informa
1 MIN READ
Commentary

Google Chrome Polishes Its First Security Update

Last week, Google released its shiny new Chrome browser. However, before the week finished, Google also had to issue a patch for one of security's most common -- and most well-known to developers -- application security issues: a buffer overflow vulnerability that would make it possible for an attacker to completely take over your system.
Last week, Google released its shiny new Chrome browser. However, before the week finished, Google also had to issue a patch for one of security's most common -- and most well-known to developers -- application security issues: a buffer overflow vulnerability that would make it possible for an attacker to completely take over your system.According to this advisory from security firm SVRT-Bkis, they found a critical buffer overflow in Google Chrome that would enable an attacker to take complete control of an unpatched system.

From the advisory:


Type of Issue : Buffer Overflow.

Affected Software : Google Chrome 0.2.149.27.

Exploitation Environment : Google Chrome on Windows XP SP2.

Impact: Remote code execution.

Rating : Critical.

Description : The vulnerability is caused due to a boundary error when handling the "SaveAs" function. On saving a malicious page with an overly long title ( tag in HTML), the program causes a stack-based overflow and makes it possible for attackers to execute arbitrary code on users' systems. <P> How an attacker could exploit the issue : To exploit the Vulnerability, a hacker might construct a specially crafted Web page, which contains malicious code. He then tricks users into visiting his Web site and convinces them to save this Page. Right after that, the code would be executed, giving him the privilege to make use of the affected system. </blockquote> <P> Fortunately, Google promptly fixed the flaw. Just make sure you are running version 0.2.149.29 or higher. You can do that by selecting About, then Update within Chrome, or visiting <a href="http://www.google.com/chrome/">this</a> Google page. <P> I've a suspicion we've many more Google Chrome security-related updates on the way.</p><div class="mb-3"> <div class="informa-dfp-ads" data-name="Native_Ad_native_1v" data-size="fluid" data-targeting="pos=native_1v" ></div> </div></div></div><div id="articleFooter-newsletterSignup" class="newsletter-cta w-100 mt-3"><div class="text">Keep up with the latest cybersecurity threats, newly-discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.</div><a class="subscribe-btn dr-btn" href="https://www.darkreading.com/newsletter-signup/?_mc=dr_eoa" title="Subscribe" target="_blank" rel="noreferrer">Subscribe</a></div><div class="lazyload-wrapper "><div class="lazyload-placeholder"></div></div><div class="w-100 d-none d-lg-block"><div class="more-insights mt-2"><div class="title">More Insights</div><div class="container"><div class="row"><div id="articleFooter-moreInsights-" class="smartbox col-md-4"><div class="smartbox-title">White Papers</div><ul class="feed"><li class="feed-item"><div class="bullet-container square"><svg width="8" height="8" fill="none" xmlns="http://www.w3.org/2000/svg" alt="White Papers" class="icon-bullet square"><path fill="#181C21" d="M0 0h8v8H0z"></path></svg><svg width="8" height="8" fill="none" xmlns="http://www.w3.org/2000/svg" alt="White Papers" class="icon-bullet-on-hover square"><path fill="#9F110D" d="M0 0h8v8H0z"></path></svg></div><a target="_blank" rel="noreferrer" href="https://www.informationweek.com/whitepaper/cybersecurity/security/ransomware-is-on-the-rise/442203?keycode=sbx&cid=smartbox_techweb_whitepaper_14.500005226&_mc=smartbox_techweb_whitepaper_14.500005226">Ransomware Is On The Rise</a></li><li class="feed-item"><div class="bullet-container square"><svg width="8" height="8" fill="none" xmlns="http://www.w3.org/2000/svg" alt="White Papers" class="icon-bullet square"><path fill="#181C21" d="M0 0h8v8H0z"></path></svg><svg width="8" height="8" fill="none" xmlns="http://www.w3.org/2000/svg" alt="White Papers" class="icon-bullet-on-hover square"><path fill="#9F110D" d="M0 0h8v8H0z"></path></svg></div><a target="_blank" rel="noreferrer" href="https://www.informationweek.com/whitepaper/cybersecurity/security-monitoring/your-digital-transformation-is-being-sabotaged-the-surprising-impact-of-sophisticated-bots/440933?keycode=sbx&cid=smartbox_techweb_whitepaper_14.500005215&_mc=smartbox_techweb_whitepaper_14.500005215">Your Digital Transformation Is Being Sabotaged - The Surprising Impact of Sophisticated Bots</a></li></ul><div class="readmore-link"><a target="_blank" rel="noreferrer" href="https://www.informationweek.com/whitepaper/Security">More White Papers</a></div></div><div id="articleFooter-moreInsights-" class="smartbox col-md-4"><div class="smartbox-title">Webinars</div><ul class="feed"><li class="feed-item"><div class="bullet-container square"><svg width="8" height="8" fill="none" xmlns="http://www.w3.org/2000/svg" alt="Webinars" class="icon-bullet square"><path fill="#181C21" d="M0 0h8v8H0z"></path></svg><svg width="8" height="8" fill="none" xmlns="http://www.w3.org/2000/svg" alt="Webinars" class="icon-bullet-on-hover square"><path fill="#9F110D" d="M0 0h8v8H0z"></path></svg></div><a target="_blank" rel="noreferrer" href="https://webinar.darkreading.com/1316745?keycode=sbx&cid=smartbox_techweb_upcoming_webinars_8.500001216&_mc=smartbox_techweb_upcoming_webinars_8.500001216">Using Zero Trust to Protect Remote and Home Workers</a></li><li class="feed-item"><div class="bullet-container square"><svg width="8" height="8" fill="none" xmlns="http://www.w3.org/2000/svg" alt="Webinars" class="icon-bullet square"><path fill="#181C21" d="M0 0h8v8H0z"></path></svg><svg width="8" height="8" fill="none" xmlns="http://www.w3.org/2000/svg" alt="Webinars" class="icon-bullet-on-hover square"><path fill="#9F110D" d="M0 0h8v8H0z"></path></svg></div><a target="_blank" rel="noreferrer" href="https://webinar.darkreading.com/1781964?keycode=sbx&cid=smartbox_techweb_upcoming_webinars_8.500001218&_mc=smartbox_techweb_upcoming_webinars_8.500001218">Strategies for DDoS Resilience and Response</a></li></ul><div class="readmore-link"><a target="_blank" rel="noreferrer" href="https://www.darkreading.com/upcoming-webinars">More Webinars</a></div></div><div id="articleFooter-moreInsights-" class="smartbox col-md-4"><div class="smartbox-title">Reports</div><ul class="feed"><li class="feed-item"><div class="bullet-container square"><svg width="8" height="8" fill="none" xmlns="http://www.w3.org/2000/svg" alt="Reports" class="icon-bullet square"><path fill="#181C21" d="M0 0h8v8H0z"></path></svg><svg width="8" height="8" fill="none" xmlns="http://www.w3.org/2000/svg" alt="Reports" class="icon-bullet-on-hover square"><path fill="#9F110D" d="M0 0h8v8H0z"></path></svg></div><a target="_blank" rel="noreferrer" href="https://www.informationweek.com/whitepaper/security-monitoring/cloud-security/breaches-prompt-changes-to-enterprise-ir-plans-and-processes/439583?cid=smartbox_techweb_analytics_7.300005941&_mc=smartbox_techweb_analytics_7.300005941">Breaches Prompt Changes to Enterprise IR Plans and Processes</a></li><li class="feed-item"><div class="bullet-container square"><svg width="8" height="8" fill="none" xmlns="http://www.w3.org/2000/svg" alt="Reports" class="icon-bullet square"><path fill="#181C21" d="M0 0h8v8H0z"></path></svg><svg width="8" height="8" fill="none" xmlns="http://www.w3.org/2000/svg" alt="Reports" class="icon-bullet-on-hover square"><path fill="#9F110D" d="M0 0h8v8H0z"></path></svg></div><a target="_blank" rel="noreferrer" href="https://www.informationweek.com/whitepaper/network-and-perimeter-security/endpoint-security/implementing-zero-trust-in-your-enterprise-how-to-get-started/441133?cid=smartbox_techweb_analytics_7.300005940&_mc=smartbox_techweb_analytics_7.300005940">Implementing Zero Trust In Your Enterprise: How to Get Started</a></li></ul><div class="readmore-link"><a target="_blank" rel="noreferrer" href="https://www.darkreading.com/must-reads">More Reports</a></div></div></div></div></div></div><div class="w-100 d-lg-block"><div class="informa-dfp-ads" data-name="Native_Ad_insight_1v" data-size="fluid" data-targeting="pos=nativeinsight_1v"></div></div></div><div class="col-lg-4"><div class="d-flex w-100 justify-content-center align-items-center flex-column"><div class="informa-dfp-ads add-border-bottom add-pb" data-size="5*5,300*250,300*600" data-name="TAP_Native_Ad_300_1v" data-targeting="pos=300_1v" data-mapping="1119*0=300*600,300*250,5*5|0*0=5*5,320*250"></div><div class="informa-dfp-ads add-border-bottom add-pb" data-name="Right_300x250_Rectangle_300_2v" data-size="300*250,300*600" data-targeting="pos=300_2v"></div></div><div class="right-hand-rail-wrap"><div id="rhc-editorsChoice" class="right-hand-rail-first editor-choice"><div class="editor-choice-title">Editors' Choice</div><div class="editor-choice-article"><a href="https://www.darkreading.com/attacks-breaches/attackers-less-than-ten-hours-find-weaknesses" title="Most Attackers Need Less Than 10 Hours to Find Weaknesses" class="d-flex align-items-center justify-content-center"><div class="lazyload-wrapper " style="margin:auto"><div style="height:75px" class="lazyload-placeholder"></div></div></a><div class="info pl-3"><div class="title"><a href="https://www.darkreading.com/attacks-breaches/attackers-less-than-ten-hours-find-weaknesses">Most Attackers Need Less Than 10 Hours to Find Weaknesses</a></div><div class="author">Robert Lemos, Contributing Writer, Dark Reading</div></div></div><div class="editor-choice-article"><a href="https://www.darkreading.com/threat-intelligence/cybercriminals-see-allure-bec-attacks-ransomware" title="Cybercriminals See Allure in BEC Attacks Over Ransomware" class="d-flex align-items-center justify-content-center"><div class="lazyload-wrapper " style="margin:auto"><div style="height:75px" class="lazyload-placeholder"></div></div></a><div class="info pl-3"><div class="title"><a href="https://www.darkreading.com/threat-intelligence/cybercriminals-see-allure-bec-attacks-ransomware">Cybercriminals See Allure in BEC Attacks Over Ransomware</a></div><div class="author">Robert Lemos, Contributing Writer, Dark Reading</div></div></div><div class="editor-choice-article"><a href="https://www.darkreading.com/dr-tech/mitre-rolls-out-fight-to-protect-5g-networks" title="MITRE's FiGHT Focuses on 5G Networks" class="d-flex align-items-center justify-content-center"><div class="lazyload-wrapper " style="margin:auto"><div style="height:75px" class="lazyload-placeholder"></div></div></a><div class="info pl-3"><div class="title"><a href="https://www.darkreading.com/dr-tech/mitre-rolls-out-fight-to-protect-5g-networks">MITRE's FiGHT Focuses on 5G Networks</a></div><div class="author">Dark Reading Staff, Dark Reading</div></div></div><div class="editor-choice-article"><a href="https://www.darkreading.com/attacks-breaches/attackers-develop-dangerous-new-technique-for-compromising-esxi-hypervisors" title="Dangerous New Attack Technique Compromising VMware ESXi Hypervisors" class="d-flex align-items-center justify-content-center"><div class="lazyload-wrapper " style="margin:auto"><div style="height:75px" class="lazyload-placeholder"></div></div></a><div class="info pl-3"><div class="title"><a href="https://www.darkreading.com/attacks-breaches/attackers-develop-dangerous-new-technique-for-compromising-esxi-hypervisors">Dangerous New Attack Technique Compromising VMware ESXi Hypervisors</a></div><div class="author">Jai Vijayan, Contributing Writer, Dark Reading</div></div></div></div><div id="rhc-webinars" class="smartbox " type="Webinars"><div class="smartbox-title">Webinars</div><ul class="feed"><li class="feed-item"><svg width="20" height="18" fill="none" xmlns="http://www.w3.org/2000/svg" class="feed-item-icon"><path d="M19.803 14.639a.807.807 0 00-.088-.156l-1.822-2.52a.775.775 0 00-.628-.323H3.516V3.2c0-.882.701-1.6 1.563-1.6h9.842c.862 0 1.563.718 1.563 1.6v5.2c0 .442.35.8.781.8a.79.79 0 00.781-.8V3.2c0-1.764-1.402-3.2-3.125-3.2H5.08C3.356 0 1.954 1.436 1.954 3.2v8.976L.285 14.483a.805.805 0 00-.088.156 2.442 2.442 0 00.186 2.275A2.323 2.323 0 002.344 18h15.312c.793 0 1.526-.406 1.96-1.086.435-.68.505-1.53.187-2.275zm-1.494 1.399a.764.764 0 01-.654.362h-4.92a.79.79 0 00-.782-.8H8.047a.79.79 0 00-.781.8H2.344a.764.764 0 01-.653-.362.801.801 0 01-.089-.688l1.527-2.11H16.87l1.527 2.11a.801.801 0 01-.089.688zM6.308 8.81a.814.814 0 00.03 1.131.769.769 0 001.105-.031 3.396 3.396 0 012.519-1.112H10c.962 0 1.856.395 2.518 1.112a.77.77 0 001.104.031.814.814 0 00.031-1.13 5.033 5.033 0 00-1.509-1.118c.393-.496.63-1.127.63-1.813C12.773 4.292 11.511 3 9.96 3 8.41 3 7.149 4.292 7.149 5.88c0 .693.24 1.33.64 1.827-.552.27-1.056.642-1.481 1.103zM9.96 4.6c.69 0 1.25.574 1.25 1.28 0 .706-.56 1.28-1.25 1.28s-1.25-.574-1.25-1.28c0-.706.56-1.28 1.25-1.28z" fill="#494949"></path></svg><a target="_blank" rel="noreferrer" href="https://webinar.darkreading.com/1316745?keycode=sbx&cid=smartbox_techweb_upcoming_webinars_8.500001216&_mc=smartbox_techweb_upcoming_webinars_8.500001216">Using Zero Trust to Protect Remote and Home Workers</a></li><li class="feed-item"><svg width="20" height="18" fill="none" xmlns="http://www.w3.org/2000/svg" class="feed-item-icon"><path d="M19.803 14.639a.807.807 0 00-.088-.156l-1.822-2.52a.775.775 0 00-.628-.323H3.516V3.2c0-.882.701-1.6 1.563-1.6h9.842c.862 0 1.563.718 1.563 1.6v5.2c0 .442.35.8.781.8a.79.79 0 00.781-.8V3.2c0-1.764-1.402-3.2-3.125-3.2H5.08C3.356 0 1.954 1.436 1.954 3.2v8.976L.285 14.483a.805.805 0 00-.088.156 2.442 2.442 0 00.186 2.275A2.323 2.323 0 002.344 18h15.312c.793 0 1.526-.406 1.96-1.086.435-.68.505-1.53.187-2.275zm-1.494 1.399a.764.764 0 01-.654.362h-4.92a.79.79 0 00-.782-.8H8.047a.79.79 0 00-.781.8H2.344a.764.764 0 01-.653-.362.801.801 0 01-.089-.688l1.527-2.11H16.87l1.527 2.11a.801.801 0 01-.089.688zM6.308 8.81a.814.814 0 00.03 1.131.769.769 0 001.105-.031 3.396 3.396 0 012.519-1.112H10c.962 0 1.856.395 2.518 1.112a.77.77 0 001.104.031.814.814 0 00.031-1.13 5.033 5.033 0 00-1.509-1.118c.393-.496.63-1.127.63-1.813C12.773 4.292 11.511 3 9.96 3 8.41 3 7.149 4.292 7.149 5.88c0 .693.24 1.33.64 1.827-.552.27-1.056.642-1.481 1.103zM9.96 4.6c.69 0 1.25.574 1.25 1.28 0 .706-.56 1.28-1.25 1.28s-1.25-.574-1.25-1.28c0-.706.56-1.28 1.25-1.28z" fill="#494949"></path></svg><a target="_blank" rel="noreferrer" href="https://webinar.darkreading.com/1781964?keycode=sbx&cid=smartbox_techweb_upcoming_webinars_8.500001218&_mc=smartbox_techweb_upcoming_webinars_8.500001218">Strategies for DDoS Resilience and Response</a></li><li class="feed-item"><svg width="20" height="18" fill="none" xmlns="http://www.w3.org/2000/svg" class="feed-item-icon"><path d="M19.803 14.639a.807.807 0 00-.088-.156l-1.822-2.52a.775.775 0 00-.628-.323H3.516V3.2c0-.882.701-1.6 1.563-1.6h9.842c.862 0 1.563.718 1.563 1.6v5.2c0 .442.35.8.781.8a.79.79 0 00.781-.8V3.2c0-1.764-1.402-3.2-3.125-3.2H5.08C3.356 0 1.954 1.436 1.954 3.2v8.976L.285 14.483a.805.805 0 00-.088.156 2.442 2.442 0 00.186 2.275A2.323 2.323 0 002.344 18h15.312c.793 0 1.526-.406 1.96-1.086.435-.68.505-1.53.187-2.275zm-1.494 1.399a.764.764 0 01-.654.362h-4.92a.79.79 0 00-.782-.8H8.047a.79.79 0 00-.781.8H2.344a.764.764 0 01-.653-.362.801.801 0 01-.089-.688l1.527-2.11H16.87l1.527 2.11a.801.801 0 01-.089.688zM6.308 8.81a.814.814 0 00.03 1.131.769.769 0 001.105-.031 3.396 3.396 0 012.519-1.112H10c.962 0 1.856.395 2.518 1.112a.77.77 0 001.104.031.814.814 0 00.031-1.13 5.033 5.033 0 00-1.509-1.118c.393-.496.63-1.127.63-1.813C12.773 4.292 11.511 3 9.96 3 8.41 3 7.149 4.292 7.149 5.88c0 .693.24 1.33.64 1.827-.552.27-1.056.642-1.481 1.103zM9.96 4.6c.69 0 1.25.574 1.25 1.28 0 .706-.56 1.28-1.25 1.28s-1.25-.574-1.25-1.28c0-.706.56-1.28 1.25-1.28z" fill="#494949"></path></svg><a target="_blank" rel="noreferrer" href="https://webinar.darkreading.com/1341545?keycode=sbx&cid=smartbox_techweb_upcoming_webinars_8.500001219&_mc=smartbox_techweb_upcoming_webinars_8.500001219">Next-Gen Security Operations: Building the SOC of the Future</a></li><li class="feed-item"><svg width="20" height="18" fill="none" xmlns="http://www.w3.org/2000/svg" class="feed-item-icon"><path d="M19.803 14.639a.807.807 0 00-.088-.156l-1.822-2.52a.775.775 0 00-.628-.323H3.516V3.2c0-.882.701-1.6 1.563-1.6h9.842c.862 0 1.563.718 1.563 1.6v5.2c0 .442.35.8.781.8a.79.79 0 00.781-.8V3.2c0-1.764-1.402-3.2-3.125-3.2H5.08C3.356 0 1.954 1.436 1.954 3.2v8.976L.285 14.483a.805.805 0 00-.088.156 2.442 2.442 0 00.186 2.275A2.323 2.323 0 002.344 18h15.312c.793 0 1.526-.406 1.96-1.086.435-.68.505-1.53.187-2.275zm-1.494 1.399a.764.764 0 01-.654.362h-4.92a.79.79 0 00-.782-.8H8.047a.79.79 0 00-.781.8H2.344a.764.764 0 01-.653-.362.801.801 0 01-.089-.688l1.527-2.11H16.87l1.527 2.11a.801.801 0 01-.089.688zM6.308 8.81a.814.814 0 00.03 1.131.769.769 0 001.105-.031 3.396 3.396 0 012.519-1.112H10c.962 0 1.856.395 2.518 1.112a.77.77 0 001.104.031.814.814 0 00.031-1.13 5.033 5.033 0 00-1.509-1.118c.393-.496.63-1.127.63-1.813C12.773 4.292 11.511 3 9.96 3 8.41 3 7.149 4.292 7.149 5.88c0 .693.24 1.33.64 1.827-.552.27-1.056.642-1.481 1.103zM9.96 4.6c.69 0 1.25.574 1.25 1.28 0 .706-.56 1.28-1.25 1.28s-1.25-.574-1.25-1.28c0-.706.56-1.28 1.25-1.28z" fill="#494949"></path></svg><a target="_blank" rel="noreferrer" href="https://webinar.darkreading.com/1835400?keycode=sbx&cid=smartbox_techweb_upcoming_webinars_8.500001220&_mc=smartbox_techweb_upcoming_webinars_8.500001220">Hacks That Bypass Multi-Factor Authentication and How to Make Your MFA Solution Phishing Resistant</a></li><li class="feed-item"><svg width="20" height="18" fill="none" xmlns="http://www.w3.org/2000/svg" class="feed-item-icon"><path d="M19.803 14.639a.807.807 0 00-.088-.156l-1.822-2.52a.775.775 0 00-.628-.323H3.516V3.2c0-.882.701-1.6 1.563-1.6h9.842c.862 0 1.563.718 1.563 1.6v5.2c0 .442.35.8.781.8a.79.79 0 00.781-.8V3.2c0-1.764-1.402-3.2-3.125-3.2H5.08C3.356 0 1.954 1.436 1.954 3.2v8.976L.285 14.483a.805.805 0 00-.088.156 2.442 2.442 0 00.186 2.275A2.323 2.323 0 002.344 18h15.312c.793 0 1.526-.406 1.96-1.086.435-.68.505-1.53.187-2.275zm-1.494 1.399a.764.764 0 01-.654.362h-4.92a.79.79 0 00-.782-.8H8.047a.79.79 0 00-.781.8H2.344a.764.764 0 01-.653-.362.801.801 0 01-.089-.688l1.527-2.11H16.87l1.527 2.11a.801.801 0 01-.089.688zM6.308 8.81a.814.814 0 00.03 1.131.769.769 0 001.105-.031 3.396 3.396 0 012.519-1.112H10c.962 0 1.856.395 2.518 1.112a.77.77 0 001.104.031.814.814 0 00.031-1.13 5.033 5.033 0 00-1.509-1.118c.393-.496.63-1.127.63-1.813C12.773 4.292 11.511 3 9.96 3 8.41 3 7.149 4.292 7.149 5.88c0 .693.24 1.33.64 1.827-.552.27-1.056.642-1.481 1.103zM9.96 4.6c.69 0 1.25.574 1.25 1.28 0 .706-.56 1.28-1.25 1.28s-1.25-.574-1.25-1.28c0-.706.56-1.28 1.25-1.28z" fill="#494949"></path></svg><a target="_blank" rel="noreferrer" href="https://darkreading.tradepub.com/c/pubRD.mpl?secure=1&sr=pp&_t=pp:&qf=w_defa3231&ch=sbx&cid=smartbox_techweb_upcoming_webinars_8.500001221&_mc=smartbox_techweb_upcoming_webinars_8.500001221">Threat Hunting Today: The Tools and Techniques That Get You Out in Front of Criminals</a></li></ul><div class="readmore-link"><a