"publishedSiteURL":[""],"description":["Download this report from Dark Reading to learn more about the measures enterprises have adopted to ensure the security of their internally developed applications and third-party packaged applications."]},{"title":["How Enterprises Plan to Address Endpoint Security Threats in a Post-Pandemic World"],"link":["https://www.informationweek.com/whitepaper/cybersecurity/endpoint-security/how-enterprises-plan-to-address-endpoint-security-threats-in-a-post-pandemic-world/436653?cid=smartbox_techweb_analytics_7.300005925\u0026_mc=smartbox_techweb_analytics_7.300005925"],"publishedSite":[""],"publishedSiteURL":[""],"description":["Dark Reading's 2022 Endpoint Security Report examines how IT and cybersecurity professionals are grappling with the impact of pandemic-related changes on endpoint security strategies. The report explores how they are building their endpoint security defenses, and provides insight on what organizations are doing to protect users from malware, hackers, and social engineering attacks."]},{"title":["How Enterprises Are Assessing Cybersecurity Risk in Today's Environment"],"link":["https://www.informationweek.com/whitepaper/cybersecurity/cloud-services/how-enterprises-are-assessing-cybersecurity-risk-in-today%E2%80%99s-environment/434623?cid=smartbox_techweb_analytics_7.300005921\u0026_mc=smartbox_techweb_analytics_7.300005921"],"publishedSite":[""],"publishedSiteURL":[""],"description":["Many cybersecurity pros expect fundamental, long-term changes to their organization's computing and data security due to the shift to more remote work and accelerated cloud adoption. Download this report from Dark Reading to learn more about their challenges and concerns."]},{"title":["How Enterprises are Attacking the Cybersecurity Problem"],"link":["https://www.informationweek.com/whitepaper/cybersecurity/security-monitoring/how-enterprises-are-attacking-the-cybersecurity-problem/432103?cid=smartbox_techweb_analytics_7.300005916\u0026_mc=smartbox_techweb_analytics_7.300005916"],"publishedSite":[""],"publishedSiteURL":[""],"description":["Concerns over supply chain vulnerabilities and attack visibility drove some significant changes in enterprise cybersecurity strategies over the past year. Dark Reading's 2021 Strategic Security Survey showed that many organizations are staying the course regarding the use of a mix of attack prevention and threat detection technologies and practices for dealing with cyber threats."]},{"title":["Defending Against Critical Threats"],"link":["https://www.informationweek.com/whitepaper/cybersecurity/endpoint-security/defending-against-critical-threats/429033?cid=smartbox_techweb_analytics_7.300005906\u0026_mc=smartbox_techweb_analytics_7.300005906"],"publishedSite":[""],"publishedSiteURL":[""]}]},{"feed":{"href":"https://smartbox.techweb.com/smartbox/externalsmartbox?site_id=162801002\u0026taxonomy_ids=\u0026num_display=3\u0026article_type=session\u0026output_type=xml","title":"Events","__typename":"Link"},"read_more_link":{"href":"https://www.darkreading.com/upcoming-events","title":"More Events","__typename":"Link"},"title":"Events","type":"Live Events","system":{"publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-10-19T13:23:56.785Z","user":"blt9488f204761710b3","__typename":"SystemPublishDetails"},"uid":"blt8b6a33909c49602f","__typename":"EntrySystemField"},"hidden":false,"ordinal":2,"__typename":"DrSmartbox","articles":[{"title":["Dark Reading Virtual Event - June 23 - Learn More"],"link":["https://ve.informaengage.com/virtual-events/dr-how-data-breaches-happen/?kcode=sbx\u0026cid=smartbox_techweb_session_16.500268\u0026_mc=smartbox_techweb_session_16.500268"],"publishDate":["Jun 23, 2022"],"publishedSite":[""],"publishedSiteURL":[""],"description":["On June 23, Dark Reading will host a free, all-day virtual event will look at some of the most common vulnerabilities that lead to enterprise data breaches, as well as the latest tools and best practices for incident response.\r\n\r\nIf you are looking for the latest strategies and practices for preventing cyber breaches -- and how to respond when they happen -- then this virtual event is for you."]