target="_blank" rel="noreferrer" href="https://www.darkreading.com/upcoming-webinars">More Webinars</a></div></div><div id="rhc-reports" class="smartbox " type="Reports"><div class="smartbox-title">Reports</div><ul class="feed"><li class="feed-item"><svg width="24" height="24" fill="none" xmlns="http://www.w3.org/2000/svg" class="feed-item-icon"><path d="M21.33 2H2.662a.667.667 0 100 1.333h.666v.666a.666.666 0 001.334 0v-.666h14.666v10.662H4.663v-7.33a.666.666 0 00-1.334 0v7.996a.666.666 0 00.667.667h7.333v2.788a2 2 0 101.334 0v-2.788h7.333a.667.667 0 00.667-.667V3.333h.666a.667.667 0 100-1.333zm-9.334 18.659a.666.666 0 110-1.332.666.666 0 010 1.332z" fill="#494949"></path><path d="M7.8 11.134l2.862-2.86 2.196 2.194a.667.667 0 00.942 0l3.334-3.332a.665.665 0 10-.943-.942l-2.862 2.86-2.195-2.194a.667.667 0 00-.943 0l-3.333 3.332a.667.667 0 10.942.942z" fill="#494949"></path></svg><a target="_blank" rel="noreferrer" href="https://www.informationweek.com/whitepaper/security-monitoring/cloud-security/breaches-prompt-changes-to-enterprise-ir-plans-and-processes/439583?cid=smartbox_techweb_analytics_7.300005941&_mc=smartbox_techweb_analytics_7.300005941">Breaches Prompt Changes to Enterprise IR Plans and Processes</a></li><li class="feed-item"><svg width="24" height="24" fill="none" xmlns="http://www.w3.org/2000/svg" class="feed-item-icon"><path d="M21.33 2H2.662a.667.667 0 100 1.333h.666v.666a.666.666 0 001.334 0v-.666h14.666v10.662H4.663v-7.33a.666.666 0 00-1.334 0v7.996a.666.666 0 00.667.667h7.333v2.788a2 2 0 101.334 0v-2.788h7.333a.667.667 0 00.667-.667V3.333h.666a.667.667 0 100-1.333zm-9.334 18.659a.666.666 0 110-1.332.666.666 0 010 1.332z" fill="#494949"></path><path d="M7.8 11.134l2.862-2.86 2.196 2.194a.667.667 0 00.942 0l3.334-3.332a.665.665 0 10-.943-.942l-2.862 2.86-2.195-2.194a.667.667 0 00-.943 0l-3.333 3.332a.667.667 0 10.942.942z" fill="#494949"></path></svg><a target="_blank" rel="noreferrer" href="https://www.informationweek.com/whitepaper/network-and-perimeter-security/endpoint-security/implementing-zero-trust-in-your-enterprise-how-to-get-started/441133?cid=smartbox_techweb_analytics_7.300005940&_mc=smartbox_techweb_analytics_7.300005940">Implementing Zero Trust In Your Enterprise: How to Get Started</a></li><li class="feed-item"><svg width="24" height="24" fill="none" xmlns="http://www.w3.org/2000/svg" class="feed-item-icon"><path d="M21.33 2H2.662a.667.667 0 100 1.333h.666v.666a.666.666 0 001.334 0v-.666h14.666v10.662H4.663v-7.33a.666.666 0 00-1.334 0v7.996a.666.666 0 00.667.667h7.333v2.788a2 2 0 101.334 0v-2.788h7.333a.667.667 0 00.667-.667V3.333h.666a.667.667 0 100-1.333zm-9.334 18.659a.666.666 0 110-1.332.666.666 0 010 1.332z" fill="#494949"></path><path d="M7.8 11.134l2.862-2.86 2.196 2.194a.667.667 0 00.942 0l3.334-3.332a.665.665 0 10-.943-.942l-2.862 2.86-2.195-2.194a.667.667 0 00-.943 0l-3.333 3.332a.667.667 0 10.942.942z" fill="#494949"></path></svg><a target="_blank" rel="noreferrer" href="https://www.informationweek.com/whitepaper/endpoint-security/network-and-perimeter-security/6-elements-of-a-solid-iot-security-strategy/439873?cid=smartbox_techweb_analytics_7.300005939&_mc=smartbox_techweb_analytics_7.300005939">6 Elements of a Solid IoT Security Strategy</a></li><li class="feed-item"><svg width="24" height="24" fill="none" xmlns="http://www.w3.org/2000/svg" class="feed-item-icon"><path d="M21.33 2H2.662a.667.667 0 100 1.333h.666v.666a.666.666 0 001.334 0v-.666h14.666v10.662H4.663v-7.33a.666.666 0 00-1.334 0v7.996a.666.666 0 00.667.667h7.333v2.788a2 2 0 101.334 0v-2.788h7.333a.667.667 0 00.667-.667V3.333h.666a.667.667 0 100-1.333zm-9.334 18.659a.666.666 0 110-1.332.666.666 0 010 1.332z" fill="#494949"></path><path d="M7.8 11.134l2.862-2.86 2.196 2.194a.667.667 0 00.942 0l3.334-3.332a.665.665 0 10-.943-.942l-2.862 2.86-2.195-2.194a.667.667 0 00-.943 0l-3.333 3.332a.667.667 0 10.942.942z" fill="#494949"></path></svg><a target="_blank" rel="noreferrer" href="https://www.informationweek.com/whitepaper/network-and-perimeter-security/networking/incorporating-a-prevention-mindset-into-threat-detection-and-response/439373?cid=smartbox_techweb_analytics_7.300005934&_mc=smartbox_techweb_analytics_7.300005934">Incorporating a Prevention Mindset into Threat Detection and Response</a></li><li class="feed-item"><svg width="24" height="24" fill="none" xmlns="http://www.w3.org/2000/svg" class="feed-item-icon"><path d="M21.33 2H2.662a.667.667 0 100 1.333h.666v.666a.666.666 0 001.334 0v-.666h14.666v10.662H4.663v-7.33a.666.666 0 00-1.334 0v7.996a.666.666 0 00.667.667h7.333v2.788a2 2 0 101.334 0v-2.788h7.333a.667.667 0 00.667-.667V3.333h.666a.667.667 0 100-1.333zm-9.334 18.659a.666.666 0 110-1.332.666.666 0 010 1.332z" fill="#494949"></path><path d="M7.8 11.134l2.862-2.86 2.196 2.194a.667.667 0 00.942 0l3.334-3.332a.665.665 0 10-.943-.942l-2.862 2.86-2.195-2.194a.667.667 0 00-.943 0l-3.333 3.332a.667.667 0 10.942.942z" fill="#494949"></path></svg><a target="_blank" rel="noreferrer" href="https://www.informationweek.com/whitepaper/cloud-security/network-and-perimeter-security/practical-network-security-approaches-for-a-multicloud,-hybrid-it-world/438913?cid=smartbox_techweb_analytics_7.300005932&_mc=smartbox_techweb_analytics_7.300005932">Practical Network Security Approaches for a Multicloud, Hybrid IT World</a></li></ul><div class="readmore-link"><a target="_blank" rel="noreferrer" href="https://www.darkreading.com/must-reads">More Reports</a></div></div><div class="native-right-ads"><div class="informa-dfp-ads" data-name="Native_right_1v" data-size="fluid" data-targeting="pos=native_right_1v"></div></div><div id="rhc-whitePapers" class="smartbox " type="Whitepapers"><div class="smartbox-title">White Papers</div><ul class="feed"><li class="feed-item"><svg width="24" height="24" fill="none" xmlns="http://www.w3.org/2000/svg" class="feed-item-icon"><g clip-path="url(#whitepaper_svg__clip0)" fill="#494949"><path d="M19.997 18H6.666a.669.669 0 00-.67.669V20a.669.669 0 11-1.33 0V4a.669.669 0 01.662-.669h11.338a.669.669 0 01.662.669v12a.669.669 0 001.331 0V4a2 2 0 00-1.993-2H5.328a2 2 0 00-2 2v16a2 2 0 004 0v-.669h12V20a.669.669 0 01-.669.669h-10a.668.668 0 100 1.331h10a2 2 0 002-2v-1.331a.669.669 0 00-.662-.669z"></path><path d="M13.996 7H10.67a.668.668 0 110-1.331h3.325a.67.67 0 110 1.33zM13.996 11.375H10.67a.669.669 0 010-1.331h3.325a.67.67 0 010 1.331zM13.996 15.681H10.67a.67.67 0 110-1.331h3.325a.668.668 0 110 1.331zM8.003 7a.669.669 0 11.251-.049.669.669 0 01-.258.05h.007zM8.003 11.375a.669.669 0 11.251-.049.67.67 0 01-.258.05h.007zM8.003 15.681a.669.669 0 11.251-.049.666.666 0 01-.258.05h.007z"></path></g><defs><clipPath id="whitepaper_svg__clip0"><path fill="#fff" transform="translate(1.996 2)" d="M0 0h20v20H0z"></path></clipPath></defs></svg><a target="_blank" rel="noreferrer" href="https://www.informationweek.com/whitepaper/cybersecurity/security/ransomware-is-on-the-rise/442203?keycode=sbx&cid=smartbox_techweb_whitepaper_14.500005226&_mc=smartbox_techweb_whitepaper_14.500005226">Ransomware Is On The Rise</a></li><li class="feed-item"><svg width="24" height="24" fill="none" xmlns="http://www.w3.org/2000/svg" class="feed-item-icon"><g clip-path="url(#whitepaper_svg__clip0)" fill="#494949"><path d="M19.997 18H6.666a.669.669 0 00-.67.669V20a.669.669 0 11-1.33 0V4a.669.669 0 01.662-.669h11.338a.669.669 0 01.662.669v12a.669.669 0 001.331 0V4a2 2 0 00-1.993-2H5.328a2 2 0 00-2 2v16a2 2 0 004 0v-.669h12V20a.669.669 0 01-.669.669h-10a.668.668 0 100 1.331h10a2 2 0 002-2v-1.331a.669.669 0 00-.662-.669z"></path><path d="M13.996 7H10.67a.668.668 0 110-1.331h3.325a.67.67 0 110 1.33zM13.996 11.375H10.67a.669.669 0 010-1.331h3.325a.67.67 0 010 1.331zM13.996 15.681H10.67a.67.67 0 110-1.331h3.325a.668.668 0 110 1.331zM8.003 7a.669.669 0 11.251-.049.669.669 0 01-.258.05h.007zM8.003 11.375a.669.669 0 11.251-.049.67.67 0 01-.258.05h.007zM8.003 15.681a.669.669 0 11.251-.049.666.666 0 01-.258.05h.007z"></path></g><defs><clipPath id="whitepaper_svg__clip0"><path fill="#fff" transform="translate(1.996 2)" d="M0 0h20v20H0z"></path></clipPath></defs></svg><a target="_blank" rel="noreferrer" href="https://www.informationweek.com/whitepaper/cybersecurity/security-monitoring/your-digital-transformation-is-being-sabotaged-the-surprising-impact-of-sophisticated-bots/440933?keycode=sbx&cid=smartbox_techweb_whitepaper_14.500005215&_mc=smartbox_techweb_whitepaper_14.500005215">Your Digital Transformation Is Being Sabotaged - The Surprising Impact of Sophisticated Bots</a></li><li class="feed-item"><svg width="24" height="24" fill="none" xmlns="http://www.w3.org/2000/svg" class="feed-item-icon"><g clip-path="url(#whitepaper_svg__clip0)" fill="#494949"><path d="M19.997 18H6.666a.669.669 0 00-.67.669V20a.669.669 0 11-1.33 0V4a.669.669 0 01.662-.669h11.338a.669.669 0 01.662.669v12a.669.669 0 001.331 0V4a2 2 0 00-1.993-2H5.328a2 2 0 00-2 2v16a2 2 0 004 0v-.669h12V20a.669.669 0 01-.669.669h-10a.668.668 0 100 1.331h10a2 2 0 002-2v-1.331a.669.669 0 00-.662-.669z"></path><path d="M13.996 7H10.67a.668.668 0 110-1.331h3.325a.67.67 0 110 1.33zM13.996 11.375H10.67a.669.669 0 010-1.331h3.325a.67.67 0 010 1.331zM13.996 15.681H10.67a.67.67 0 110-1.331h3.325a.668.668 0 110 1.331zM8.003 7a.669.669 0 11.251-.049.669.669 0 01-.258.05h.007zM8.003 11.375a.669.669 0 11.251-.049.67.67 0 01-.258.05h.007zM8.003 15.681a.669.669 0 11.251-.049.666.666 0 01-.258.05h.007z"></path></g><defs><clipPath id="whitepaper_svg__clip0"><path fill="#fff" transform="translate(1.996 2)" d="M0 0h20v20H0z"></path></clipPath></defs></svg><a target="_blank" rel="noreferrer" href="https://www.informationweek.com/whitepaper/security-monitoring/security-platforms/extended-detection-and-response-(xdr)-beginner's-guide/432383?keycode=sbx&cid=smartbox_techweb_whitepaper_14.500005203&_mc=smartbox_techweb_whitepaper_14.500005203">Extended Detection and Response (XDR) - Beginner's Guide</a></li><li class="feed-item"><svg width="24" height="24" fill="none" xmlns="http://www.w3.org/2000/svg" class="feed-item-icon"><g clip-path="url(#whitepaper_svg__clip0)" fill="#494949"><path d="M19.997 18H6.666a.669.669 0 00-.67.669V20a.669.669 0 11-1.33 0V4a.669.669 0 01.662-.669h11.338a.669.669 0 01.662.669v12a.669.669 0 001.331 0V4a2 2 0 00-1.993-2H5.328a2 2 0 00-2 2v16a2 2 0 004 0v-.669h12V20a.669.669 0 01-.669.669h-10a.668.668 0 100 1.331h10a2 2 0 002-2v-1.331a.669.669 0 00-.662-.669z"></path><path d="M13.996 7H10.67a.668.668 0 110-1.331h3.325a.67.67 0 110 1.33zM13.996 11.375H10.67a.669.669 0 010-1.331h3.325a.67.67 0 010 1.331zM13.996 15.681H10.67a.67.67 0 110-1.331h3.325a.668.668 0 110 1.331zM8.003 7a.669.669 0 11.251-.049.669.669 0 01-.258.05h.007zM8.003 11.375a.669.669 0 11.251-.049.67.67 0 01-.258.05h.007zM8.003 15.681a.669.669 0 11.251-.049.666.666 0 01-.258.05h.007z"></path></g><defs><clipPath id="whitepaper_svg__clip0"><path fill="#fff" transform="translate(1.996 2)" d="M0 0h20v20H0z"></path></clipPath></defs></svg><a target="_blank" rel="noreferrer" href="https://www.informationweek.com/whitepaper/risk-management-security/cybersecurity/esg-investing-in-incident-readiness/437723?keycode=sbx&cid=smartbox_techweb_whitepaper_14.500005196&_mc=smartbox_techweb_whitepaper_14.500005196">ESG: Investing in Incident Readiness</a></li><li class="feed-item"><svg width="24" height="24" fill="none" xmlns="http://www.w3.org/2000/svg" class="feed-item-icon"><g clip-path="url(#whitepaper_svg__clip0)" fill="#494949"><path d="M19.997 18H6.666a.669.669 0 00-.67.669V20a.669.669 0 11-1.33 0V4a.669.669 0 01.662-.669h11.338a.669.669 0 01.662.669v12a.669.669 0 001.331 0V4a2 2 0 00-1.993-2H5.328a2 2 0 00-2 2v16a2 2 0 004 0v-.669h12V20a.669.669 0 01-.669.669h-10a.668.668 0 100 1.331h10a2 2 0 002-2v-1.331a.669.669 0 00-.662-.669z"></path><path d="M13.996 7H10.67a.668.668 0 110-1.331h3.325a.67.67 0 110 1.33zM13.996 11.375H10.67a.669.669 0 010-1.331h3.325a.67.67 0 010 1.331zM13.996 15.681H10.67a.67.67 0 110-1.331h3.325a.668.668 0 110 1.331zM8.003 7a.669.669 0 11.251-.049.669.669 0 01-.258.05h.007zM8.003 11.375a.669.669 0 11.251-.049.67.67 0 01-.258.05h.007zM8.003 15.681a.669.669 0 11.251-.049.666.666 0 01-.258.05h.007z"></path></g><defs><clipPath id="whitepaper_svg__clip0"><path fill="#fff" transform="translate(1.996 2)" d="M0 0h20v20H0z"></path></clipPath></defs></svg><a target="_blank" rel="noreferrer" href="https://www.informationweek.com/whitepaper/cybersecurity/security/building-operational-resilience-in-industrial-and-critical-infrastructure/439543?keycode=sbx&cid=smartbox_techweb_whitepaper_14.500005188&_mc=smartbox_techweb_whitepaper_14.500005188">Building Operational Resilience in Industrial & Critical Infrastructure</a></li></ul><div class="readmore-link"><a target="_blank" rel="noreferrer" href="https://www.informationweek.com/whitepaper/Security">More White Papers</a></div></div><div id="rhc-events" class="smartbox " type="Live Events"><div class="smartbox-title">Events</div><ul class="feed"><li class="feed-item"><svg width="20" height="20" fill="none" xmlns="http://www.w3.org/2000/svg" class="feed-item-icon"><path d="M7.376.79c0-.436.354-.79.79-.79h8.312a2.354 2.354 0 012.351 2.351v6.82h.38a.791.791 0 010 1.58h-7.765a.791.791 0 010-1.58h5.805V2.35a.772.772 0 00-.771-.77H8.166a.791.791 0 01-.79-.79zM.79 12.117c.436 0 .79-.354.79-.79V7.776c0-.425.346-.771.771-.771h3.067c.247 0 .477.117.622.315l1.582 3.009a.785.785 0 00.466.387.785.785 0 00.603-.056.793.793 0 00.33-1.067L7.416 6.541a.785.785 0 00-.041-.07 2.357 2.357 0 00-1.902-1.047H2.351a2.354 2.354 0 00-2.35 2.352v3.55c0 .437.354.791.79.791zm.771-9.766A2.354 2.354 0 013.912 0a2.354 2.354 0 012.351 2.351 2.354 2.354 0 01-2.35 2.351 2.354 2.354 0 01-2.352-2.35zm1.58 0a.772.772 0 001.542 0 .772.772 0 00-1.542 0zm16.83 16.073A1.306 1.306 0 0118.696 20H1.305a1.306 1.306 0 01-1.277-1.574 3.848 3.848 0 011.809-2.522 2.337 2.337 0 01-.393-1.3 2.354 2.354 0 012.351-2.35 2.354 2.354 0 012.351 2.35c0 .481-.145.928-.393 1.3a3.824 3.824 0 011.145 1.034 3.847 3.847 0 011.144-1.034 2.338 2.338 0 01-.393-1.3A2.354 2.354 0 0110 12.255a2.354 2.354 0 012.351 2.35c0 .481-.145.928-.393 1.3a3.805 3.805 0 011.144 1.034 3.841 3.841 0 011.144-1.034 2.337 2.337 0 01-.392-1.3 2.354 2.354 0 012.35-2.35 2.354 2.354 0 012.352 2.35 2.353 2.353 0 01-2.31 2.351l-.02.001h-.042c-.944 0-1.78.599-2.104 1.464h4.346a.792.792 0 01.604-.606.083.083 0 01.007-.001h.001a.794.794 0 01.934.61zm-4.537-3.82a.772.772 0 001.542 0 .772.772 0 00-1.542 0zm-12.41 0a.772.772 0 001.542 0 .772.772 0 00-1.542 0zm2.897 3.815a2.258 2.258 0 00-2.105-1.463h-.041c-.944 0-1.782.599-2.105 1.463h4.25zm3.308-3.814a.772.772 0 001.542 0 .772.772 0 00-1.542 0zm2.896 3.814a2.258 2.258 0 00-2.105-1.463h-.04c-.944 0-1.781.599-2.105 1.463h4.25z" fill="#494949"></path></svg><a target="_blank" rel="noreferrer" href="https://vts.informaengage.com/dark-reading-understanding-cyber-attackers-and-their-methods/?kcode=sbx&cid=smartbox_techweb_session_16.500277&_mc=smartbox_techweb_session_16.500277">Understanding Cyber Attackers - A Dark Reading Nov 17 Event</a></li><li class="feed-item"><svg width="20" height="20" fill="none" xmlns="http://www.w3.org/2000/svg" class="feed-item-icon"><path d="M7.376.79c0-.436.354-.79.79-.79h8.312a2.354 2.354 0 012.351 2.351v6.82h.38a.791.791 0 010 1.58h-7.765a.791.791 0 010-1.58h5.805V2.35a.772.772 0 00-.771-.77H8.166a.791.791 0 01-.79-.79zM.79 12.117c.436 0 .79-.354.79-.79V7.776c0-.425.346-.771.771-.771h3.067c.247 0 .477.117.622.315l1.582 3.009a.785.785 0 00.466.387.785.785 0 00.603-.056.793.793 0 00.33-1.067L7.416 6.541a.785.785 0 00-.041-.07 2.357 2.357 0 00-1.902-1.047H2.351a2.354 2.354 0 00-2.35 2.352v3.55c0 .437.354.791.79.791zm.771-9.766A2.354 2.354 0 013.912 0a2.354 2.354 0 012.351 2.351 2.354 2.354 0 01-2.35 2.351 2.354 2.354 0 01-2.352-2.35zm1.58 0a.772.772 0 001.542 0 .772.772 0 00-1.542 0zm16.83 16.073A1.306 1.306 0 0118.696 20H1.305a1.306 1.306 0 01-1.277-1.574 3.848 3.848 0 011.809-2.522 2.337 2.337 0 01-.393-1.3 2.354 2.354 0 012.351-2.35 2.354 2.354 0 012.351 2.35c0 .481-.145.928-.393 1.3a3.824 3.824 0 011.145 1.034 3.847 3.847 0 011.144-1.034 2.338 2.338 0 01-.393-1.3A2.354 2.354 0 0110 12.255a2.354 2.354 0 012.351 2.35c0 .481-.145.928-.393 1.3a3.805 3.805 0 011.144 1.034 3.841 3.841 0 011.144-1.034 2.337 2.337 0 01-.392-1.3 2.354 2.354 0 012.35-2.35 2.354 2.354 0 012.352 2.35 2.353 2.353 0 01-2.31 2.351l-.02.001h-.042c-.944 0-1.78.599-2.104 1.464h4.346a.792.792 0 01.604-.606.083.083 0 01.007-.001h.001a.794.794 0 01.934.61zm-4.537-3.82a.772.772 0 001.542 0 .772.772 0 00-1.542 0zm-12.41 0a.772.772 0 001.542 0 .772.772 0 00-1.542 0zm2.897 3.815a2.258 2.258 0 00-2.105-1.463h-.041c-.944 0-1.782.599-2.105 1.463h4.25zm3.308-3.814a.772.772 0 001.542 0 .772.772 0 00-1.542 0zm2.896 3.814a2.258 2.258 0 00-2.105-1.463h-.04c-.944 0-1.781.599-2.105 1.463h4.25z" fill="#494949"></path></svg><a target="_blank" rel="noreferrer" href="https://blackhatmea.com/?cid=smartbox_techweb_session_16.500274&_mc=smartbox_techweb_session_16.500274">Black Hat Middle East & Africa - November 15-17 - Learn More</a></li><li class="feed-item"><svg width="20" height="20" fill="none" xmlns="http://www.w3.org/2000/svg" class="feed-item-icon"><path d="M7.376.79c0-.436.354-.79.79-.79h8.312a2.354 2.354 0 012.351 2.351v6.82h.38a.791.791 0 010 1.58h-7.765a.791.791 0 010-1.58h5.805V2.35a.772.772 0 00-.771-.77H8.166a.791.791 0 01-.79-.79zM.79 12.117c.436 0 .79-.354.79-.79V7.776c0-.425.346-.771.771-.771h3.067c.247 0 .477.117.622.315l1.582 3.009a.785.785 0 00.466.387.785.785 0 00.603-.056.793.793 0 00.33-1.067L7.416 6.541a.785.785 0 00-.041-.07 2.357 2.357 0 00-1.902-1.047H2.351a2.354 2.354 0 00-2.35 2.352v3.55c0 .437.354.791.79.791zm.771-9.766A2.354 2.354 0 013.912 0a2.354 2.354 0 012.351 2.351 2.354 2.354 0 01-2.35 2.351 2.354 2.354 0 01-2.352-2.35zm1.58 0a.772.772 0 001.542 0 .772.772 0 00-1.542 0zm16.83 16.073A1.306 1.306 0 0118.696 20H1.305a1.306 1.306 0 01-1.277-1.574 3.848 3.848 0 011.809-2.522 2.337 2.337 0 01-.393-1.3 2.354 2.354 0 012.351-2.35 2.354 2.354 0 012.351 2.35c0 .481-.145.928-.393 1.3a3.824 3.824 0 011.145 1.034 3.847 3.847 0 011.144-1.034 2.338 2.338 0 01-.393-1.3A2.354 2.354 0 0110 12.255a2.354 2.354 0 012.351 2.35c0 .481-.145.928-.393 1.3a3.805 3.805 0 011.144 1.034 3.841 3.841 0 011.144-1.034 2.337 2.337 0 01-.392-1.3 2.354 2.354 0 012.35-2.35 2.354 2.354 0 012.352 2.35 2.353 2.353 0 01-2.31 2.351l-.02.001h-.042c-.944 0-1.78.599-2.104 1.464h4.346a.792.792 0 01.604-.606.083.083 0 01.007-.001h.001a.794.794 0 01.934.61zm-4.537-3.82a.772.772 0 001.542 0 .772.772 0 00-1.542 0zm-12.41 0a.772.772 0 001.542 0 .772.772 0 00-1.542 0zm2.897 3.815a2.258 2.258 0 00-2.105-1.463h-.041c-.944 0-1.782.599-2.105 1.463h4.25zm3.308-3.814a.772.772 0 001.542 0 .772.772 0 00-1.542 0zm2.896 3.814a2.258 2.258 0 00-2.105-1.463h-.04c-.944 0-1.781.599-2.105 1.463h4.25z" fill="#494949"></path></svg><a target="_blank" rel="noreferrer" href="https://sector.ca/?cid=smartbox_techweb_session_16.500271&_mc=smartbox_techweb_session_16.500271">SecTor - Canada's IT Security Conference Oct 1-6 - Learn More</a></li></ul><div class="readmore-link"><a target="_blank" rel="noreferrer" href="https://www.darkreading.com/upcoming-events">More Events</a></div></div></div><div class="w-100 d-lg-none mt-4"><div class="more-insights mt-2"><div class="title">More Insights</div><div class="container"><div class="row"><div id="articleFooter-moreInsights-" class="smartbox col-md-4"><div class="smartbox-title">White Papers</div><ul class="feed"><li class="feed-item"><div class="bullet-container square"><svg width="8" height="8" fill="none" xmlns="http://www.w3.org/2000/svg" alt="White Papers" class="icon-bullet square"><path fill="#181C21" d="M0 0h8v8H0z"></path></svg><svg width="8" height="8" fill="none" xmlns="http://www.w3.org/2000/svg" alt="White Papers" class="icon-bullet-on-hover square"><path fill="#9F110D" d="M0 0h8v8H0z"></path></svg></div><a target="_blank" rel="noreferrer" href="https://www.informationweek.com/whitepaper/cybersecurity/security/ransomware-is-on-the-rise/442203?keycode=sbx&cid=smartbox_techweb_whitepaper_14.500005226&_mc=smartbox_techweb_whitepaper_14.500005226">Ransomware Is On The Rise</a></li><li class="feed-item"><div class="bullet-container square"><svg width="8" height="8" fill="none" xmlns="http://www.w3.org/2000/svg" alt="White Papers" class="icon-bullet square"><path fill="#181C21" d="M0 0h8v8H0z"></path></svg><svg width="8" height="8" fill="none" xmlns="http://www.w3.org/2000/svg" alt="White Papers" class="icon-bullet-on-hover square"><path fill="#9F110D" d="M0 0h8v8H0z"></path></svg></div><a target="_blank" rel="noreferrer" href="https://www.informationweek.com/whitepaper/cybersecurity/security-monitoring/your-digital-transformation-is-being-sabotaged-the-surprising-impact-of-sophisticated-bots/440933?keycode=sbx&cid=smartbox_techweb_whitepaper_14.500005215&_mc=smartbox_techweb_whitepaper_14.500005215">Your Digital Transformation Is Being Sabotaged - The Surprising Impact of Sophisticated Bots</a></li></ul><div class="readmore-link"><a target="_blank" rel="noreferrer" href="https://www.informationweek.com/whitepaper/Security">More White Papers</a></div></div><div id="articleFooter-moreInsights-" class="smartbox col-md-4"><div class="smartbox-title">Webinars</div><ul class="feed"><li class="feed-item"><div class="bullet-container square"><svg width="8" height="8" fill="none" xmlns="http://www.w3.org/2000/svg" alt="Webinars" class="icon-bullet square"><path fill="#181C21" d="M0 0h8v8H0z"></path></svg><svg width="8" height="8" fill="none" xmlns="http://www.w3.org/2000/svg" alt="Webinars" class="icon-bullet-on-hover square"><path fill="#9F110D" d="M0 0h8v8H0z"></path></svg></div><a target="_blank" rel="noreferrer" href="https://webinar.darkreading.com/1316745?keycode=sbx&cid=smartbox_techweb_upcoming_webinars_8.500001216&_mc=smartbox_techweb_upcoming_webinars_8.500001216">Using Zero Trust to Protect Remote and Home Workers</a></li><li class="feed-item"><div class="bullet-container square"><svg width="8" height="8" fill="none" xmlns="http://www.w3.org/2000/svg" alt="Webinars" class="icon-bullet square"><path fill="#181C21" d="M0 0h8v8H0z"></path></svg><svg width="8" height="8" fill="none" xmlns="http://www.w3.org/2000/svg" alt="Webinars" class="icon-bullet-on-hover square"><path fill="#9F110D" d="M0 0h8v8H0z"></path></svg></div><a target="_blank" rel="noreferrer" href="https://webinar.darkreading.com/1781964?keycode=sbx&cid=smartbox_techweb_upcoming_webinars_8.500001218&_mc=smartbox_techweb_upcoming_webinars_8.500001218">Strategies for DDoS Resilience and Response</a></li></ul><div class="readmore-link"><a target="_blank" rel="noreferrer" href="https://www.darkreading.com/upcoming-webinars">More Webinars</a></div></div><div id="articleFooter-moreInsights-" class="smartbox col-md-4"><div class="smartbox-title">Reports</div><ul class="feed"><li class="feed-item"><div class="bullet-container square"><svg width="8" height="8" fill="none" xmlns="http://www.w3.org/2000/svg" alt="Reports" class="icon-bullet square"><path fill="#181C21" d="M0 0h8v8H0z"></path></svg><svg width="8" height="8" fill="none" xmlns="http://www.w3.org/2000/svg" alt="Reports" class="icon-bullet-on-hover square"><path fill="#9F110D" d="M0 0h8v8H0z"></path></svg></div><a target="_blank" rel="noreferrer" href="https://www.informationweek.com/whitepaper/security-monitoring/cloud-security/breaches-prompt-changes-to-enterprise-ir-plans-and-processes/439583?cid=smartbox_techweb_analytics_7.300005941&_mc=smartbox_techweb_analytics_7.300005941">Breaches Prompt Changes to Enterprise IR Plans and Processes</a></li><li class="feed-item"><div class="bullet-container square"><svg width="8" height="8" fill="none" xmlns="http://www.w3.org/2000/svg" alt="Reports" class="icon-bullet square"><path fill="#181C21" d="M0 0h8v8H0z"></path></svg><svg width="8" height="8" fill="none" xmlns="http://www.w3.org/2000/svg" alt="Reports" class="icon-bullet-on-hover square"><path fill="#9F110D" d="M0 0h8v8H0z"></path></svg></div><a target="_blank" rel="noreferrer" href="https://www.informationweek.com/whitepaper/network-and-perimeter-security/endpoint-security/implementing-zero-trust-in-your-enterprise-how-to-get-started/441133?cid=smartbox_techweb_analytics_7.300005940&_mc=smartbox_techweb_analytics_7.300005940">Implementing Zero Trust In Your Enterprise: How to Get Started</a></li></ul><div class="readmore-link"><a target="_blank" rel="noreferrer" href="https://www.darkreading.com/must-reads">More Reports</a></div></div></div></div></div></div></div></div></div><script defer="" src="https://code.jquery.com/jquery-3.3.1.slim.min.js"></script><script defer="" src="https://cdnjs.cloudflare.com/ajax/libs/popper.js/1.14.0/umd/popper.min.js"></script><script defer="" src="https://stackpath.bootstrapcdn.com/bootstrap/4.1.0/js/bootstrap.min.js"></script></main><footer><div class="container"><div class="row"><div class="col-lg-5"><h4 class="f-nav-title">Discover More From Informa Tech</h4><div class="nav-2-col"><ul class="nav-2-col-ul-left"><li><a href="https://www.interop.com/" rel="noreferrer" target="_blank">Interop</a></li><li><a href="https://www.informationweek.com/" rel="noreferrer" target="_blank">InformationWeek</a></li><li><a href="https://www.networkcomputing.com/" rel="noreferrer" target="_blank">Network Computing</a></li><li><a href="https://www.itprotoday.com/" rel="noreferrer" target="_blank">ITPro Today</a></li></ul><ul class="nav-2-col-ul-right"><li><a href="https://www.datacenterknowledge.com/" rel="noreferrer" target="_blank">Data Center Knowledge</a></li><li><a href="https://www.blackhat.com/" rel="noreferrer" target="_blank">Black Hat</a></li><li><a href="http://www.omdia.com/" rel="noreferrer" target="_blank">Omdia</a></li></ul></div></div><div class="col-lg-3"><h4 class="f-nav-title">Working With Us</h4><ul class="nav-2-col-ul-left"><li><a href="https://www.darkreading.com/about-us" rel="noreferrer" target="_blank">About Us</a></li><li><a href="https://www.darkreading.com/advertise" rel="noreferrer" target="_blank">Advertise</a></li><li><a href="https://info.wrightsmedia.com/informa-licensing-reprints-request" rel="noreferrer" target="_blank">Reprints</a></li></ul></div><div class="col-lg-4"><h4 class="f-nav-title f-nav-social-networks text-lg-left">Follow Dark Reading On Social</h4><div class="f-social-networks"><ul class="d-flex justify-content-lg-start w-100"><li class="social-icon-wrap"><a href="https://www.darkreading.com/rss.xml" rel="noreferrer" target="_blank"><svg width="16" height="16" viewBox="0 0 1792 1792" xmlns="http://www.w3.org/2000/svg"><path d="M576 1344q0 80-56 136t-136 56-136-56-56-136 56-136 136-56 136 56 56 136zm512 123q2 28-17 48-18 21-47 21H889q-25 0-43-16.5t-20-41.5q-22-229-184.5-391.5T250 902q-25-2-41.5-20T192 839V704q0-29 21-47 17-17 43-17h5q160 13 306 80.5T826 902q114 113 181.5 259t80.5 306zm512 2q2 27-18 47-18 20-46 20h-143q-26 0-44.5-17.5T1329 1476q-12-215-101-408.5t-231.5-336-336-231.5T252 398q-25-1-42.5-19.5T192 335V192q0-28 20-46 18-18 44-18h3q262 13 501.5 120T1186 542q187 186 294 425.5t120 501.5z"></path></svg></a></li><li class="social-icon-wrap"><a href="https://twitter.com/DarkReading" rel="noreferrer" target="_blank"><svg width="16" height="16" viewBox="0 0 1792 1792" xmlns="http://www.w3.org/2000/svg"><path d="M1684 408q-67 98-162 167 1 14 1 42 0 130-38 259.5T1369.5 1125 1185 1335.5t-258 146-323 54.5q-271 0-496-145 35 4 78 4 225 0 401-138-105-2-188-64.5T285 1033q33 5 61 5 43 0 85-11-112-23-185.5-111.5T172 710v-4q68 38 146 41-66-44-105-115t-39-154q0-88 44-163 121 149 294.5 238.5T884 653q-8-38-8-74 0-134 94.5-228.5T1199 256q140 0 236 102 109-21 205-78-37 115-142 178 93-10 186-50z"></path></svg></a></li><li class="social-icon-wrap"><a href="https://www.linkedin.com/company/dark-reading/" rel="noreferrer" target="_blank"><svg width="16" height="16" viewBox="0 0 1792 1792" xmlns="http://www.w3.org/2000/svg"><path d="M477 625v991H147V625h330zm21-306q1 73-50.5 122T312 490h-2q-82 0-132-49t-50-122q0-74 51.5-122.5T314 148t133 48.5T498 319zm1166 729v568h-329v-530q0-105-40.5-164.5T1168 862q-63 0-105.5 34.5T999 982q-11 30-11 81v553H659q2-399 2-647t-1-296l-1-48h329v144h-2q20-32 41-56t56.5-52 87-43.5T1285 602q171 0 275 113.5t104 332.5z"></path></svg></a></li><li class="social-icon-wrap"><a href="https://www.facebook.com/darkreadingcom" rel="noreferrer" target="_blank"><svg width="16" height="16" viewBox="0 0 1792 1792" xmlns="http://www.w3.org/2000/svg"><path d="M1343 12v264h-157q-86 0-116 36t-30 108v189h293l-39 296h-254v759H734V905H479V609h255V391q0-186 104-288.5T1115 0q147 0 228 12z"></path></svg></a></li><li class="social-icon-wrap"><a href="https://news.google.com/publications/CAAqBwgKMKmknwswtq63Aw?ceid=US:en&oc=3" rel="noreferrer" target="_blank"><svg width="17" height="17" fill="none" xmlns="http://www.w3.org/2000/svg"><path d="M16.485 7.297c.1.535.155 1.095.155 1.68 0 4.57-3.06 7.82-7.68 7.82A7.998 7.998 0 013.304 3.139 7.997 7.997 0 018.961.797c2.16 0 3.965.795 5.35 2.085l-2.255 2.255v-.005c-.84-.8-1.905-1.21-3.095-1.21-2.64 0-4.785 2.23-4.785 4.87s2.145 4.874 4.785 4.874c2.395 0 4.025-1.369 4.36-3.25H8.96v-3.12h7.525z" fill="#fff"></path></svg></a></li></ul></div></div></div><div class="row"><div class="w-100"><div class="f-hr"></div></div></div><div class="row"><div class="col-md-12 b-f-wrap "><div class="f-logo-wrap d-flex justify-content-between align-items-center"><div class="f-logo"><div class="lazyload-wrapper " style="margin:auto"><div style="height:200px" class="lazyload-placeholder"></div></div></div><div class="f-h-nav"><ul class="nav-horizontal d-flex"><li><a href="https://tech.informa.com/" rel="noreferrer" target="_blank">Home</a></li><li><a href="https://tech.informa.com/cookie-policy" rel="noreferrer" target="_blank">Cookies</a></li><li><a href="https://tech.informa.com/privacy-policy" rel="noreferrer" target="_blank">Privacy</a></li><li><a href="https://tech.informa.com/terms-and-conditions" rel="noreferrer" target="_blank">Terms</a></li></ul></div></div></div></div><div class="row"><div class="w-100"><div class="f-hr"></div></div></div><div class="row"><div class="col-md-12 b-f-wrap"><div class="f-logo-wrap d-flex justify-content-between align-items-center"><div class="f-logo o-hidden d-none d-sm-block"><img src="https://eu-images.contentstack.com/v3/assets/blt66983808af36a8ef/blt3edeb23396a4b5dc/60b1ea7a9afdef577986633e/Whitelogo_1.png" alt="Logo"/></div><div class="copyright-wrap"><p>Copyright © <!-- -->2022<!-- --> <!-- -->Informa PLC Informa UK Limited is a company registered in England and Wales with company number 1072954 whose registered office is 5 Howick Place, London, SW1P 1WG.</p></div></div></div></div></div></footer></div></div></div><script id="__NEXT_DATA__" type="application/json">{"props":{"pageProps":{"data":{"typeOfSlug":"articlePost","result":{"_version":3,"locale":"en-us","uid":"bltb8b51aa64bdcf847","ACL":{},"_in_progress":false,"article_label":[{"_version":2,"locale":"en-us","uid":"blt610cb37ce61b4a29","ACL":{},"_in_progress":false,"article_label_page_description":"","created_at":"2021-05-29T07:27:37.247Z","created_by":"blt9a0fc67c46c47dd7","label":"Commentary","seo":{"canonical_url":"","meta_description":"","meta_keywords":"","meta_title":""},"tags":[],"title":"Commentary","updated_at":"2021-09-12T15:45:51.152Z","updated_by":"blt871c9fa65adba4f6","url":"/commentary","_content_type_uid":"dr_article_label","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-09-14T10:07:22.582Z","user":"blt986fc66e34c7b415"}}],"author_page":[{"_content_type_uid":"dr_author","_version":4,"locale":"en-us","uid":"blt4affc35d13fd5dcf","_in_progress":false,"author_description":"An award winning writer and journalist, for more than 20 years George Hulme has written about business, technology, and IT security topics. He currently freelances for a wide range of publications, and is security blogger at InformationWeek.com.","author_email":"george@georgehulme.com","author_name":"George V. Hulme","author_role":"Contributor","created_at":"2021-06-24T07:19:49.732Z","created_by":"blt5ee151557599d2cd","portrait":{"_version":1,"is_dir":false,"uid":"blt1294f16114f9d036","ACL":{},"content_type":"image/jpeg","created_at":"2021-06-24T07:19:49.286Z","created_by":"blt5ee151557599d2cd","file_size":"6449","filename":"Hulme-IWK-125x125.jpg","parent_uid":"blt60b58d3e4f06fc5f","tags":[],"title":"Hulme-IWK-125x125.jpg","updated_at":"2021-06-24T07:19:49.286Z","updated_by":"blt5ee151557599d2cd","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-09-22T04:14:19.227Z","user":"blt5ee151557599d2cd"},"url":"https://eu-images.contentstack.com/v3/assets/blt66983808af36a8ef/blt1294f16114f9d036/60d43215e1461d39eb814e70/Hulme-IWK-125x125.jpg"},"title":"George V. Hulme","updated_at":"2021-06-26T01:00:33.732Z","updated_by":"blt5ee151557599d2cd","url":"/author/george-v-hulme","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-09-22T04:14:17.230Z","user":"blt5ee151557599d2cd"},"ACL":{}}],"body":"Last week, Google released its shiny new Chrome browser. However, before the week finished, Google also had to issue a patch for one of security's most common -- and most well-known to developers -- application security issues: a buffer overflow vulnerability that would make it possible for an attacker to completely take over your system.According to this \u003ca href=\"http://security.bkis.vn/?p=119\"\u003eadvisory\u003c/a\u003e from security firm SVRT-Bkis, they found a critical buffer overflow in Google Chrome that would enable an attacker to take complete control of an unpatched system. \r\n\u003cP\u003e\r\nFrom the advisory:\r\n\u003cP\u003e\r\n\u003cblockquote\u003eType of Issue : Buffer Overflow.\r\n\u003cP\u003e\r\nAffected Software : Google Chrome 0.2.149.27.\r\n\u003cP\u003e\r\nExploitation Environment : Google Chrome on Windows XP SP2.\r\n\u003cP\u003e\r\nImpact: Remote code execution.\r\n\u003cP\u003e\r\nRating : Critical.\r\n\u003cP\u003e\r\nDescription :\r\nThe vulnerability is caused due to a boundary error when handling the \"SaveAs\" function. On saving a malicious page with an overly long title (\u003ctitle\u003e tag in HTML), the program causes a stack-based overflow and makes it possible for attackers to execute arbitrary code on users' systems.\r\n\u003cP\u003e\r\nHow an attacker could exploit the issue :\r\nTo exploit the Vulnerability, a hacker might construct a specially crafted Web page, which contains malicious code. He then tricks users into visiting his Web site and convinces them to save this Page. Right after that, the code would be executed, giving him the privilege to make use of the affected system.\r\n\u003c/blockquote\u003e\r\n\u003cP\u003e\r\nFortunately, Google promptly fixed the flaw. Just make sure you are running version 0.2.149.29 or higher. You can do that by selecting About, then Update within Chrome, or visiting \u003ca href=\"http://www.google.com/chrome/\"\u003ethis\u003c/a\u003e Google page.\r\n\u003cP\u003e\r\nI've a suspicion we've many more Google Chrome security-related updates on the way.\r\n","byline":null,"created_at":"2021-06-28T07:34:08.528Z","created_by":"blt5ee151557599d2cd","featured_image":null,"featured_image_caption":null,"featured_image_credit":null,"keywords":[],"old_url":"/risk-management/google-chrome-polishes-its-first-security-update/d/d-id/1071754","published_date":"2008-09-08T19:26:05-05:00","seo":{"meta_keywords":"","canonical_url":null,"meta_description":"Last week, Google released its shiny new Chrome browser. However, before the week finished, Google also had to issue a patch for one of security's most common -","meta_title":"Google Chrome Polishes Its First Security Update"},"summary":"Last week, Google released its shiny new Chrome browser. However, before the week finished, Google also had to issue a patch for one of security's most common -- and most well-known to developers -- application security issues: a buffer overflow vulnerability that would make it possible for an attacker to completely take over your system.","tags":[],"term_selector":{"primaryTerm":"risk","primaryTermInRealText":"Risk","primaryCategoryBelonged":"risk","actualUrl":"/risk/google-chrome-polishes-its-first-security-update"},"title":"Google Chrome Polishes Its First Security Update","updated_at":"2022-03-14T15:41:44.313Z","updated_by":"blt5ee151557599d2cd","url":"/google-chrome-polishes-its-first-security-update","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2022-03-14T15:41:45.285Z","user":"blt5ee151557599d2cd"},"pageType":"article","bodyText":"Last week, Google released its shiny new Chrome browser. However, before the week finished, Google also had to issue a patch for one of security's most common -- and most well-known to developers -- application security issues: a buffer overflow vulnerability that would make it possible for an attacker to completely take over your system.According to this advisory from security firm SVRT-Bkis, they found a critical buffer overflow in Google Chrome that would enable an attacker to take complete control of an unpatched system. \r \r From the advisory:\r \r Type of Issue : Buffer Overflow.\r \r Affected Software : Google Chrome 0.2.149.27.\r \r Exploitation Environment : Google Chrome on Windows XP SP2.\r \r Impact: Remote code execution.\r \r Rating : Critical.\r \r Description :\r The vulnerability is caused due to a boundary error when handling the \"SaveAs\" function. On saving a malicious page with an overly long title ( tag in HTML), the program causes a stack-based overflow and makes it possible for attackers to execute arbitrary code on users' systems.\r \r How an attacker could exploit the issue :\r To exploit the Vulnerability, a hacker might construct a specially crafted Web page, which contains malicious code. He then tricks users into visiting his Web site and convinces them to save this Page. Right after that, the code would be executed, giving him the privilege to make use of the affected system.\r \r \r Fortunately, Google promptly fixed the flaw. Just make sure you are running version 0.2.149.29 or higher. You can do that by selecting About, then Update within Chrome, or visiting this Google page.\r \r I've a suspicion we've many more Google Chrome security-related updates on the way."