},{"title":["Black Hat USA - August 6-11 - Learn More"],"link":["https://www.blackhat.com/us-22/?cid=smartbox_techweb_session_16.500267\u0026_mc=smartbox_techweb_session_16.500267"],"publishDate":["Aug 11, 2022"],"publishedSite":[""],"publishedSiteURL":[""]},{"title":["Black Hat Spring Trainings - June 13-16 - Learn More"],"link":["https://www.blackhat.com/tr-22/?cid=smartbox_techweb_session_16.500262\u0026_mc=smartbox_techweb_session_16.500262"],"publishDate":["Dec 23, 2021"],"publishedSite":[""],"publishedSiteURL":[""],"description":["Black Hat Trainings will be held virtually and at Renaissance Arlington Capital View Hotel in Virginia, in the Eastern Time Zone, June 13-16. Develop in-demand cybersecurity skills in hands-on, technical Trainings taught by expert instructors from around the world. From infrastructure hacking to incident response, there's a course for individuals of all experience levels. Expand your security talent in just 4 days."]}]},{"feed":{"href":"https://smartbox.techweb.com/smartbox/externalsmartbox?site_id=162801002\u0026taxonomy_ids=\u0026num_display=5\u0026article_type=webcast\u0026output_type=xml","title":"Webinars","__typename":"Link"},"read_more_link":{"href":"https://www.darkreading.com/upcoming-webinars","title":"More Webinars","__typename":"Link"},"title":"Webinars","type":"Webinars","system":{"publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-10-19T13:22:58.379Z","user":"blt9488f204761710b3","__typename":"SystemPublishDetails"},"uid":"blt8f82585c522cc0f5","__typename":"EntrySystemField"},"hidden":false,"ordinal":1,"__typename":"DrSmartbox","articles":[{"title":["Using Threat Modeling to Improve Enterprise Cyber Defenses"],"link":["https://webinar.darkreading.com/1310229?keycode=sbx\u0026cid=smartbox_techweb_webcast_8.500001175\u0026_mc=smartbox_techweb_webcast_8.500001175"],"publishedSite":[""],"eventDate":["Jun 28, 2022"],"publishedSiteURL":[""],"description":["As enterprises deal with multiple threats coming in different forms, security teams are shifting to a risk-based security to handle these challenges. One of the key tools is threat modeling, a process intended to help identify potential weaknesses and prioritize how to fix them. In this webinar, experts discuss how to define security requirements, pinpoint and quantify potential vulnerabilities, and prioritize remediation methods. Learn how to conduct a threat modeling exercise and make risk-based decisions to strengthen your organization's security."]},{"title":["Vendors as Your Largest BEC Threat"],"link":["https://webinar.darkreading.com/1317679?keycode=sbx\u0026cid=smartbox_techweb_webcast_8.500001173\u0026_mc=smartbox_techweb_webcast_8.500001173"],"publishedSite":[""],"eventDate":["Jun 22, 2022"],"publishedSiteURL":[""],"description":["The tactics that worked for your business five years ago likely aren't still working today, and cybercrime is no different. The CEO fraud that dominated the last few years is not nearly as successful as it used to be, partially because employees understand that their CEO isn't emailing them about gift cards at 2:00 in the morning.\r\n\r\nNot to be outdone, cybercriminals have shifted their tactics, now relying more on vendor impersonation and vendor email compromise to run their scams. The average invoice fraud attack costs $183,000 and Abnormal has seen attacks that request upwards of $2.1 million. Attend this webinar to make sure you're prepared to defend against them."]},{"title":["Harnessing the Power of Security Automation"],"link":["https://webinar.darkreading.com/1314754?keycode=sbx\u0026cid=smartbox_techweb_webcast_8.500001168\u0026_mc=smartbox_techweb_webcast_8.500001168"],"publishedSite":[""],"eventDate":["Jun 09, 2022"],"publishedSiteURL":[""],"description":["With many organizations pinched for both dollars and manpower, security and IT teams are turning to a new class of technology and practices designed to automate repetitive and time-consuming tasks in security operations. How can companies truly unleash the potential for automation? Which tasks can enterprises safely automate? How does emerging automation technology work, and how can security teams implement it in a way that is both effective and secure? In this webinar, top experts offer insights on how to make automation work for your security team."]