},"seo":{"meta_keywords":"","canonical_url":"https://www.darkreading.com/risk/google-chrome-polishes-its-first-security-update","meta_description":"Last week, Google released its shiny new Chrome browser. However, before the week finished, Google also had to issue a patch for one of security's most common -","meta_title":"Google Chrome Polishes Its First Security Update","meta_zephr-tags":"DR-pageType-article, DR-pagePrimaryCategory-risk, DR-contentLabel-commentary, DR-pageIsSponsored-false"},"slug":"google-chrome-polishes-its-first-security-update","term":{"slug":"risk","display_options":"Standard View","topic_page_description":"Breaking news, news analysis, and expert commentary on cybersecurity risk, and the tools, technologies, and practices for assessing risk.","title":"Risk","system":{"uid":"blt7095e7265cf0f380","__typename":"EntrySystemField"},"seo":{"canonical_url":"","meta_description":"Breaking news, news analysis, and expert commentary on cybersecurity risk, and the tools, technologies, and practices for assessing risk","meta_keywords":"","meta_title":"Risk","__typename":"Seo"},"secondary_categoriesConnection":{"totalCount":1,"edges":[{"node":{"title":"[Risk] Compliance","secondary_category_name":"Compliance","slug":"compliance","display_options":"Standard View","topic_page_description":"","system":{"uid":"blt9d07d0a4c0d8cb54","__typename":"EntrySystemField"},"shown_in_header":true,"seo":{"meta_description":"Compliance","canonical_url":"","meta_keywords":"","meta_title":"Compliance","__typename":"Seo"},"sponsor_text":"","sponsor_logoConnection":{"edges":[],"__typename":"SysAssetConnection"},"image_alt_text":null,"branding":{"hub_page_color":"","hub_page_description_with_hyperlink":null,"image_alt_text":null,"hub_page_logoConnection":{"edges":[],"totalCount":0,"__typename":"SysAssetConnection"},"__typename":"DrCategorySecondaryBranding"},"__typename":"DrCategorySecondary"},"__typename":"DrPrimaryCategorySecondaryCategoriesEdge"}],"__typename":"DrPrimaryCategorySecondaryCategoriesConnection"},"sponsor_logoConnection":{"edges":[],"__typename":"SysAssetConnection"},"sponsor_text":"","image_alt_text":"","branding":{"hub_page_color":"000000","hub_page_description_with_hyperlink":"","image_alt_text":"","hub_page_logoConnection":{"totalCount":0,"edges":[],"__typename":"SysAssetConnection"},"__typename":"DrPrimaryCategoryBranding","hub_page_logo":{}},"__typename":"DrPrimaryCategory","term_related":["compliance","risk"],"term_selector":{"primaryTerm":"risk","primaryCategoryBelonged":"risk","primaryTermInRealText":"Risk"},"pagePrimaryCategory":"risk","uid":"blt7095e7265cf0f380","fullSlug":"risk","secondary_categories":[],"sponsor_logo":{},"icon":{},"term_type":"primary","isFound":true,"all_terms":["partner-perspectives","intel","bitdefender","general-dynamics-fidelis","tenable","carbon-black","malwarebytes","evident-io","f5","juniper","iboss","gigamon","crowdstrike","darktrace","microsoft","black-hat","black-hat-news","dr-tech","the-cyber-future","emerging-tech","tech-talks","tech-trends","vulnerabilities-threats","advanced-threats","insider-threats","vulnerability-management","threat-intelligence","security-now","risk","compliance","physical-security","perimeter","operations","identity-and-access-management","edge","edge-articles","edge-ask-the-experts","edge-slideshows","edge-threat-monitor","cloud","attacks-breaches","mobile","iot","endpoint","authentication","privacy","remote-workforce","careers-and-people","application-security","database-security","analytics","security-monitoring","omdia"]},"isEdge":true,"primaryCategory":"risk","smartbox":[{"title":"Webinars","ordinal":1,"type":"Webinars","hidden":false,"feed":{"title":"Webinars","href":"https://smartbox.techweb.com/smartbox/externalsmartbox?site_id=162801002\u0026taxonomy_ids=\u0026num_display=5\u0026article_type=upcoming_webinars\u0026output_type=xml","__typename":"Link"},"read_more_link":{"title":"More Webinars","href":"https://www.darkreading.com/upcoming-webinars","__typename":"Link"},"system":{"uid":"blt8f82585c522cc0f5","__typename":"EntrySystemField"},"__typename":"DrSmartbox","articles":[{"title":["Using Zero Trust to Protect Remote and Home Workers"],"link":["https://webinar.darkreading.com/1316745?keycode=sbx\u0026cid=smartbox_techweb_upcoming_webinars_8.500001216\u0026_mc=smartbox_techweb_upcoming_webinars_8.500001216"],"publishDate":["Sep 14, 2022"],"publishedSite":[""],"eventDate":["Oct 06, 2022"],"publishedSiteURL":[""],"description":["When COVID-19 hit, many organizations attempted to implement Zero Trust environments to protect their data from online threats presented by unsecured home office equipment. But these efforts were often temporary and not particularly effective. In this webinar, experts offer a more permanent, more effective strategy for using Zero Trust to secure remote and hybrid workers and protect critical data from unauthorized access."]},{"title":["Strategies for DDoS Resilience and Response"],"link":["https://webinar.darkreading.com/1781964?keycode=sbx\u0026cid=smartbox_techweb_upcoming_webinars_8.500001218\u0026_mc=smartbox_techweb_upcoming_webinars_8.500001218"],"publishDate":["Sep 15, 2022"],"publishedSite":[""],"eventDate":["Oct 18, 2022"],"publishedSiteURL":[""],"description":["There are few things more disruptive than a distributed denial-of-service (DDoS) attack. The criminals behind these attacks have one objective: to bring everything to a stop so you can't conduct business as usual. How can you ensure business continuity during these events? What is your plan for communicating with essential stakeholders if services are down? Who should you contact outside of your organization for help? Are your backup and recovery plans in place and ready to go in the event of an attack? In this webinar, learn what processes and procedures should go into your DDoS response playbook, and learn about the tools and techniques that will help you bounce back from a DDoS without any major impact to productivity."]},{"title":["Next-Gen Security Operations: Building the SOC of the Future"],"link":["https://webinar.darkreading.com/1341545?keycode=sbx\u0026cid=smartbox_techweb_upcoming_webinars_8.500001219\u0026_mc=smartbox_techweb_upcoming_webinars_8.500001219"],"publishDate":["Sep 15, 2022"],"publishedSite":[""],"eventDate":["Oct 19, 2022"],"publishedSiteURL":[""],"description":["What does a security operations center (SOCs) require in 2022? The practice of monitoring and responding to threats looks very different today than it did just a few years ago. Which tools and skills do you need know to outfit a SOC to respond to today's most current threats and online exploits? In this webinar, experts offer insight and recommendations on how to build a next-generation SOC."]},{"title":["Hacks That Bypass Multi-Factor Authentication and How to Make Your MFA Solution Phishing Resistant"],"link":["https://webinar.darkreading.com/1835400?keycode=sbx\u0026cid=smartbox_techweb_upcoming_webinars_8.500001220\u0026_mc=smartbox_techweb_upcoming_webinars_8.500001220"],"publishDate":["Sep 21, 2022"],"publishedSite":[""],"eventDate":["Oct 25, 2022"],"publishedSiteURL":[""],"description":["The average person believes using Multi-Factor Authentication (MFA) makes them significantly less likely to be hacked. That is simply not true! Hackers can bypass 90-95% of MFA solutions much easier than you would think. Using a regular looking phishing email, they can bypass MFA just as easily as if it were a simple password.\r\n\r\nJoin Roger A. Grimes, KnowBe4's Data-Driven Defense Evangelist for this new webinar to learn common MFA hacking techniques and what it takes to make your MFA phishing resistant. He'll also share a pre-filmed MFA hacking demo from Kevin Mitnick, KnowBe4's Chief Hacking Officer. Get the information you need to know now to better defend your network."]},{"title":["Threat Hunting Today: The Tools and Techniques That Get You Out in Front of Criminals"],"link":["https://darkreading.tradepub.com/c/pubRD.mpl?secure=1\u0026sr=pp\u0026_t=pp:\u0026qf=w_defa3231\u0026ch=sbx\u0026cid=smartbox_techweb_upcoming_webinars_8.500001221\u0026_mc=smartbox_techweb_upcoming_webinars_8.500001221"],"publishDate":["Sep 27, 2022"],"publishedSite":[""],"eventDate":["Oct 26, 2022"],"publishedSiteURL":[""],"description":["Proactive \"threat hunting\" is becoming a more common practice for organizations who know it is no longer enough to detect threats and defend against them. Security teams are increasingly taking a more proactive approach--seeking out potential threats using analytical tools. How do these enterprises build threat hunting programs? How do they staff them, and what tools do they need? In this Dark Reading webinar, a top expert discusses the process for building a threat hunting program, and for optimizing the efforts of designated threat hunters in the organization.\r\n\r\nAttend this webinar and you'll: \r\n-Get the fundamentals of a good threat hunting program\r\n-Learn tips and techniques for better threat hunting\r\n-Find out how the top organizations handle threat intelligence gathering and reporting\r\n-Gather resources to help start your own threat hunting program"]}]},{"title":"Reports","ordinal":1,"type":"Reports","hidden":false,"feed":{"title":"Reports","href":"https://smartbox.techweb.com/smartbox/externalsmartbox?site_id=162801002\u0026taxonomy_ids=\u0026num_display=5\u0026article_type=analytics\u0026output_type=xml","__typename":"Link"},"read_more_link":{"title":"More Reports","href":"/must-reads","__typename":"Link"},"system":{"uid":"blt5145c70334f61d02","__typename":"EntrySystemField"},"__typename":"DrSmartbox","articles":[{"title":["Breaches Prompt Changes to Enterprise IR Plans and Processes"],"link":["https://www.informationweek.com/whitepaper/security-monitoring/cloud-security/breaches-prompt-changes-to-enterprise-ir-plans-and-processes/439583?cid=smartbox_techweb_analytics_7.300005941\u0026_mc=smartbox_techweb_analytics_7.300005941"],"publishedSite":[""],"publishedSiteURL":[""]},{"title":["Implementing Zero Trust In Your Enterprise: How to Get Started"],"link":["https://www.informationweek.com/whitepaper/network-and-perimeter-security/endpoint-security/implementing-zero-trust-in-your-enterprise-how-to-get-started/441133?cid=smartbox_techweb_analytics_7.300005940\u0026_mc=smartbox_techweb_analytics_7.300005940"],"publishedSite":[""],"publishedSiteURL":[""]},{"title":["6 Elements of a Solid IoT Security Strategy"],"link":["https://www.informationweek.com/whitepaper/endpoint-security/network-and-perimeter-security/6-elements-of-a-solid-iot-security-strategy/439873?cid=smartbox_techweb_analytics_7.300005939\u0026_mc=smartbox_techweb_analytics_7.300005939"],"publishedSite":[""],"publishedSiteURL":[""]},{"title":["Incorporating a Prevention Mindset into Threat Detection and Response"],"link":["https://www.informationweek.com/whitepaper/network-and-perimeter-security/networking/incorporating-a-prevention-mindset-into-threat-detection-and-response/439373?cid=smartbox_techweb_analytics_7.300005934\u0026_mc=smartbox_techweb_analytics_7.300005934"],"publishedSite":[""],"publishedSiteURL":[""]},{"title":["Practical Network Security Approaches for a Multicloud, Hybrid IT World"],"link":["https://www.informationweek.com/whitepaper/cloud-security/network-and-perimeter-security/practical-network-security-approaches-for-a-multicloud,-hybrid-it-world/438913?cid=smartbox_techweb_analytics_7.300005932\u0026_mc=smartbox_techweb_analytics_7.300005932"],"publishedSite":[""],"publishedSiteURL":[""],"description":["The report covers areas enterprises should focus on for their multicloud/hybrid cloud security strategy:\r\n-increase visibility over the environment\r\n-learning cloud-specific skills\r\n-relying on established security frameworks\r\n-re-architecting the network\r\n"]}]},{"title":"Thao test smartbox","ordinal":1,"type":"Webinars","hidden":false,"feed":{"title":"Thao tests smartbox","href":"https://smartbox.techweb.com/smartbox/externalsmartbox?site_id=162801002\u0026taxonomy_ids=\u0026num_display=3\u0026article_type=session\u0026output_type=xml","__typename":"Link"},"read_more_link":{"title":"Read more","href":"https://finance.vietstock.vn/TDC-ctcp-kinh-doanh-va-phat-trien-binh-duong.htm","__typename":"Link"},"system":{"uid":"blt378d3b273bbe06e9","__typename":"EntrySystemField"},"__typename":"DrSmartbox","articles":[{"title":["Understanding Cyber Attackers - A Dark Reading Nov 17 Event"],"link":["https://vts.informaengage.com/dark-reading-understanding-cyber-attackers-and-their-methods/?kcode=sbx\u0026cid=smartbox_techweb_session_16.500277\u0026_mc=smartbox_techweb_session_16.500277"],"publishDate":["Nov 17, 2022"],"publishedSite":[""],"publishedSiteURL":[""],"description":["Every day, your enterprise is at risk of being hacked. But just who are the cyber attackers, and what are their motivations? What methods might they use to crack enterprise data, and how do they stage their attacks? Do you know which attacks are most likely to be used against an organization like yours, and which attackers are most likely to target you?\r\n\r\nThese are just some of the questions that will be explored and answered at Dark Reading's free virtual event on November 17, set to offer insight, advice, and best practices for stopping the current wave of online attackers - and the exploits they use to target enterprises."]},{"title":["Black Hat Europe - December 5-8 - Learn More"],"link":["https://www.blackhat.com/eu-22/?cid=smartbox_techweb_session_16.500275\u0026_mc=smartbox_techweb_session_16.500275"],"publishDate":["Dec 05, 2022"],"publishedSite":[""],"publishedSiteURL":[""]},{"title":["SecTor - Canada's IT Security Conference Oct 1-6 - Learn More"],"link":["https://sector.ca/?cid=smartbox_techweb_session_16.500271\u0026_mc=smartbox_techweb_session_16.500271"],"publishDate":["Oct 01, 2022"],"publishedSite":[""],"publishedSiteURL":[""]}]},{"title":"Events","ordinal":2,"type":"Live Events","hidden":false,"feed":{"title":"Events","href":"https://smartbox.techweb.com/smartbox/externalsmartbox?site_id=162801002\u0026taxonomy_ids=\u0026num_display=3\u0026article_type=session\u0026output_type=xml","__typename":"Link"},"read_more_link":{"title":"More Events","href":"https://www.darkreading.com/upcoming-events","__typename":"Link"},"system":{"uid":"blt8b6a33909c49602f","__typename":"EntrySystemField"},"__typename":"DrSmartbox","articles":[{"title":["Understanding Cyber Attackers - A Dark Reading Nov 17 Event"],"link":["https://vts.informaengage.com/dark-reading-understanding-cyber-attackers-and-their-methods/?kcode=sbx\u0026cid=smartbox_techweb_session_16.500277\u0026_mc=smartbox_techweb_session_16.500277"],"publishDate":["Nov 17, 2022"],"publishedSite":[""],"publishedSiteURL":[""],"description":["Every day, your enterprise is at risk of being hacked. But just who are the cyber attackers, and what are their motivations? What methods might they use to crack enterprise data, and how do they stage their attacks? Do you know which attacks are most likely to be used against an organization like yours, and which attackers are most likely to target you?\r\n\r\nThese are just some of the questions that will be explored and answered at Dark Reading's free virtual event on November 17, set to offer insight, advice, and best practices for stopping the current wave of online attackers - and the exploits they use to target enterprises."]},{"title":["Black Hat Middle East \u0026 Africa - November 15-17 - Learn More"],"link":["https://blackhatmea.com/?cid=smartbox_techweb_session_16.500274\u0026_mc=smartbox_techweb_session_16.500274"],"publishDate":["Nov 15, 2022"],"publishedSite":[""],"publishedSiteURL":[""]},{"title":["SecTor - Canada's IT Security Conference Oct 1-6 - Learn More"],"link":["https://sector.ca/?cid=smartbox_techweb_session_16.500271\u0026_mc=smartbox_techweb_session_16.500271"],"publishDate":["Oct 01, 2022"],"publishedSite":[""],"publishedSiteURL":[""]}]},{"title":"White Papers","ordinal":3,"type":"Whitepapers","hidden":false,"feed":{"title":"White Papers","href":"https://smartbox.techweb.com/smartbox/externalsmartbox?site_id=162801002\u0026taxonomy_ids=\u0026num_display=\u0026article_type=whitepaper\u0026output_type=xml","__typename":"Link"},"read_more_link":{"title":"More White Papers","href":"https://www.informationweek.com/whitepaper/Security","__typename":"Link"},"system":{"uid":"blt1192837947494c5f","__typename":"EntrySystemField"},"__typename":"DrSmartbox","articles":[{"title":["Ransomware Is On The Rise"],"link":["https://www.informationweek.com/whitepaper/cybersecurity/security/ransomware-is-on-the-rise/442203?keycode=sbx\u0026cid=smartbox_techweb_whitepaper_14.500005226\u0026_mc=smartbox_techweb_whitepaper_14.500005226"],"publishedSite":[""],"publishedSiteURL":[""]},{"title":["Your Digital Transformation Is Being Sabotaged - The Surprising Impact of Sophisticated Bots"],"link":["https://www.informationweek.com/whitepaper/cybersecurity/security-monitoring/your-digital-transformation-is-being-sabotaged-the-surprising-impact-of-sophisticated-bots/440933?keycode=sbx\u0026cid=smartbox_techweb_whitepaper_14.500005215\u0026_mc=smartbox_techweb_whitepaper_14.500005215"],"publishedSite":[""],"publishedSiteURL":[""]},{"title":["Extended Detection and Response (XDR) - Beginner's Guide"],"link":["https://www.informationweek.com/whitepaper/security-monitoring/security-platforms/extended-detection-and-response-(xdr)-beginner's-guide/432383?keycode=sbx\u0026cid=smartbox_techweb_whitepaper_14.500005203\u0026_mc=smartbox_techweb_whitepaper_14.500005203"],"publishedSite":[""],"publishedSiteURL":[""]},{"title":["ESG: Investing in Incident Readiness"],"link":["https://www.informationweek.com/whitepaper/risk-management-security/cybersecurity/esg-investing-in-incident-readiness/437723?keycode=sbx\u0026cid=smartbox_techweb_whitepaper_14.500005196\u0026_mc=smartbox_techweb_whitepaper_14.500005196"],"publishedSite":[""],"publishedSiteURL":[""]},{"title":["Building Operational Resilience in Industrial \u0026 Critical Infrastructure"],"link":["https://www.informationweek.com/whitepaper/cybersecurity/security/building-operational-resilience-in-industrial-and-critical-infrastructure/439543?keycode=sbx\u0026cid=smartbox_techweb_whitepaper_14.500005188\u0026_mc=smartbox_techweb_whitepaper_14.500005188"],"publishedSite":[""],"publishedSiteURL":[""]}]}],"editorsChoice":{"_version":86,"locale":"en-us","uid":"blt9262b8fd3485b1dc","ACL":{},"_in_progress":false,"created_at":"2021-05-29T07:25:35.582Z","created_by":"blt9a0fc67c46c47dd7","selected_articles":[{"_version":7,"locale":"en-us","uid":"bltd5afcabb59d89133","ACL":{},"_in_progress":false,"article_label":[{"uid":"bltb75c0271fde42422","_content_type_uid":"dr_article_label"}],"author_page":[{"_version":3,"locale":"en-us","uid":"blt20588c687cab91b6","ACL":{},"_in_progress":false,"author_description":"\u003cp style=\"text-align: justify;\"\u003eVeteran technology journalist of more than 20 years. Former research engineer. Written for more than two dozen publications, including CNET \u003ca href=\"http://news.com/\" title=\"Follow link\"\u003eNews.com\u003c/a\u003e, Dark Reading, MIT's Technology Review, Popular Science, and Wired News. Five awards for journalism, including Best Deadline Journalism (Online) in 2003 for coverage of the Blaster worm. Crunches numbers on various trends using Python and R. Recent reports include analyses of the shortage in cybersecurity workers and annual vulnerability trends.\u003c/p\u003e","author_email":"mail@robertlemos.com","author_label":{"author_label_background_color":"","author_label_text":"","author_label_text_color":"","display_author_label":false},"author_name":"Robert Lemos","author_page_tagline":"","author_role":"Contributing Writer, Dark Reading","created_at":"2021-05-29T07:26:17.988Z","created_by":"blt9a0fc67c46c47dd7","hidden_email":false,"image_alt_text":"Robert Lemos Headshot","member_since":null,"portrait":{"_version":1,"is_dir":false,"uid":"blt58481326324d6911","ACL":{},"content_type":"image/png","created_at":"2021-05-29T07:13:41.432Z","created_by":"blt9a0fc67c46c47dd7","file_size":"40970","filename":"Robert-Lemos.png","tags":[],"title":"Robert-Lemos.png","updated_at":"2021-05-29T07:13:41.432Z","updated_by":"blt9a0fc67c46c47dd7","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-05-29T07:13:42.612Z","user":"blt9a0fc67c46c47dd7"},"url":"https://eu-images.contentstack.com/v3/assets/blt66983808af36a8ef/blt58481326324d6911/60b1e9a55d34de550780a990/Robert-Lemos.png"},"seo":{"canonical_url":"","meta_description":"","meta_keywords":"","meta_title":""},"social_links":{"twitter_link":{"title":"","href":""},"linkedin_link":{"title":"","href":""}},"specialisms":[],"tags":["freelancer"],"title":"Robert Lemos","updated_at":"2022-05-17T19:07:37.328Z","updated_by":"blt36bec842c46f38f6","url":"/author/robert-lemos","_content_type_uid":"dr_author","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2022-05-17T19:07:41.149Z","user":"blt36bec842c46f38f6"}}],"body":"\u003cp\u003eThe average ethical hacker can find a vulnerability that allows the breach of the network perimeter and then exploit the environment in less than 10 hours, with penetration testers focused on cloud security gaining access most quickly to targeted assets. And further,\u0026nbsp;once a vulnerability or weakness is found, about 58% of ethical hackers can break into an environment in less than five hours.\u003c/p\u003e\n\u003cp\u003eThat's according to a survey of 300 experts\u0026nbsp;by the SANS Institute and sponsored by cybersecurity services firm Bishop Fox, which also found that the most common weaknesses exploited by the hackers include vulnerable configurations, software flaws, and exposed Web services, survey respondents stated.\u003cbr\u003e\u003c/p\u003e\n\n\u003cp\u003eThe results\u0026nbsp;mirror metrics for\u0026nbsp;real-world malicious attacks and\u0026nbsp;highlight the limited amount of time that companies have to detect and respond to threats, says Tom Eston, associate vice president of consulting of Bishop Fox. \u003c/p\u003e\n\u003cp\u003e\"Five or six hours to break in, as an ethical hacker myself, that is not a huge surprise,\" he says. \"It matches up to what we are seeing the real hackers doing, especially with social engineering and phishing and other realistic attack vectors.\"\u003c/p\u003e\n\u003cp\u003eThe \u003ca href=\"https://bishopfox.com/blog/examine-cyber-attacker-minds\" target=\"_blank\"\u003esurvey\u003c/a\u003e is the latest data point from cybersecurity companies' attempts to estimate the average time organizations have to stop attackers and interrupt their activities before significant damage is done. \u003c/p\u003e\n\u003cp\u003eCybersecurity services firm CrowdStrike, for example, found that the average attacker \"breaks out\" from their initial compromise to infect other systems \u003ca href=\"https://www.darkreading.com/threat-intelligence/attacks-increasingly-hands-on-break-out-more-quickly\" target=\"_blank\"\u003ein less than 90 minutes\u003c/a\u003e. Meanwhile, the length of time that attackers are able to operate on victim's networks before being detected was 21 days in 2021, slightly better than the 24 days in the prior year, \u003ca href=\"https://www.darkreading.com/threat-intelligence/exploits-supply-chain-compromises-comprise-over-half-of-initial-infections-leading-to-cyberattacks\" target=\"_blank\"\u003eaccording to cybersecurity services firm Mandiant\u003c/a\u003e. \u003c/p\u003e\n\u003cp\u003e\u003ch2 class=\"regular-text\"\u003eOrganizations Not Keeping Up\u003c/h2\u003e\u003c/p\u003e\n\u003cp\u003eOverall, nearly three-quarters of ethical hackers think most organizations lack the necessary detection and response capabilities to stop attacks, according to the Bishop Fox-SANS survey. The data should convince organizations to not just focus on preventing attacks, but aim to quickly detect and respond to attacks as a way to limit damage, Bishop Fox's Eston says.\u003c/p\u003e\n\u003cp\u003e\"Everyone eventually is going to be hacked, so it comes down to incident response and how you respond to an attack, as opposed to protecting against every attack vector,\" he says. \"It is almost impossible to stop one person from clicking on a link.\"\u003c/p\u003e\n\u003cp\u003eIn addition, companies are struggling to secure many parts of their attack surface, the report stated. Third parties, remote work, the adoption of cloud infrastructure, and the increased pace of application development all contributed significantly to expanding organizations' attack surfaces, penetration testers said. \u003c/p\u003e\n\u003cp\u003eYet the human element continues to be the most critical vulnerability, by far. Social engineering and phishing attacks, together, accounted for about half (49%) of the vectors with the best return on hacking investment, according to respondents. Web application attacks, password-based attacks, and ransomware account for another quarter of preferred attacks. \u003c/p\u003e\n\u003cp\u003e\"[I]t should come as no surprise that social engineering and phishing attacks are the top two vectors, respectively,\" the report stated. \"We've seen this time and time again, year after year —\u0026nbsp;phishing reports continually increase, and adversaries continue to find success within those vectors.\"\u003c/p\u003e\n\u003cp\u003e\u003ch2 class=\"regular-text\"\u003eJust Your Average Hacker\u003c/h2\u003e\u003c/p\u003e\n\u003cp\u003eThe survey also developed a profile of the average ethical hacker, with nearly two-thirds of respondents having between a year and six years of experience. Only one in 10 ethical hackers had less than a year in the profession, while about 30% had between seven and 20 years of experience. \u003c/p\u003e\n\u003cp\u003eMost ethical hackers have experience in network security (71%), internal penetration testing (67%), and application security (58%), according to the survey, with red teaming, cloud security, and code-level security as the next most popular types of ethical hacking. \u003c/p\u003e\n\u003cp\u003eThe survey should remind companies that technology alone cannot solve cybersecurity problems — solutions require training employees to be aware of attacks, Eston says.\u003c/p\u003e\n\u003cp\u003e\"There is not a single blinky-box technology that is going to repel all the attacks and keep your organization safe,\" he says. \"It is a combination of people process and technology, and that has not changed. Organizations gravitate toward the latest and greatest tech ... but then they ignore security awareness and training their employees to recognize social engineering.\"\u003c/p\u003e\n\u003cp\u003eWith attackers focused on exactly those weaknesses, he says,\u0026nbsp;organizations need to change how they are developing their defenses.\u003c/p\u003e","byline":"","created_at":"2022-09-27T19:34:48.977Z","created_by":"bltd30ec9c1d5903aaa","featured_image":{"_version":1,"is_dir":false,"uid":"blt3b4da440bff09620","ACL":{},"content_type":"image/jpeg","created_at":"2022-03-14T03:58:25.125Z","created_by":"blt5ee151557599d2cd","file_size":"101839","filename":"06hacker-pixabay.jpg","parent_uid":"blt0e5d71babf70ac72","tags":[],"title":"06hacker-pixabay.jpg","updated_at":"2022-03-14T03:58:25.125Z","updated_by":"blt5ee151557599d2cd","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2022-09-28T10:00:00.206Z","user":"blt603b94c5f23c042e"},"url":"https://eu-images.contentstack.com/v3/assets/blt66983808af36a8ef/blt3b4da440bff09620/622ebd61f769b7657c515eec/06hacker-pixabay.jpg"},"featured_image_caption":"","featured_image_credit":"Source: Pixabay","image_alt_text":"Hacker","keywords":[],"old_url":"","published_date":"2022-09-28T10:00:00.000Z","seo":{"meta_title":"","meta_description":"","meta_keywords":"","canonical_url":""},"sponsored_content_settings":{"is_sponsor_article":false,"sponsor_name":""},"summary":"Vulnerable configurations, software flaws, and exposed Web services allow hackers to find exploitable weaknesses in companies' perimeters in just hours, not days.","tags":[],"term_selector":{"historyOfPrimaryTerm":["attacks-breaches"],"primaryTerm":"attacks-breaches","primaryTermInRealText":"Attacks/Breaches","primaryCategoryBelonged":"attacks-breaches","actualUrl":"/attacks-breaches/attackers-less-than-ten-hours-find-weaknesses","secondaryTerm":["cloud","perimeter","risk","threat-intelligence","vulnerabilities-threats","advanced-threats","vulnerability-management"]},"title":"Most Attackers Need Less Than 10 Hours to Find Weaknesses","updated_at":"2022-09-27T21:10:14.109Z","updated_by":"blt603b94c5f23c042e","url":"/attackers-less-than-ten-hours-find-weaknesses","_content_type_uid":"dr_article","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2022-09-28T10:00:00.517Z","user":"blt603b94c5f23c042e"}},{"_version":6,"locale":"en-us","uid":"blt37898a4c4bfa87a6","ACL":{},"_in_progress":false,"article_label":[{"uid":"bltb75c0271fde42422","_content_type_uid":"dr_article_label"}],"author_page":[{"_version":3,"locale":"en-us","uid":"blt20588c687cab91b6","ACL":{},"_in_progress":false,"author_description":"\u003cp style=\"text-align: justify;\"\u003eVeteran technology journalist of more than 20 years. Former research engineer. Written for more than two dozen publications, including CNET \u003ca href=\"http://news.com/\" title=\"Follow link\"\u003eNews.com\u003c/a\u003e, Dark Reading, MIT's Technology Review, Popular Science, and Wired News. Five awards for journalism, including Best Deadline Journalism (Online) in 2003 for coverage of the Blaster worm. Crunches numbers on various trends using Python and R. Recent reports include analyses of the shortage in cybersecurity workers and annual vulnerability trends.\u003c/p\u003e","author_email":"mail@robertlemos.com","author_label":{"author_label_background_color":"","author_label_text":"","author_label_text_color":"","display_author_label":false},"author_name":"Robert Lemos","author_page_tagline":"","author_role":"Contributing Writer, Dark Reading","created_at":"2021-05-29T07:26:17.988Z","created_by":"blt9a0fc67c46c47dd7","hidden_email":false,"image_alt_text":"Robert Lemos Headshot","member_since":null,"portrait":{"_version":1,"is_dir":false,"uid":"blt58481326324d6911","ACL":{},"content_type":"image/png","created_at":"2021-05-29T07:13:41.432Z","created_by":"blt9a0fc67c46c47dd7","file_size":"40970","filename":"Robert-Lemos.png","tags":[],"title":"Robert-Lemos.png","updated_at":"2021-05-29T07:13:41.432Z","updated_by":"blt9a0fc67c46c47dd7","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-05-29T07:13:42.612Z","user":"blt9a0fc67c46c47dd7"},"url":"https://eu-images.contentstack.com/v3/assets/blt66983808af36a8ef/blt58481326324d6911/60b1e9a55d34de550780a990/Robert-Lemos.png"},"seo":{"canonical_url":"","meta_description":"","meta_keywords":"","meta_title":""},"social_links":{"twitter_link":{"title":"","href":""},"linkedin_link":{"title":"","href":""}},"specialisms":[],"tags":["freelancer"],"title":"Robert Lemos","updated_at":"2022-05-17T19:07:37.328Z","updated_by":"blt36bec842c46f38f6","url":"/author/robert-lemos","_content_type_uid":"dr_author","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2022-05-17T19:07:41.149Z","user":"blt36bec842c46f38f6"}}],"body":"\u003cp\u003eWhile published trends in ransomware attacks have been contradictory — with some firms tracking more incidents and other fewer — business email compromise (BEC) attacks continue to have proven success against organizations. \u003c/p\u003e\n\u003cp\u003eBEC cases, as a share of all incident-response cases, more than doubled in the second quarter of the year, to 34% from 17% in the first quarter of 2022. That's\u0026nbsp;according to Arctic Wolf's \"\u003ca href=\"https://arcticwolf.com/resources/blog/incident-response-insights-from-arctic-wolf-labs-1h-2022/\" target=\"_blank\"\u003e1H 2022 Incident Response Insights\u003c/a\u003e\" report, published on Sept. 29, which found that specific industries — including financial, insurance, business services, and law firms, as well as government agencies — experienced more than double their previous number of cases, the company said.\u003c/p\u003e\n\u003cp\u003eOverall, the number of BEC attacks encountered per email box has grown by 84% in the first half of 2022, \u003ca href=\"https://abnormalsecurity.com/blog/bec-attacks-increasing-new-research-shows\" target=\"_blank\"\u003eaccording to data from cybersecurity firm Abnormal Security\u003c/a\u003e.\u003cbr\u003e\u003c/p\u003e\n\u003cp\u003eMeanwhile, so far this year, threat reports released by organizations have revealed contradictory trends for ransomware. Arctic Wolf and the Identity Theft Resource Center (ITRC) have seen \u003ca href=\"https://www.darkreading.com/threat-intelligence/is-cryptocurrency-s-crash-causing-headaches-for-ransomware-gangs-\" target=\"_blank\"\u003edrops in the number of successful ransomware attacks\u003c/a\u003e, while business customers seem to be encountering ransomware less often, \u003ca href=\"https://www.darkreading.com/threat-intelligence/ransomware-attempts-flag-as-payments-also-decline\" target=\"_blank\"\u003eaccording to security firm Trellix\u003c/a\u003e. At the same time, network security firm WatchGuard had a contrary take,\u0026nbsp;noting that its detection of ransomware attacks \u003ca href=\"https://www.darkreading.com/attacks-breaches/ransomware-volume-doubles-2021-totals-single-quarter\" target=\"_blank\"\u003eskyrocketed 80% in the first quarter of 2022\u003c/a\u003e, compared with all of last year.\u003c/p\u003e\n\u003ch2 class=\"regular-text\"\u003eThe Gleam of BEC Outshines Ransomware\u003c/h2\u003e\n\n\u003cp\u003eThe surging state of BEC landscape is unsurprising, says Daniel Thanos, vice president of Arctic Wolf Labs, because\u0026nbsp;BEC attacks offer cybercriminals advantages over ransomware. Specifically,\u0026nbsp;BEC gains do not rely on the value of cryptocurrency, and attacks are often more successful at escaping notice while in progress.\u003c/p\u003e\n\u003cp\u003e\"Our research shows that threat actors are unfortunately very opportunistic,\" he says.\u003cbr\u003e\u003c/p\u003e\n\n\u003cp\u003eFor that reason,\u0026nbsp;BEC — which uses social engineering and internal systems to steal funds from businesses — continues to be a stronger source of revenue for cybercriminals. In 2021, BEC attacks accounted for 35%, or $2.4 billion, of the $6.9 billion in potential losses \u003ca href=\"https://www.ic3.gov/Media/PDF/AnnualReport/2021_IC3Report.pdf\" target=\"_blank\"\u003etracked by the FBI's Internet Crime Complaint Center (IC3)\u003c/a\u003e, while ransomware remained a small fraction (0.7%) of the total.\u0026nbsp;\u003c/p\u003e\n\u003cp\u003eIn terms of revenue from individual attacks on\u0026nbsp;businesses, the Arctic Wolf analysis noted\u0026nbsp;that the median ransom for the first quarter was\u0026nbsp;about $450,000, but the research team did not provide the average loss for victims of BEC attacks.\u003c/p\u003e\n\u003ch2 class=\"regular-text\"\u003eShifting Financially Motivated Cyber Tactics\u003c/h2\u003e\n\n\n\u003cp\u003eAbnormal Security found \u003ca href=\"https://abnormalsecurity.com/blog/bec-attacks-increasing-new-research-shows\" target=\"_blank\"\u003e in its threat report\u003c/a\u003e earlier this year\u0026nbsp;that that the vast majority of all cybercrime incidents (81%) involved external vulnerabilities in a few highly targeted products — namely, Microsoft's Exchange server and VMware's Horizon virtual-desktop software — as well as poorly configured remote services, such as Microsoft's Remote Desktop Protocol (RDP). \u003c/p\u003e\n\u003cp\u003eUnpatched versions of Microsoft Exchange in particular\u0026nbsp;are vulnerable to the ProxyShell exploit (and now the \u003ca href=\"https://www.darkreading.com/application-security/microsoft-confirms-exchange-zero-days-no-patch\" target=\"_blank\"\u003eProxyNotShell bugs\u003c/a\u003e), which uses three vulnerabilities to give attackers administrative access to an Exchange system. While Microsoft patched the issues more than a year ago, the company did not publicize the vulnerabilities until a few months later.\u003c/p\u003e\n\u003cp\u003eVMware Horizon is a popular virtual desktop and app product \u003ca href=\"https://www.darkreading.com/threat-intelligence/nhs-warns-of-attackers-targeting-log4j-flaws-in-vmware-horizon\" target=\"_blank\"\u003evulnerable to the Log4Shell attack\u003c/a\u003e that exploited the infamous Log4j 2.0 vulnerabilities.\u003c/p\u003e\n\u003cp\u003eBoth avenues \u003ca href=\"https://www.darkreading.com/attacks-breaches/attackers-now-exploiting-proxyshell-exchange-server-flaws-for-business-email-compromise\" target=\"_blank\"\u003eare fueling BEC campaigns\u003c/a\u003e specifically, researchers have noted.\u0026nbsp;\u003c/p\u003e\n\u003cp\u003eIn addition, many cyber gangs are using data or credentials stolen from businesses during ransomware attacks to \u003ca href=\"https://www.darkreading.com/edge-threat-monitor/cybercriminals-weaponizing-ransomware-data-for-bec-attacks\" target=\"_blank\"\u003efuel BEC campaigns\u003c/a\u003e.\u003c/p\u003e\n\u003cp\u003e\"As organizations and employees become more aware of one tactic, threat actors will adjust their strategies in an effort to stay one step ahead of email security platforms and security awareness training,\" \u003ca href=\"https://abnormalsecurity.com/blog/bec-attacks-increasing-new-research-shows\" target=\"_blank\"\u003eAbnormal Security said\u003c/a\u003e\u0026nbsp;earlier this year. \"The changes noted in this research are just some of the indicators that those shifts are already occurring, and organizations should expect to see more in the future.\"\u003c/p\u003e\u003cfigure\u003e\u003cimg data-image=\"fwwfdoj5dhwv\" src=\"https://eu-images.contentstack.com/v3/assets/blt66983808af36a8ef/blt7a410d3fb787e7c2/6337184a633df42522236529/vulnerability-exploited-in-attack-arctic-wolf.png\" data-sys-asset-uid=\"blt7a410d3fb787e7c2\" alt=\"Root cause of attack\"\u003e\u003cfigcaption\u003e81% of incidents involved an external vulnerability or weakness. Source: Arctic Wolf\u003c/figcaption\u003e\u003c/figure\u003e\n\u003cp\u003e \u003c/p\u003e\n\u003cp\u003eSocial engineering is popular, too, as ever.