},{"title":["Implementing and Using XDR to Improve Enterprise Cybersecurity"],"link":["https://webinar.darkreading.com/1341387?keycode=sbx\u0026cid=smartbox_techweb_webcast_8.500001166\u0026_mc=smartbox_techweb_webcast_8.500001166"],"publishedSite":[""],"eventDate":["May 25, 2022"],"publishedSiteURL":[""],"description":["Security operations teams are taking a hard look at extended detection and response tools - XDR - as a means of collecting and analyzing threat data and identifying cyber attacks faster and more efficiently. But exactly how does XDR technology work? What tools does it require, and what skills do you need to have to use it in your enterprise? In this panel discussion, top experts will discuss the benefits of XDR, the challenges in implementing it, and details on how to implement XDR technology to speed the detection and mitigation of new exploits."]},{"title":["Implementing Zero Trust in Your Enterprise"],"link":["https://webinar.darkreading.com/1348601?keycode=sbx\u0026cid=smartbox_techweb_webcast_8.500001165\u0026_mc=smartbox_techweb_webcast_8.500001165"],"publishedSite":[""],"eventDate":["Jun 21, 2022"],"publishedSiteURL":[""],"description":["Attackers have shown time and again that perimeter security is no longer enough to keep them out. The concept of internal users and outsiders doesn't work in network defense when attackers use credential theft and lateral movement to pretend they are legitimate internal users. The zero-trust model - trust nothing, verify everything - sounds straightforward, but it can be a challenge to deploy. In this webinar, learn from the experts what zero-trust looks like in practice, how to create a multi-layered defense, and what challenges to overcome along the way. You will learn the first steps to take toward implementing a zero-trust model in your organization."]}]},{"feed":{"href":"http://smartbox.techweb.com/smartbox/externalsmartbox?site_id=162801002\u0026taxonomy_ids=\u0026num_display=\u0026article_type=whitepaper\u0026output_type=xml","title":"White Papers","__typename":"Link"},"read_more_link":{"href":"https://www.informationweek.com/whitepaper/Security","title":"More White Papers","__typename":"Link"},"title":"White Papers","type":"Whitepapers","system":{"publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-10-08T08:26:16.832Z","user":"blt8d6e4671551ab970","__typename":"SystemPublishDetails"},"uid":"blt1192837947494c5f","__typename":"EntrySystemField"},"hidden":false,"ordinal":3,"__typename":"DrSmartbox","articles":[{"title":["What is a data vault? Why do you need it?"],"link":["https://www.informationweek.com/whitepaper/big-data-analytics/big-data/what-is-a-data-vault-why-do-you-need-it/437793?cid=smartbox_techweb_whitepaper_14.500005108\u0026_mc=smartbox_techweb_whitepaper_14.500005108"],"publishedSite":[""],"publishedSiteURL":[""]},{"title":["Five Keys to a Secure Work-From-Anywhere Solution"],"link":["https://www.informationweek.com/whitepaper/cybersecurity/security/five-keys-to-a-secure-work-from-anywhere-solution/437873?cid=smartbox_techweb_whitepaper_14.500005103\u0026_mc=smartbox_techweb_whitepaper_14.500005103"],"publishedSite":[""],"publishedSiteURL":[""]},{"title":["Why Your Company's PSIRT Should Go Beyond Incident Response"],"link":["https://www.informationweek.com/whitepaper/cybersecurity/risk-management-security/why-your-company%E2%80%99s-psirt-should-go-beyond-incident-response/437783?cid=smartbox_techweb_whitepaper_14.500005102\u0026_mc=smartbox_techweb_whitepaper_14.500005102"],"publishedSite":[""],"publishedSiteURL":[""]},{"title":["Creating a Regulatory Compliant Medical Device Vulnerability Management Program"],"link":["https://www.informationweek.com/whitepaper/cybersecurity/risk-management-security/creating-a-regulatory-compliant-medical-device-vulnerability-management-program/437543?cid=smartbox_techweb_whitepaper_14.500005101\u0026_mc=smartbox_techweb_whitepaper_14.500005101"],"publishedSite":[""],"publishedSiteURL":[""]},{"title":["How to avoid a data breach"],"link":["https://www.informationweek.com/whitepaper/cybersecurity/risk-management-security/how-to-avoid-a-data-breach-/434083?cid=smartbox_techweb_whitepaper_14.500005088\u0026_mc=smartbox_techweb_whitepaper_14.500005088"],"publishedSite":[""],"publishedSiteURL":[""]}]},{"feed":{"href":"https://smartbox.techweb.com/smartbox/externalsmartbox?site_id=162801002\u0026taxonomy_ids=\u0026num_display=3\u0026article_type=session\u0026output_type=xml","title":"Thao tests smartbox","__typename":"Link"},"read_more_link":{"href":"https://finance.vietstock.vn/TDC-ctcp-kinh-doanh-va-phat-trien-binh-duong.htm","title":"Read more","__typename":"Link"},"title":"Thao test smartbox","type":"Webinars","system":{"publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-10-13T09:32:03.167Z","user":"blta36fe02d0bc9c8a3","__typename":"SystemPublishDetails"},"uid":"blt378d3b273bbe06e9","__typename":"EntrySystemField"},"hidden":false,"ordinal":1,"__typename":"DrSmartbox","articles":[{"title":["Dark Reading Virtual Event - June 23 - Learn More"],"link":["https://ve.informaengage.com/virtual-events/dr-how-data-breaches-happen/?kcode=sbx\u0026cid=smartbox_techweb_session_16.500268\u0026_mc=smartbox_techweb_session_16.500268"],"publishDate":["Jun 23, 2022"],"publishedSite":[""],"publishedSiteURL":[""],"description":["On June 23, Dark Reading will host a free, all-day virtual event will look at some of the most common vulnerabilities that lead to enterprise data breaches, as well as the latest tools and best practices for incident response.\r\n\r\nIf you are looking for the latest strategies and practices for preventing cyber breaches -- and how to respond when they happen -- then this virtual event is for you."]},{"title":["Black Hat USA - August 6-11 - Learn More"],"link":["https://www.blackhat.com/us-22/?cid=smartbox_techweb_session_16.500267\u0026_mc=smartbox_techweb_session_16.500267"],"publishDate":["Aug 11, 2022"],"publishedSite":[""],"publishedSiteURL":[""]},{"title":["Black Hat Spring Trainings - June 13-16 - Learn More"],"link":["https://www.blackhat.com/tr-22/?cid=smartbox_techweb_session_16.500262\u0026_mc=smartbox_techweb_session_16.500262"],"publishDate":["Dec 23, 2021"],"publishedSite":[""],"publishedSiteURL":[""],"description":["Black Hat Trainings will be held virtually and at Renaissance Arlington Capital View Hotel in Virginia, in the Eastern Time Zone, June 13-16. Develop in-demand cybersecurity skills in hands-on, technical Trainings taught by expert instructors from around the world. From infrastructure hacking to incident response, there's a course for individuals of all experience levels. Expand your security talent in just 4 days."]}]}],"articleSettings":{"_version":59,"locale":"en-us","uid":"blt71c2ca1d1bdca542","ACL":{},"_in_progress":false,"article_display_settings":{"article_template":"two-column"},"created_at":"2021-08-03T04:55:12.335Z","created_by":"blt986fc66e34c7b415","modules":{"module_blocks":[]},"right_hand_rail_configuration":{"right_component":[{"uid":"blt9262b8fd3485b1dc","_content_type_uid":"dr_editor_s_choice"},{"uid":"blt8f82585c522cc0f5","_content_type_uid":"dr_smartbox"},{"uid":"blt1192837947494c5f","_content_type_uid":"dr_smartbox"},{"uid":"blt8b6a33909c49602f","_content_type_uid":"dr_smartbox"}]},"subscribe_to_newsletters":{"message":"Keep up with the latest cybersecurity threats, newly-discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.","open_subscribe_link_on_new_tab":true,"subscribe_link":{"title":"Subscribe","href":"https://www.darkreading.com/newsletter-signup/?_mc=dr_eoa"}},"tags":[],"title":"[DR] Settings - Article","updated_at":"2021-10-13T09:38:46.418Z","updated_by":"blta36fe02d0bc9c8a3","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-10-28T09:59:09.533Z","user":"bltfcb3d125bf8c49ee"}}},"adsPattern":"article/risk","sponsoredContentSettings":{"title":"Sponsored Content Settings","sponsored_content_label":"Sponsored","label_background_color":"ffdc2d","label_text_color":"000","__typename":"DrSponsoredContent"},"slideshowItems":[],"tagManagerSlideArticleArgs":{},"isEdgePage":true,"pageAid":99708,"ptype":"article","listModuleData":[],"pageName":"article","keyword":""}},"__N_SSG":true},"page":"/[category]/[hybidPage]","query":{"category":"risk","hybidPage":"google-chrome-polishes-its-first-security-update"},"buildId":"6be8464ca465e48eb1e211c023cdc630cfb36cc9","assetPrefix":"https://beta.darkreading.com","isFallback":false,"gsp":true,"scriptLoader":[]}</script><script async="" src="https://securepubads.g.doubleclick.net/tag/js/gpt.js"></script><script src="https://assets.zephr.com/zephr-browser/1.3.10/zephr-browser.umd.js"></script><script>let baseUrl = 'https://informa-dark-reading.preview.zephr.com'; document.addEventListener('DOMContentLoaded', (event) => { zephrBrowser.run(baseUrl);})</script></body></html><script defer src="https://static.cloudflareinsights.com/beacon.min.js/v652eace1692a40cfa3763df669d7439c1639079717194" integrity="sha512-Gi7xpJR8tSkrpF7aordPZQlW2DLtzUlZcumS8dMQjwDHEnw9I7ZLyiOj/6tZStRBGtGgN6ceN6cMH8z7etPGlw==" data-cf-beacon='{"rayId":"70fa9c4e6e795a8e","token":"af0cdaaec56f4ed087ea8bc39ec08d1b","version":"2021.12.0","si":100}' crossorigin="anonymous"></script>