\u0026nbsp;While external attacks on vulnerabilities and misconfigurations are the most prevalent way that attackers gain access to systems, human users and their credentials continue to be a popular target in BEC attacks, says Arctic Wolf's Thanos.\u003c/p\u003e\n\u003cp\u003e\"BEC cases are often the result of social engineering, compared to ransomware cases, which are often caused by exploitation of unpatched vulnerabilities or remote access tools,\" he says. \"In our experience, threat actors are more likely to attack a company via remote exploit than dupe a human.\u003cbr\u003e\u003c/p\u003e\n\u003ch2 class=\"regular-text\"\u003eHow to Avoid\u0026nbsp;BEC Compromise\u003c/h2\u003e\n\u003cp\u003eTo avoid being a victim, basic security measures can go a long way,\u0026nbsp;Arctic Wolf found. In fact,\u0026nbsp;many companies falling prey to BEC attacks did not have security controls that potentially could have prevented damage, the company stated in its analysis.\u0026nbsp;\u003c/p\u003e\n\u003cp\u003eFor instance, the research found that 80% of those companies suffering a BEC incident had no multifactor authentication in place. In addition, other controls, such as network segmentation and security awareness training, could help prevent BEC attacks from being costly, even after the attacker successfully compromises an external system.\u003c/p\u003e\n\u003cp\u003e\"Companies should strengthen their employee defenses through security training,\" Thanos says,\u0026nbsp;\"but they also need to address the vulnerabilities that threat actors focus on.\"\u0026nbsp;\u003c/p\u003e","byline":"","created_at":"2022-09-30T16:19:24.657Z","created_by":"bltd30ec9c1d5903aaa","featured_image":{"uid":"blta40e28d1aa11c7a0","created_by":"blt7e0f195bfdae4f92","updated_by":"blt7e0f195bfdae4f92","created_at":"2022-01-25T17:58:45.417Z","updated_at":"2022-01-25T17:58:45.417Z","content_type":"image/jpeg","file_size":"54252","filename":"ransomware-marcosalvarado-alamy.jpg","title":"ransomware-marcosalvarado-alamy.jpg","ACL":[],"_version":1,"parent_uid":null,"is_dir":false,"tags":[],"publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2022-03-24T21:23:53.022Z","user":"blt603b94c5f23c042e"},"url":"https://eu-images.contentstack.com/v3/assets/blt66983808af36a8ef/blta40e28d1aa11c7a0/61f03a55252c077e96a2ddad/ransomware-marcosalvarado-alamy.jpg"},"featured_image_caption":"Business e-mail compromise (BEC) and ransomware","featured_image_credit":"Source: Macro Salvarado via Alamy","image_alt_text":"","keywords":[],"old_url":"","published_date":"2022-09-30T18:44:43.000Z","seo":{"meta_title":"","meta_description":"","meta_keywords":"","canonical_url":""},"sponsored_content_settings":{"is_sponsor_article":false,"sponsor_name":""},"summary":"While ransomware seems stalled, business email compromise (BEC) attacks continue to make profits from the ProxyShell and Log4j vulnerabilities, nearly doubling in the latest quarter.","tags":[],"term_selector":{"historyOfPrimaryTerm":["threat-intelligence"],"primaryTerm":"threat-intelligence","primaryTermInRealText":"Threat Intelligence","primaryCategoryBelonged":"threat-intelligence","actualUrl":"/threat-intelligence/cybercriminals-see-allure-bec-attacks-ransomware","secondaryTerm":["attacks-breaches","risk","advanced-threats"]},"title":"Cybercriminals See Allure in BEC Attacks Over Ransomware","updated_at":"2022-09-30T19:01:07.582Z","updated_by":"blt603b94c5f23c042e","url":"/cybercriminals-see-allure-bec-attacks-ransomware","_content_type_uid":"dr_article","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2022-09-30T19:04:13.189Z","user":"blt603b94c5f23c042e"}},{"_version":10,"locale":"en-us","uid":"blt4ab5bbf80d840599","ACL":{},"_in_progress":false,"article_label":[{"uid":"bltf160abb39bf33081","_content_type_uid":"dr_article_label"}],"author_page":[{"_version":1,"locale":"en-us","uid":"blt47c7348446f83b61","ACL":{},"_in_progress":false,"author_description":"\u003cp\u003eDark Reading's Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article.\u003c/p\u003e","author_email":"editors@darkreading.com","author_name":"Dark Reading Staff","author_role":"Dark Reading","created_at":"2021-05-29T07:26:13.181Z","created_by":"blt9a0fc67c46c47dd7","portrait":{"_version":1,"is_dir":false,"uid":"blte161b23f0fd3a84b","ACL":{},"content_type":"image/jpeg","created_at":"2021-05-29T07:16:07.204Z","created_by":"blt9a0fc67c46c47dd7","file_size":"2939","filename":"dr_staff_125x125.jpg","parent_uid":"blt6faacc35402eac62","tags":[],"title":"dr_staff_125x125.jpg","updated_at":"2021-05-29T07:16:07.204Z","updated_by":"blt9a0fc67c46c47dd7","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-05-29T07:16:08.282Z","user":"blt9a0fc67c46c47dd7"},"url":"https://eu-images.contentstack.com/v3/assets/blt66983808af36a8ef/blte161b23f0fd3a84b/60b1ea374e7eb868c4c6a293/dr_staff_125x125.jpg"},"social_links":{"linkedin_link":{"title":"Dark Reading","href":"https://www.linkedin.com/company/dark-reading"},"twitter_link":{"title":"@DarkReading","href":"https://twitter.com/DarkReading"}},"tags":["staff"],"title":"Dark Reading Staff","updated_at":"2021-05-29T07:26:13.181Z","updated_by":"blt9a0fc67c46c47dd7","url":"/author/dark-reading-staff","_content_type_uid":"dr_author","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-05-29T07:54:05.026Z","user":"blt9a0fc67c46c47dd7"}}],"body":"\u003cp\u003eThe modernization of wireless technology is well underway with 5G deployments -- and so are the attacks. In response, MITRE, along with the Department of Defense, announced an adversarial threat model for 5G systems to help organizations assess the threats against their networks.\u003c/p\u003e\n\u003cp\u003eA \"purpose-built model of observed adversary behaviors,\" FiGHT (5G Hierarchy of Threats) is a knowledge base of adversary tactics and techniques for 5G systems. The framework empowers organizations to \"reliably assess the confidentiality, integrity, and availability of 5G networks, as well as the devices and applications using them,\" according to MITRE.\u003c/p\u003e\n\u003cp\u003eFiGHT is similar to MITRE ATT\u0026CK, a knowledge base of adversary behaviors seen in attacks against the broader ecosystem. In fact, FiGHT is derived from ATT\u0026CK, making FiGHT's tactics and techniques complementary to those described in ATT\u0026CK. The \u003ca href=\"https://fight.mitre.org/\" target=\"_self\"\u003eFiGHT Matrix\u003c/a\u003e lists tactics used in attacks as columns, and some of the items listed are actually ATT\u0026CK techniques or sub-techniques relevant for 5G.\u003c/p\u003e\n\u003cp\u003eTactics and techniques are grouped across three categories: theoretical, proof-of-concept, and observed. At the moment, most of the techniques are categorized as either theoretical or proof-of-concept as the information is based on academic research and other publicly available documents. Just a minority of the techniques described in FiGHT are based on real-world observations, reflecting the fact that the number of 5G attacks are still relatively low.\u003c/p\u003e\n\u003cp\u003eEven though 5G has built-in security features, there still some risks and vulnerabilities to be aware of.\u0026nbsp;\u003c/p\u003e\n\u003cp\u003e\"We identified an industry need for a structured understanding of 5G threats because even though 5G represents the most secure cellular standard to date, it can be implemented and deployed in ways that still have risks and vulnerabilities,\" Dr. Charles Clancy, senior vice president and general manager of MITRE Labs, said in a \u003ca href=\"https://www.mitre.org/news-insights/mitre-and-office-under-secretary-defense-announce-fighttm-framework-protect-5g\" target=\"_blank\"\u003estatement\u003c/a\u003e.\u003c/p\u003e\n\u003cp\u003eDuring this year's RSA Conference, researchers from Deloitte \u0026 Touche described a potential avenue of attack \u003ca href=\"https://www.darkreading.com/threat-intelligence/an-emerging-threat-attacking-5g-via-network-slices\" target=\"_self\"\u003etargeting network slices\u003c/a\u003e, a fundamental part of 5G's architecture. Enterprises rolling out \u003ca href=\"https://www.darkreading.com/emerging-tech/understanding-private-5g-lans-in-the-enterprise\" target=\"_self\"\u003e5G LANs\u003c/a\u003e also need to consider that the new capabilities that come with these environments, such as cross-network roaming and cloud edge services, also\u0026nbsp;\u003ca href=\"https://www.darkreading.com/risk/how-to-secure-your-iot-ecosystem-in-the-age-of-5g\" target=\"_self\"\u003eincrease that attack surface\u003c/a\u003e.\u003c/p\u003e\n\u003cp\u003eFiGHT can be used to conduct threat assessments, enable adversarial emulation, and identify gaps in security coverage. Security teams can also use FiGHT to determine which areas the organization should be investing in.\u003c/p\u003e\n\u003cp\u003e\"FiGHT helps stakeholders assess where cyber investments should be made to achieve the highest impact as they build, configure, and deploy secure and resilient 5G systems,\"\u0026nbsp;Clancy said.\u003c/p\u003e","byline":"","created_at":"2022-09-27T15:05:31.288Z","created_by":"blt7639e1b0bae9533a","featured_image":{"_version":1,"is_dir":false,"uid":"blt44bb9f7863470b75","ACL":{},"content_type":"image/jpeg","created_at":"2021-07-05T10:24:27.977Z","created_by":"blt5ee151557599d2cd","file_size":"73040","filename":"5G_peshkov-AdobeStock.jpg","parent_uid":"blt0e5d71babf70ac72","tags":[],"title":"5G_peshkov-AdobeStock.jpg","updated_at":"2021-07-05T10:24:27.977Z","updated_by":"blt5ee151557599d2cd","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2022-09-27T15:05:52.079Z","user":"blt7639e1b0bae9533a"},"url":"https://eu-images.contentstack.com/v3/assets/blt66983808af36a8ef/blt44bb9f7863470b75/60e2dddb35114b094baebf52/5G_peshkov-AdobeStock.jpg"},"featured_image_caption":"","featured_image_credit":"Source: Peshkov via Adobe Stock Photo","image_alt_text":"Blue letters spelling out \"5G\" with network lines and lights","keywords":[],"old_url":"","published_date":"2022-09-27T12:00:00.000Z","seo":{"meta_title":"","meta_description":"","meta_keywords":"","canonical_url":""},"sponsored_content_settings":{"is_sponsor_article":false,"sponsor_name":""},"summary":"MITRE's new FiGHT framework describes adversary tactics and techniques used against 5G systems and networks.","tags":[],"term_selector":{"historyOfPrimaryTerm":["dr-tech"],"primaryTerm":"dr-tech","primaryTermInRealText":"DR Tech","primaryCategoryBelonged":"dr-tech","actualUrl":"/dr-tech/mitre-rolls-out-fight-to-protect-5g-networks"},"title":"MITRE's FiGHT Focuses on 5G Networks","updated_at":"2022-09-30T18:08:49.857Z","updated_by":"blt36bec842c46f38f6","url":"/mitre-rolls-out-fight-to-protect-5g-networks","_content_type_uid":"dr_article","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2022-09-30T18:08:55.968Z","user":"blt36bec842c46f38f6"}},{"_version":22,"locale":"en-us","uid":"bltf9c8d437173984c1","ACL":{},"_in_progress":false,"article_label":[{"uid":"bltb75c0271fde42422","_content_type_uid":"dr_article_label"}],"author_page":[{"_version":4,"locale":"en-us","uid":"blt0f8adf907869ef41","ACL":{},"_in_progress":false,"author_description":"\u003cp\u003eJai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year career at Computerworld, Jai also covered a variety of other technology topics including Big Data, Hadoop, Internet of Things, E-voting and data analytics. Prior to Computerworld, Jai covered technology issues for The Economic Times in Bangalore, India. Jai has a Master's degree in Statistics and lives in Naperville, IL.\u003c/p\u003e","author_email":"jaikumar.vijayan@gmail.com","author_label":{"author_label_background_color":"000000","author_label_text":"","author_label_text_color":"ffffff","display_author_label":false},"author_name":"Jai Vijayan","author_page_tagline":"","author_role":"Contributing Writer, Dark Reading","created_at":"2021-05-29T07:26:14.122Z","created_by":"blt9a0fc67c46c47dd7","hidden_email":false,"image_alt_text":"Jai Vijayan","member_since":null,"portrait":{"_version":1,"is_dir":false,"uid":"blt02d79fb9a44a4258","ACL":{},"content_type":"image/jpeg","created_at":"2021-05-29T07:14:37.963Z","created_by":"blt9a0fc67c46c47dd7","file_size":"7323","filename":"Jai-Vijayan.jpeg","tags":[],"title":"Jai-Vijayan.jpeg","updated_at":"2021-05-29T07:14:37.963Z","updated_by":"blt9a0fc67c46c47dd7","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-05-29T07:14:39.032Z","user":"blt9a0fc67c46c47dd7"},"url":"https://eu-images.contentstack.com/v3/assets/blt66983808af36a8ef/blt02d79fb9a44a4258/60b1e9dd2a25046b35110696/Jai-Vijayan.jpeg"},"seo":{"canonical_url":"","meta_description":"","meta_keywords":"","meta_title":""},"social_links":{"twitter_link":{"title":"@jaivijayan","href":"https://twitter.com/jaivijayan","uuid":42},"linkedin_link":{"title":"Jaikumar Vijayan","href":"https://www.linkedin.com/in/jaivijayan/","uuid":43}},"specialisms":[],"tags":["freelance writers"],"title":"Jai Vijayan","updated_at":"2022-05-17T19:07:56.098Z","updated_by":"blt36bec842c46f38f6","url":"/author/jai-vijayan","_content_type_uid":"dr_author","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2022-05-17T19:08:00.545Z","user":"blt36bec842c46f38f6"}}],"body":"\u003cp\u003eVMware issued urgent new mitigation measures and guidance on Sept. 29 for customers of its vSphere virtualization technology after Mandiant reported detecting a China-based threat actor using a troubling new technique to install multiple persistent backdoors on ESXi hypervisors.\u003c/p\u003e\u003cp\u003eThe technique that Mandiant observed involves the threat actor — tracked as UNC3886 — using malicious vSphere Installation Bundles (VIBs) to sneak their malware onto target systems. To do so, the attackers required admin-level privileges to the ESXi hypervisor. But there was no evidence that they needed to exploit any vulnerability in VMware's products to deploy the malware, Mandiant said.\u003c/p\u003e\u003ch2 class=\"regular-text\"\u003eWide Range of Malicious Capabilities\u003c/h2\u003e\u003cp\u003eThe backdoors, which \u003ca href=\"https://www.mandiant.com/resources/blog/esxi-hypervisors-malware-persistence\" target=\"_blank\"\u003eMandiant has dubbed VIRTUALPITA and VIRTUALPIE\u003c/a\u003e, enable the attackers to carry out a range of malicious activities. This includes maintaining persistent admin access to the ESXi hypervisor; sending malicious commands to the guest VM via the hypervisor; transferring files between the ESXi hypervisor and guest machines; tampering with logging services; and executing arbitrary commands between VM guests on the same hypervisor.\u003c/p\u003e\u003cp\u003e\"Using the malware ecosystem, it is possible for an attacker to remotely access a hypervisor and send arbitrary commands that will be executed on a guest virtual machine,\" says Alex Marvi, a security consultant at Mandiant. \"The backdoors Mandiant observed, VIRTUALPITA and VIRTUALPIE, allow attackers interactive access to the hypervisors themselves. They allow attackers to pass the commands from host to guest.\"\u0026nbsp;\u003c/p\u003e\u003cp\u003eMarvi says Mandiant observed a separate Python script specifying which commands to run and which guest machine to run them on.\u003c/p\u003e\u003cp\u003eMandiant said it was aware of fewer than 10 organizations where the threat actors had managed to compromise ESXi hypervisors in this manner. But expect more incidents to surface, the security vendor warned in its report: \"While we noted the technique used by UNC3886 requires a deeper level of understanding of the ESXi operating system and VMware's virtualization platform, we anticipate a variety of other threat actors will use the information outlined in this research to begin building out similar capabilities.\"\u003c/p\u003e\u003cp\u003eVMware describes a VIB as a \"\u003ca href=\"https://blogs.vmware.com/vsphere/2011/09/whats-in-a-vib.html\" target=\"_blank\"\u003ecollection of files\u003c/a\u003e packaged into a single archive to facilitate distribution.\" They are designed to help administrators manage virtual systems, distribute custom binaries and updates across the environment, and create startup tasks and custom firewall rules on ESXi system restart.\u003c/p\u003e\u003ch2 class=\"regular-text\"\u003eTricky New Tactic\u003c/h2\u003e\u003cp\u003eVMware has designated four so-called acceptance levels for VIBs: VMwareCertified VIBs that are VMware created, tested, and signed; VMwareAccepted VIBs that are created and signed by approved VMware partners; PartnerSupported VIBs from trusted VMware partners; and CommunitySupported VIBs created by individuals or partners outside the VMware partner program. CommunitySupported VIBs are not VMware- or partner-tested or supported.\u003c/p\u003e\u003cp\u003eWhen an ESXi image is created, it is assigned one of these acceptance levels, Mandiant said. \"Any VIBs added to the image must be at the same acceptance level or higher,\" the security vendor said. \"This helps ensure that non-supported VIBs don't get mixed in with supported VIBs when creating and maintaining ESXi images.\"\u0026nbsp;\u003c/p\u003e\u003cp\u003eVMware's default minimum acceptance level for a VIB is PartnerSupported. But administrators can change the level manually and force a profile to ignore minimum acceptance level requirements when installing a VIB, Mandiant said.\u003c/p\u003e\u003cp\u003eIn the incidents that Mandiant observed, the attackers appear to have used this fact to their advantage by first creating a CommunitySupport-level VIB and then modifying its descriptor file to make it appear that the VIB was PartnerSupported. They then used a so-called force flag parameter associated with VIB use to install the malicious VIB on the target ESXi hypervisors. Marvi pointed Dark Reading to VMware when asked whether the force parameter should be considered a weakness considering that it gives administrators a way to override minimum VIB acceptance requirements.\u003c/p\u003e\u003ch2 class=\"regular-text\"\u003eOperation Security Lapse?\u003c/h2\u003e\u003cp\u003eA VMware spokeswoman denied the issue was a weakness. The company\u0026nbsp;recommends Secure Boot because it\u0026nbsp;disables this force command, she says. \"The attacker had to have full access to ESXi to run the force command, and a second layer of security in Secure Boot\u0026nbsp;is necessary to disable this command,\" she says.\u0026nbsp;\u003c/p\u003e\u003cp\u003eShe also notes that mechanisms are available that would allow organizations to identify when a VIB might have been tampered with.\u0026nbsp;In a blog post that VMWare published at the same time as Mandiant's report, VMware identified the attacks as \u003ca href=\"https://core.vmware.com/vsphere-esxi-mandiant-malware-persistence#section3\" target=\"_blank\"\u003elikely the result of operational security weaknesses\u003c/a\u003e on the part of the victim organizations. The company outlined specific ways organizations can configure their environments to protect against VIB misuse and other threats.\u003c/p\u003e\u003cp\u003eVMware recommends\u0026nbsp;that organizations implement Secure Boot, Trusted Platform Modules, and Host Attestation to validate software drivers and other components. \"When Secure Boot is enabled the use of the 'CommunitySupported' acceptance level will be blocked, preventing attackers from installing unsigned and improperly signed VIBs (even with the --force parameter as noted in the report),\" VMware said.\u003c/p\u003e\u003cp\u003eThe company also said organizations should implement robust patching and life-cycle management practices and use technologies such as its VMware Carbon Black Endpoint and VMware NSX suite to harden workloads.\u003c/p\u003e\u003cp\u003eMandiant also published a separate second blog post on Sept. 29 that detailed\u0026nbsp;\u003ca href=\"https://www.mandiant.com/resources/blog/esxi-hypervisors-detection-hardening\" target=\"_blank\"\u003ehow organizations can detect threats\u003c/a\u003e like the one they observed and how to harden their ESXi environments against them. Among the defenses are\u0026nbsp;network isolation, strong identity and access management, and proper services management practices.\u003c/p\u003e\u003cp\u003eMike Parkin, senior technical engineer at Vulcan Cyber, says the attack demonstrates a very interesting technique for attackers to retain persistence and expand their presence in a targeted environment.\u0026nbsp;\"It looks more like something a well-resourced state- or state-sponsored threat would use, versus what a common criminal APT group would deploy,\" he says.\u003cbr/\u003e\u003cbr/\u003eParkin says\u0026nbsp;VMware technologies can be very robust and resilient when deployed using the company's\u0026nbsp;recommended configurations and industry best practices. \"However, things become much more challenging when the threat actor is logging in with administrative credentials. As an attacker, if you can get root you have the keys to the kingdom, so to speak.\"\u003cbr/\u003e\u003cbr/\u003e\u003c/p\u003e","byline":"","created_at":"2022-09-29T18:05:22.531Z","created_by":"blt7e4fac778c192b55","featured_image":{"_version":1,"is_dir":false,"uid":"bltd4fbec06683cce66","ACL":{},"content_type":"image/jpeg","created_at":"2022-09-29T18:03:40.667Z","created_by":"blt7e4fac778c192b55","file_size":"295911","filename":"vmware_rafapress_shtterstock.jpg","parent_uid":null,"tags":[],"title":"vmware_rafapress_shtterstock.jpg","updated_at":"2022-09-29T18:03:40.667Z","updated_by":"blt7e4fac778c192b55","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2022-09-29T20:35:12.114Z","user":"blt603b94c5f23c042e"},"url":"https://eu-images.contentstack.com/v3/assets/blt66983808af36a8ef/bltd4fbec06683cce66/6335ddfc97cb7112f0cb0666/vmware_rafapress_shtterstock.jpg"},"featured_image_caption":"","featured_image_credit":"Source: rafapress via Shutterstock","image_alt_text":"vmware logo on computer screen","keywords":[],"old_url":"","published_date":"2022-09-29T19:26:44.000Z","seo":{"meta_title":"","meta_description":"","meta_keywords":"","canonical_url":""},"sponsored_content_settings":{"is_sponsor_article":false,"sponsor_name":""},"summary":"China-based threat actor used poisoned vSphere Installation Bundles to deliver multiple backdoors on systems, security vendor says.","tags":[],"term_selector":{"historyOfPrimaryTerm":["attacks-breaches"],"primaryTerm":"attacks-breaches","primaryTermInRealText":"Attacks/Breaches","primaryCategoryBelonged":"attacks-breaches","actualUrl":"/attacks-breaches/attackers-develop-dangerous-new-technique-for-compromising-esxi-hypervisors","secondaryTerm":["threat-intelligence","vulnerabilities-threats","advanced-threats","vulnerability-management"]},"title":"Dangerous New Attack Technique Compromising VMware ESXi Hypervisors","updated_at":"2022-09-29T20:34:59.682Z","updated_by":"blt603b94c5f23c042e","url":"/attackers-develop-dangerous-new-technique-for-compromising-esxi-hypervisors","_content_type_uid":"dr_article","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2022-09-29T20:35:12.356Z","user":"blt603b94c5f23c042e"}}],"tags":["editors' choice"],"title":"Editors' Choice","updated_at":"2022-09-30T22:29:35.590Z","updated_by":"blt13546d7f135b3d6e","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2022-09-30T22:29:43.922Z","user":"blt13546d7f135b3d6e"}},"secondaryData":[],"newsletterSubscribe":{"message":"Keep up with the latest cybersecurity threats, newly-discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.","open_subscribe_link_on_new_tab":true,"subscribe_link":{"title":"Subscribe","href":"https://www.darkreading.com/newsletter-signup/?_mc=dr_eoa"}},"moreInsights":{"title":"More Insights","heading":"More Insights","system":{"uid":"blt5ee3e0ba340bf613","__typename":"EntrySystemField"},"smartboxConnection":{"edges":[{"node":{"title":"White Papers","ordinal":3,"hidden":false,"system":{"uid":"blt1192837947494c5f","__typename":"EntrySystemField"},"feed":{"title":"White Papers","href":"https://smartbox.techweb.com/smartbox/externalsmartbox?site_id=162801002\u0026taxonomy_ids=\u0026num_display=\u0026article_type=whitepaper\u0026output_type=xml","__typename":"Link"},"read_more_link":{"title":"More White Papers","href":"https://www.informationweek.com/whitepaper/Security","__typename":"Link"},"__typename":"DrSmartbox","articles":[{"title":["Ransomware Is On The Rise"],"link":["https://www.informationweek.com/whitepaper/cybersecurity/security/ransomware-is-on-the-rise/442203?keycode=sbx\u0026cid=smartbox_techweb_whitepaper_14.500005226\u0026_mc=smartbox_techweb_whitepaper_14.500005226"],"publishedSite":[""],"publishedSiteURL":[""]},{"title":["Your Digital Transformation Is Being Sabotaged - The Surprising Impact of Sophisticated Bots"],"link":["https://www.informationweek.com/whitepaper/cybersecurity/security-monitoring/your-digital-transformation-is-being-sabotaged-the-surprising-impact-of-sophisticated-bots/440933?keycode=sbx\u0026cid=smartbox_techweb_whitepaper_14.500005215\u0026_mc=smartbox_techweb_whitepaper_14.500005215"],"publishedSite":[""],"publishedSiteURL":[""]},{"title":["Extended Detection and Response (XDR) - Beginner's Guide"],"link":["https://www.informationweek.com/whitepaper/security-monitoring/security-platforms/extended-detection-and-response-(xdr)-beginner's-guide/432383?keycode=sbx\u0026cid=smartbox_techweb_whitepaper_14.500005203\u0026_mc=smartbox_techweb_whitepaper_14.500005203"],"publishedSite":[""],"publishedSiteURL":[""]},{"title":["ESG: Investing in Incident Readiness"],"link":["https://www.informationweek.com/whitepaper/risk-management-security/cybersecurity/esg-investing-in-incident-readiness/437723?keycode=sbx\u0026cid=smartbox_techweb_whitepaper_14.500005196\u0026_mc=smartbox_techweb_whitepaper_14.500005196"],"publishedSite":[""],"publishedSiteURL":[""]},{"title":["Building Operational Resilience in Industrial \u0026 Critical Infrastructure"],"link":["https://www.informationweek.com/whitepaper/cybersecurity/security/building-operational-resilience-in-industrial-and-critical-infrastructure/439543?keycode=sbx\u0026cid=smartbox_techweb_whitepaper_14.500005188\u0026_mc=smartbox_techweb_whitepaper_14.500005188"],"publishedSite":[""],"publishedSiteURL":[""]}]},"__typename":"DrMoreInsightsSmartboxEdge"},{"node":{"title":"Webinars","ordinal":1,"hidden":false,"system":{"uid":"blt8f82585c522cc0f5","__typename":"EntrySystemField"},"feed":{"title":"Webinars","href":"https://smartbox.techweb.com/smartbox/externalsmartbox?site_id=162801002\u0026taxonomy_ids=\u0026num_display=5\u0026article_type=upcoming_webinars\u0026output_type=xml","__typename":"Link"},"read_more_link":{"title":"More Webinars","href":"https://www.darkreading.com/upcoming-webinars","__typename":"Link"},"__typename":"DrSmartbox","articles":[{"title":["Using Zero Trust to Protect Remote and Home Workers"],"link":["https://webinar.darkreading.com/1316745?keycode=sbx\u0026cid=smartbox_techweb_upcoming_webinars_8.500001216\u0026_mc=smartbox_techweb_upcoming_webinars_8.500001216"],"publishDate":["Sep 14, 2022"],"publishedSite":[""],"eventDate":["Oct 06, 2022"],"publishedSiteURL":[""],"description":["When COVID-19 hit, many organizations attempted to implement Zero Trust environments to protect their data from online threats presented by unsecured home office equipment. But these efforts were often temporary and not particularly effective. In this webinar, experts offer a more permanent, more effective strategy for using Zero Trust to secure remote and hybrid workers and protect critical data from unauthorized access."]},{"title":["Strategies for DDoS Resilience and Response"],"link":["https://webinar.darkreading.com/1781964?keycode=sbx\u0026cid=smartbox_techweb_upcoming_webinars_8.500001218\u0026_mc=smartbox_techweb_upcoming_webinars_8.500001218"],"publishDate":["Sep 15, 2022"],"publishedSite":[""],"eventDate":["Oct 18, 2022"],"publishedSiteURL":[""],"description":["There are few things more disruptive than a distributed denial-of-service (DDoS) attack. The criminals behind these attacks have one objective: to bring everything to a stop so you can't conduct business as usual. How can you ensure business continuity during these events? What is your plan for communicating with essential stakeholders if services are down? Who should you contact outside of your organization for help? Are your backup and recovery plans in place and ready to go in the event of an attack? In this webinar, learn what processes and procedures should go into your DDoS response playbook, and learn about the tools and techniques that will help you bounce back from a DDoS without any major impact to productivity."]},{"title":["Next-Gen Security Operations: Building the SOC of the Future"],"link":["https://webinar.darkreading.com/1341545?keycode=sbx\u0026cid=smartbox_techweb_upcoming_webinars_8.500001219\u0026_mc=smartbox_techweb_upcoming_webinars_8.500001219"],"publishDate":["Sep 15, 2022"],"publishedSite":[""],"eventDate":["Oct 19, 2022"],"publishedSiteURL":[""],"description":["What does a security operations center (SOCs) require in 2022? The practice of monitoring and responding to threats looks very different today than it did just a few years ago. Which tools and skills do you need know to outfit a SOC to respond to today's most current threats and online exploits? In this webinar, experts offer insight and recommendations on how to build a next-generation SOC."]},{"title":["Hacks That Bypass Multi-Factor Authentication and How to Make Your MFA Solution Phishing Resistant"],"link":["https://webinar.darkreading.com/1835400?keycode=sbx\u0026cid=smartbox_techweb_upcoming_webinars_8.500001220\u0026_mc=smartbox_techweb_upcoming_webinars_8.500001220"],"publishDate":["Sep 21, 2022"],"publishedSite":[""],"eventDate":["Oct 25, 2022"],"publishedSiteURL":[""],"description":["The average person believes using Multi-Factor Authentication (MFA) makes them significantly less likely to be hacked. That is simply not true! Hackers can bypass 90-95% of MFA solutions much easier than you would think. Using a regular looking phishing email, they can bypass MFA just as easily as if it were a simple password.\r\n\r\nJoin Roger A. Grimes, KnowBe4's Data-Driven Defense Evangelist for this new webinar to learn common MFA hacking techniques and what it takes to make your MFA phishing resistant. He'll also share a pre-filmed MFA hacking demo from Kevin Mitnick, KnowBe4's Chief Hacking Officer. Get the information you need to know now to better defend your network."]},{"title":["Threat Hunting Today: The Tools and Techniques That Get You Out in Front of Criminals"],"link":["https://darkreading.tradepub.com/c/pubRD.mpl?secure=1\u0026sr=pp\u0026_t=pp:\u0026qf=w_defa3231\u0026ch=sbx\u0026cid=smartbox_techweb_upcoming_webinars_8.500001221\u0026_mc=smartbox_techweb_upcoming_webinars_8.500001221"],"publishDate":["Sep 27, 2022"],"publishedSite":[""],"eventDate":["Oct 26, 2022"],"publishedSiteURL":[""],"description":["Proactive \"threat hunting\" is becoming a more common practice for organizations who know it is no longer enough to detect threats and defend against them. Security teams are increasingly taking a more proactive approach--seeking out potential threats using analytical tools. How do these enterprises build threat hunting programs? How do they staff them, and what tools do they need? In this Dark Reading webinar, a top expert discusses the process for building a threat hunting program, and for optimizing the efforts of designated threat hunters in the organization.\r\n\r\nAttend this webinar and you'll: \r\n-Get the fundamentals of a good threat hunting program\r\n-Learn tips and techniques for better threat hunting\r\n-Find out how the top organizations handle threat intelligence gathering and reporting\r\n-Gather resources to help start your own threat hunting program"]}]},"__typename":"DrMoreInsightsSmartboxEdge"},{"node":{"title":"Reports","ordinal":1,"hidden":false,"system":{"uid":"blt5145c70334f61d02","__typename":"EntrySystemField"},"feed":{"title":"Reports","href":"https://smartbox.techweb.com/smartbox/externalsmartbox?site_id=162801002\u0026taxonomy_ids=\u0026num_display=5\u0026article_type=analytics\u0026output_type=xml","__typename":"Link"},"read_more_link":{"title":"More Reports","href":"/must-reads","__typename":"Link"},"__typename":"DrSmartbox","articles":[{"title":["Breaches Prompt Changes to Enterprise IR Plans and Processes"],"link":["https://www.informationweek.com/whitepaper/security-monitoring/cloud-security/breaches-prompt-changes-to-enterprise-ir-plans-and-processes/439583?cid=smartbox_techweb_analytics_7.300005941\u0026_mc=smartbox_techweb_analytics_7.300005941"],"publishedSite":[""],"publishedSiteURL":[""]},{"title":["Implementing Zero Trust In Your Enterprise: How to Get Started"],"link":["https://www.informationweek.com/whitepaper/network-and-perimeter-security/endpoint-security/implementing-zero-trust-in-your-enterprise-how-to-get-started/441133?cid=smartbox_techweb_analytics_7.300005940\u0026_mc=smartbox_techweb_analytics_7.300005940"],"publishedSite":[""],"publishedSiteURL":[""]},{"title":["6 Elements of a Solid IoT Security Strategy"],"link":["https://www.informationweek.com/whitepaper/endpoint-security/network-and-perimeter-security/6-elements-of-a-solid-iot-security-strategy/439873?cid=smartbox_techweb_analytics_7.300005939\u0026_mc=smartbox_techweb_analytics_7.300005939"],"publishedSite":[""],"publishedSiteURL":[""]},{"title":["Incorporating a Prevention Mindset into Threat Detection and Response"],"link":["https://www.informationweek.com/whitepaper/network-and-perimeter-security/networking/incorporating-a-prevention-mindset-into-threat-detection-and-response/439373?cid=smartbox_techweb_analytics_7.300005934\u0026_mc=smartbox_techweb_analytics_7.300005934"],"publishedSite":[""],"publishedSiteURL":[""]},{"title":["Practical Network Security Approaches for a Multicloud, Hybrid IT World"],"link":["https://www.informationweek.com/whitepaper/cloud-security/network-and-perimeter-security/practical-network-security-approaches-for-a-multicloud,-hybrid-it-world/438913?cid=smartbox_techweb_analytics_7.300005932\u0026_mc=smartbox_techweb_analytics_7.300005932"],"publishedSite":[""],"publishedSiteURL":[""],"description":["The report covers areas enterprises should focus on for their multicloud/hybrid cloud security strategy:\r\n-increase visibility over the environment\r\n-learning cloud-specific skills\r\n-relying on established security frameworks\r\n-re-architecting the network\r\n"]}]},"__typename":"DrMoreInsightsSmartboxEdge"}],"__typename":"DrMoreInsightsSmartboxConnection"},"__typename":"DrMoreInsights","smartbox":[{"title":"White Papers","ordinal":3,"hidden":false,"system":{"uid":"blt1192837947494c5f","__typename":"EntrySystemField"},"feed":{"title":"White Papers","href":"https://smartbox.techweb.com/smartbox/externalsmartbox?site_id=162801002\u0026taxonomy_ids=\u0026num_display=\u0026article_type=whitepaper\u0026output_type=xml","__typename":"Link"},"read_more_link":{"title":"More White Papers","href":"https://www.informationweek.com/whitepaper/Security","__typename":"Link"},"__typename":"DrSmartbox","articles":[{"title":["Ransomware Is On The Rise"],"link":["https://www.informationweek.com/whitepaper/cybersecurity/security/ransomware-is-on-the-rise/442203?keycode=sbx\u0026cid=smartbox_techweb_whitepaper_14.500005226\u0026_mc=smartbox_techweb_whitepaper_14.500005226"],"publishedSite":[""],"publishedSiteURL":[""]},{"title":["Your Digital Transformation Is Being Sabotaged - The Surprising Impact of Sophisticated Bots"],"link":["https://www.informationweek.com/whitepaper/cybersecurity/security-monitoring/your-digital-transformation-is-being-sabotaged-the-surprising-impact-of-sophisticated-bots/440933?keycode=sbx\u0026cid=smartbox_techweb_whitepaper_14.500005215\u0026_mc=smartbox_techweb_whitepaper_14.500005215"],"publishedSite":[""],"publishedSiteURL":[""]},{"title":["Extended Detection and Response (XDR) - Beginner's Guide"],"link":["https://www.informationweek.com/whitepaper/security-monitoring/security-platforms/extended-detection-and-response-(xdr)-beginner's-guide/432383?keycode=sbx\u0026cid=smartbox_techweb_whitepaper_14.500005203\u0026_mc=smartbox_techweb_whitepaper_14.500005203"],"publishedSite":[""],"publishedSiteURL":[""]},{"title":["ESG: Investing in Incident Readiness"],"link":["https://www.informationweek.com/whitepaper/risk-management-security/cybersecurity/esg-investing-in-incident-readiness/437723?keycode=sbx\u0026cid=smartbox_techweb_whitepaper_14.500005196\u0026_mc=smartbox_techweb_whitepaper_14.500005196"],"publishedSite":[""],"publishedSiteURL":[""]},{"title":["Building Operational Resilience in Industrial \u0026 Critical Infrastructure"],"link":["https://www.informationweek.com/whitepaper/cybersecurity/security/building-operational-resilience-in-industrial-and-critical-infrastructure/439543?keycode=sbx\u0026cid=smartbox_techweb_whitepaper_14.500005188\u0026_mc=smartbox_techweb_whitepaper_14.500005188"],"publishedSite":[""],"publishedSiteURL":[""]}]},{"title":"Webinars","ordinal":1,"hidden":false,"system":{"uid":"blt8f82585c522cc0f5","__typename":"EntrySystemField"},"feed":{"title":"Webinars","href":"https://smartbox.techweb.com/smartbox/externalsmartbox?site_id=162801002\u0026taxonomy_ids=\u0026num_display=5\u0026article_type=upcoming_webinars\u0026output_type=xml","__typename":"Link"},"read_more_link":{"title":"More Webinars","href":"https://www.darkreading.com/upcoming-webinars","__typename":"Link"},"__typename":"DrSmartbox","articles":[{"title":["Using Zero Trust to Protect Remote and Home Workers"],"link":["https://webinar.darkreading.com/1316745?keycode=sbx\u0026cid=smartbox_techweb_upcoming_webinars_8.500001216\u0026_mc=smartbox_techweb_upcoming_webinars_8.500001216"],"publishDate":["Sep 14, 2022"],"publishedSite":[""],"eventDate":["Oct 06, 2022"],"publishedSiteURL":[""],"description":["When COVID-19 hit, many organizations attempted to implement Zero Trust environments to protect their data from online threats presented by unsecured home office equipment. But these efforts were often temporary and not particularly effective. In this webinar, experts offer a more permanent, more effective strategy for using Zero Trust to secure remote and hybrid workers and protect critical data from unauthorized access."]},{"title":["Strategies for DDoS Resilience and Response"],"link":["https://webinar.darkreading.com/1781964?keycode=sbx\u0026cid=smartbox_techweb_upcoming_webinars_8.500001218\u0026_mc=smartbox_techweb_upcoming_webinars_8.500001218"],"publishDate":["Sep 15, 2022"],"publishedSite":[""],"eventDate":["Oct 18, 2022"],"publishedSiteURL":[""],"description":["There are few things more disruptive than a distributed denial-of-service (DDoS) attack. The criminals behind these attacks have one objective: to bring everything to a stop so you can't conduct business as usual. How can you ensure business continuity during these events? What is your plan for communicating with essential stakeholders if services are down? Who should you contact outside of your organization for help? Are your backup and recovery plans in place and ready to go in the event of an attack? In this webinar, learn what processes and procedures should go into your DDoS response playbook, and learn about the tools and techniques that will help you bounce back from a DDoS without any major impact to productivity."]},{"title":["Next-Gen Security Operations: Building the SOC of the Future"],"link":["https://webinar.darkreading.com/1341545?keycode=sbx\u0026cid=smartbox_techweb_upcoming_webinars_8.500001219\u0026_mc=smartbox_techweb_upcoming_webinars_8.500001219"],"publishDate":["Sep 15, 2022"],"publishedSite":[""],"eventDate":["Oct 19, 2022"],"publishedSiteURL":[""],"description":["What does a security operations center (SOCs) require in 2022? The practice of monitoring and responding to threats looks very different today than it did just a few years ago. Which tools and skills do you need know to outfit a SOC to respond to today's most current threats and online exploits? In this webinar, experts offer insight and recommendations on how to build a next-generation SOC."]},{"title":["Hacks That Bypass Multi-Factor Authentication and How to Make Your MFA Solution Phishing Resistant"],"link":["https://webinar.darkreading.com/1835400?keycode=sbx\u0026cid=smartbox_techweb_upcoming_webinars_8.500001220\u0026_mc=smartbox_techweb_upcoming_webinars_8.500001220"],"publishDate":["Sep 21, 2022"],"publishedSite":[""],"eventDate":["Oct 25, 2022"],"publishedSiteURL":[""],"description":["The average person believes using Multi-Factor Authentication (MFA) makes them significantly less likely to be hacked. That is simply not true! Hackers can bypass 90-95% of MFA solutions much easier than you would think. Using a regular looking phishing email, they can bypass MFA just as easily as if it were a simple password.\r\n\r\nJoin Roger A. Grimes, KnowBe4's Data-Driven Defense Evangelist for this new webinar to learn common MFA hacking techniques and what it takes to make your MFA phishing resistant. He'll also share a pre-filmed MFA hacking demo from Kevin Mitnick, KnowBe4's Chief Hacking Officer. Get the information you need to know now to better defend your network."]},{"title":["Threat Hunting Today: The Tools and Techniques That Get You Out in Front of Criminals"],"link":["https://darkreading.tradepub.com/c/pubRD.mpl?secure=1\u0026sr=pp\u0026_t=pp:\u0026qf=w_defa3231\u0026ch=sbx\u0026cid=smartbox_techweb_upcoming_webinars_8.500001221\u0026_mc=smartbox_techweb_upcoming_webinars_8.500001221"],"publishDate":["Sep 27, 2022"],"publishedSite":[""],"eventDate":["Oct 26, 2022"],"publishedSiteURL":[""],"description":["Proactive \"threat hunting\" is becoming a more common practice for organizations who know it is no longer enough to detect threats and defend against them. Security teams are increasingly taking a more proactive approach--seeking out potential threats using analytical tools. How do these enterprises build threat hunting programs? How do they staff them, and what tools do they need? In this Dark Reading webinar, a top expert discusses the process for building a threat hunting program, and for optimizing the efforts of designated threat hunters in the organization.\r\n\r\nAttend this webinar and you'll: \r\n-Get the fundamentals of a good threat hunting program\r\n-Learn tips and techniques for better threat hunting\r\n-Find out how the top organizations handle threat intelligence gathering and reporting\r\n-Gather resources to help start your own threat hunting program"]}]},{"title":"Reports","ordinal":1,"hidden":false,"system":{"uid":"blt5145c70334f61d02","__typename":"EntrySystemField"},"feed":{"title":"Reports","href":"https://smartbox.techweb.com/smartbox/externalsmartbox?site_id=162801002\u0026taxonomy_ids=\u0026num_display=5\u0026article_type=analytics\u0026output_type=xml","__typename":"Link"},"read_more_link":{"title":"More Reports","href":"/must-reads","__typename":"Link"},"__typename":"DrSmartbox","articles":[{"title":["Breaches Prompt Changes to Enterprise IR Plans and Processes"],"link":["https://www.informationweek.com/whitepaper/security-monitoring/cloud-security/breaches-prompt-changes-to-enterprise-ir-plans-and-processes/439583?cid=smartbox_techweb_analytics_7.300005941\u0026_mc=smartbox_techweb_analytics_7.300005941"],"publishedSite":[""],"publishedSiteURL":[""]},{"title":["Implementing Zero Trust In Your Enterprise: How to Get Started"],"link":["https://www.informationweek.com/whitepaper/network-and-perimeter-security/endpoint-security/implementing-zero-trust-in-your-enterprise-how-to-get-started/441133?cid=smartbox_techweb_analytics_7.300005940\u0026_mc=smartbox_techweb_analytics_7.300005940"],"publishedSite":[""],"publishedSiteURL":[""]},{"title":["6 Elements of a Solid IoT Security Strategy"],"link":["https://www.informationweek.com/whitepaper/endpoint-security/network-and-perimeter-security/6-elements-of-a-solid-iot-security-strategy/439873?cid=smartbox_techweb_analytics_7.300005939\u0026_mc=smartbox_techweb_analytics_7.300005939"],"publishedSite":[""],"publishedSiteURL":[""]},{"title":["Incorporating a Prevention Mindset into Threat Detection and Response"],"link":["https://www.informationweek.com/whitepaper/network-and-perimeter-security/networking/incorporating-a-prevention-mindset-into-threat-detection-and-response/439373?cid=smartbox_techweb_analytics_7.300005934\u0026_mc=smartbox_techweb_analytics_7.300005934"],"publishedSite":[""],"publishedSiteURL":[""]},{"title":["Practical Network Security Approaches for a Multicloud, Hybrid IT World"],"link":["https://www.informationweek.com/whitepaper/cloud-security/network-and-perimeter-security/practical-network-security-approaches-for-a-multicloud,-hybrid-it-world/438913?cid=smartbox_techweb_analytics_7.300005932\u0026_mc=smartbox_techweb_analytics_7.300005932"],"publishedSite":[""],"publishedSiteURL":[""],"description":["The report covers areas enterprises should focus on for their multicloud/hybrid cloud security strategy:\r\n-increase visibility over the environment\r\n-learning cloud-specific skills\r\n-relying on established security frameworks\r\n-re-architecting the network\r\n"]}]}]},"tagManagerArgs":{"dataLayer":{"pageTitle":"Google Chrome Polishes Its First Security Update","pageID":"bltb8b51aa64bdcf847","pageType":"article","pagePrimaryCategory":"risk","termSelector":{"primaryTerm":"risk","primaryTermInRealText":"Risk","primaryCategoryBelonged":"risk","actualUrl":"/risk/google-chrome-polishes-its-first-security-update"},"contentLabel":"Commentary","adUnit":"3834/darkreading.home/article/risk","canonicalUrl":"","canonicalPath":"","hostname":"","contentAuthor":"George V. Hulme","contentPubDate":"Sep 09, 2008","event":"pageLoad","pageIsSponsored":false,"pageSponsor":"","byline":"","keyword":[],"pageReadTime":"1"},"dataLayerName":"dataLayer"},"globalData":{"footer":{"_version":20,"locale":"en-us","uid":"blt2f72369f0f41c8be","ACL":{},"_in_progress":false,"copyright":{"text":"Informa PLC Informa UK Limited is a company registered in England and Wales with company number 1072954 whose registered office is 5 Howick Place, London, SW1P 1WG."},"created_at":"2021-05-29T07:25:34.562Z","created_by":"blt9a0fc67c46c47dd7","horizontal_navigation":{"link":[{"title":"Home","href":"https://tech.informa.com/"},{"title":"Cookies","href":"https://tech.informa.com/cookie-policy"},{"title":"Privacy","href":"https://tech.informa.com/privacy-policy"},{"title":"Terms","href":"https://tech.informa.com/terms-and-conditions"}]},"logo":{"image":{"_version":1,"is_dir":false,"uid":"blt3edeb23396a4b5dc","ACL":{},"content_type":"image/png","created_at":"2021-05-29T07:17:14.517Z","created_by":"blt9a0fc67c46c47dd7","file_size":"7774","filename":"Whitelogo_1.png","tags":[],"title":"Whitelogo_1.png","updated_at":"2021-05-29T07:17:14.517Z","updated_by":"blt9a0fc67c46c47dd7","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-05-29T07:17:15.797Z","user":"blt9a0fc67c46c47dd7"},"url":"https://eu-images.contentstack.com/v3/assets/blt66983808af36a8ef/blt3edeb23396a4b5dc/60b1ea7a9afdef577986633e/Whitelogo_1.png"},"image_alt_text":"Informatech Logo"},"nav_links":{"link":[{"title":"Home","href":"/"},{"title":"About","href":"/about"},{"title":"Contact","href":"/contact"},{"title":"Blog","href":"/blog"}]},"one_column_navigation":{"link":[{"title":"About Us","href":"https://www.darkreading.com/about-us"},{"title":"Advertise","href":"https://www.darkreading.com/advertise"},{"title":"Reprints","href":"https://info.wrightsmedia.com/informa-licensing-reprints-request"}],"title":"Working With Us"},"social_networks":{"social_network":[{"link":{"title":"Rss","href":"https://www.darkreading.com/rss.xml"},"_metadata":{"uid":"csc2779b70d6e03c3a"},"icon_class":"fas fa-rss","active":true},{"link":{"title":"Twitter","href":"https://twitter.com/DarkReading"},"_metadata":{"uid":"csd24262af0f251c9b"},"icon_class":"fab fa-twitter","active":true},{"link":{"title":"Linkedin","href":"https://www.linkedin.com/company/dark-reading/"},"_metadata":{"uid":"cse75c5c0ea8c72705"},"icon_class":"fab fa-linkedin-in","active":true},{"link":{"title":"Facebook","href":"https://www.facebook.com/darkreadingcom"},"_metadata":{"uid":"csdbb1b7d09b01bb09"},"icon_class":"fab fa-facebook-f","active":true},{"link":{"title":"Google News","href":"https://news.google.com/publications/CAAqBwgKMKmknwswtq63Aw?ceid=US:en\u0026oc=3"},"_metadata":{"uid":"cs8df94cf6003ddf3f"},"icon_class":"google","active":true}],"title":"Follow Dark Reading On Social"},"tags":[],"title":"Footer","two_columns_navigation":{"link":[{"title":"Interop","href":"https://www.interop.com/"},{"title":"InformationWeek","href":"https://www.informationweek.com/"},{"title":"Network Computing","href":"https://www.networkcomputing.com/"},{"title":"ITPro Today","href":"https://www.itprotoday.com/"},{"title":"Data Center Knowledge","href":"https://www.datacenterknowledge.com/"},{"title":"Black Hat","href":"https://www.blackhat.com/"},{"title":"Omdia","href":"http://www.omdia.com/"}],"title":"Discover More From Informa Tech"},"updated_at":"2022-05-24T03:57:50.679Z","updated_by":"blt986fc66e34c7b415","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2022-05-25T13:58:37.778Z","user":"blt9488f204761710b3"}},"siteSettings":{"_version":84,"locale":"en-us","uid":"blt03ce54293658c8bc","ACL":{},"_in_progress":false,"content_type_icons":[{"content_type":"Article","icon":{"uid":"blt27dca7fd9a7ec07d","created_by":"blt871c9fa65adba4f6","updated_by":"blt871c9fa65adba4f6","created_at":"2021-06-29T03:51:02.199Z","updated_at":"2021-06-29T03:51:02.199Z","content_type":"image/svg+xml","file_size":"3327","filename":"Article.svg","title":"Article.svg","ACL":{},"_version":1,"is_dir":false,"tags":[],"publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-06-29T03:51:31.680Z","user":"blt871c9fa65adba4f6"},"url":"https://eu-images.contentstack.com/v3/assets/blt66983808af36a8ef/blt27dca7fd9a7ec07d/60da98a6537dbc26a0e2a2d3/Article.svg"},"_metadata":{"uid":"cs6bc72e5d7fe8d645"}},{"content_type":"Slideshow","icon":{"_version":1,"is_dir":false,"uid":"bltc31af506fe1f1ef3","ACL":{},"content_type":"image/svg+xml","created_at":"2021-06-23T03:08:44.113Z","created_by":"blt986fc66e34c7b415","file_size":"3960","filename":"Vector.svg","tags":[],"title":"Vector.svg","updated_at":"2021-06-23T03:08:44.113Z","updated_by":"blt986fc66e34c7b415","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-07-15T11:44:06.452Z","user":"blt986fc66e34c7b415"},"url":"https://eu-images.contentstack.com/v3/assets/blt66983808af36a8ef/bltc31af506fe1f1ef3/60d2a5bcdd40a179d073b802/Vector.svg"},"_metadata":{"uid":"cs9b26d7221b48f0e9"}},{"content_type":"Video","icon":{"uid":"blt73d712bb4508bdd2","created_by":"bltb064b71641a544b9","updated_by":"bltb064b71641a544b9","created_at":"2021-07-06T07:22:25.803Z","updated_at":"2021-07-06T07:22:25.803Z","content_type":"image/svg+xml","file_size":"3593","filename":"Vector.svg","title":"Vector.svg","ACL":{},"_version":1,"is_dir":false,"tags":[],"publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-08-09T19:11:32.637Z","user":"blt9488f204761710b3"},"url":"https://eu-images.contentstack.com/v3/assets/blt66983808af36a8ef/blt73d712bb4508bdd2/60e404b17625b62c25ba2a74/Vector.svg"},"_metadata":{"uid":"csee3d099c523785a7"}}],"cookie_banner":"\u003cp data-children-count=\"0\"\u003eThis site uses cookies to provide you with the best user experience possible. By using \u003cstrong\u003eDark Reading\u003c/strong\u003e, you accept \u003ca href=\"https://tech.informa.com/cookie-policy\" target=\"_blank\"\u003eour use of cookies.\u003c/a\u003e\u003c/p\u003e","created_at":"2021-05-29T07:25:08.958Z","created_by":"blt9a0fc67c46c47dd7","homepage_seo_settings":{"meta_description":"Cyber security's comprehensive news site is now an online community for security professionals, outlining cyber threats and the technologies for defending against them.","meta_title":"Dark Reading | Security | Protect The Business"},"open_subscribe_link_on_new_tab":true,"placeholder_image":{"article":{"uid":"bltc1378ee892fc2b03","created_by":"blt986fc66e34c7b415","updated_by":"blt986fc66e34c7b415","created_at":"2021-10-22T09:00:01.060Z","updated_at":"2021-10-22T09:00:01.060Z","content_type":"image/jpeg","file_size":"19176","filename":"dr-logo.jpg","title":"dr-logo.jpg","ACL":{},"_version":1,"is_dir":false,"tags":[],"publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-10-22T09:00:16.437Z","user":"blt986fc66e34c7b415"},"url":"https://eu-images.contentstack.com/v3/assets/blt66983808af36a8ef/bltc1378ee892fc2b03/61727d918e52444950791daf/dr-logo.jpg"},"author":{"uid":"bltc1378ee892fc2b03","created_by":"blt986fc66e34c7b415","updated_by":"blt986fc66e34c7b415","created_at":"2021-10-22T09:00:01.060Z","updated_at":"2021-10-22T09:00:01.060Z","content_type":"image/jpeg","file_size":"19176","filename":"dr-logo.jpg","title":"dr-logo.jpg","ACL":{},"_version":1,"is_dir":false,"tags":[],"publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-10-22T09:00:16.437Z","user":"blt986fc66e34c7b415"},"url":"https://eu-images.contentstack.com/v3/assets/blt66983808af36a8ef/bltc1378ee892fc2b03/61727d918e52444950791daf/dr-logo.jpg"}},"site_wide_style":{"font":null,"module_style":{"heading_color":""},"navigation_style":{"color_1":"","color_2":"","gradient":true}},"social_networks":{"social_network":[{"link":{"title":"Rss","href":"https://www.darkreading.com/rss.xml"},"_metadata":{"uid":"cs1b60c654a4c98515"},"icon_class":"fas fa-rss","open_new_tab":true,"active":true},{"link":{"title":"Twitter","href":"https://twitter.com/DarkReading"},"_metadata":{"uid":"csb40560d5b45c67c0"},"icon_class":"fab fa-twitter","open_new_tab":true,"active":true},{"link":{"title":"Linkedin","href":"https://www.linkedin.com/company/dark-reading/"},"_metadata":{"uid":"csb7b068ffddb2508a"},"icon_class":"fab fa-linkedin-in","open_new_tab":true,"active":true},{"link":{"title":"Facebook","href":"https://www.facebook.com/darkreadingcom/"},"_metadata":{"uid":"cs1c83b83e0ac18d5d"},"icon_class":"fab fa-facebook-f","open_new_tab":true,"active":true}],"title":"Follow DR:"},"subscribe_link":{"title":"Subscribe","href":"https://www.darkreading.com/newsletter-signup/?_mc=dr_header"},"switch_board":{"iris_recommendation":true},"tags":[],"title":"Dark Reading | Security | Protect The Business","updated_at":"2022-03-04T08:49:59.688Z","updated_by":"blt986fc66e34c7b415","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2022-03-09T12:36:16.662Z","user":"bltfcb3d125bf8c49ee"}},"announcements":[[{"_version":1,"locale":"en-us","uid":"blte526ca0aa1073502","ACL":{},"_in_progress":false,"active":true,"content":"Strategies for DDoS Resilience and Response | Oct 18 Webinar | \u003cREGISTER NOW\u003e","created_at":"2022-09-22T22:59:21.362Z","created_by":"blt86eeaee2e17f91dc","link":{"title":"Register Today","href":"https://webinar.darkreading.com/1781964?keycode=drsitebell"},"open_in_new_tab":true,"tags":["dark reading"],"title":"10/18/22 DR Webinar","type_of_announcement":"Event","updated_at":"2022-09-22T22:59:21.362Z","updated_by":"blt86eeaee2e17f91dc","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2022-09-22T22:59:25.687Z","user":"blt86eeaee2e17f91dc"}},{"_version":1,"locale":"en-us","uid":"blt6fa654c0793fd628","ACL":{},"_in_progress":false,"active":true,"content":"Using Zero Trust to Protect Remote and Home Workers | Oct 6 Webinar | \u003cREGISTER NOW\u003e","created_at":"2022-09-22T22:57:44.935Z","created_by":"blt86eeaee2e17f91dc","link":{"title":"Register Today","href":"https://webinar.darkreading.com/1316745?keycode=drsitebell"},"open_in_new_tab":true,"tags":["dark reading"],"title":"10/6/22 DR Webinar","type_of_announcement":"Event","updated_at":"2022-09-22T22:57:44.935Z","updated_by":"blt86eeaee2e17f91dc","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2022-09-22T22:57:48.745Z","user":"blt86eeaee2e17f91dc"}},{"_version":1,"locale":"en-us","uid":"blt08cb3e0560e78753","ACL":{},"_in_progress":false,"active":true,"content":"Understanding Cyber Attackers - A Dark Reading November 17 Virtual Event | \u003cGET YOUR PASS\u003e","created_at":"2022-09-09T14:24:39.381Z","created_by":"blt86eeaee2e17f91dc","link":{"title":"Get Your Passs","href":"https://vts.informaengage.com/dark-reading-understanding-cyber-attackers-and-their-methods/?kcode=drsitebell"},"open_in_new_tab":true,"tags":["dark reading","cybersecurity"],"title":"11/17/22 DR VE","type_of_announcement":"Event","updated_at":"2022-09-09T14:24:39.381Z","updated_by":"blt86eeaee2e17f91dc","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2022-09-09T14:24:43.282Z","user":"blt86eeaee2e17f91dc"}},{"_version":2,"locale":"en-us","uid":"blte6050299fda43495","ACL":{},"_in_progress":false,"active":true,"content":"Black Hat USA 2022 Attendee Report | Supply Chain \u0026 Cloud Security Risks Are Top of Mind | \u003cREAD IT NOW\u003e","created_at":"2022-08-04T15:41:11.629Z","created_by":"blt86eeaee2e17f91dc","link":{"title":"\u003c\u003cGet The Report\u003e\u003e","href":"https://messages.blackhat.com/2022-attendee-report-2022?kcode=drsite"},"open_in_new_tab":true,"tags":["black hat"],"title":"BHUSA 2022 Report","type_of_announcement":"Report","updated_at":"2022-08-04T15:43:27.796Z","updated_by":"blt86eeaee2e17f91dc","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2022-08-04T15:43:32.876Z","user":"blt86eeaee2e17f91dc"}}]],"navigation":{"site_information":{"left_column":{"description":"Dark Reading is part of the Informa Tech Division of Informa PLC","links":[{"link":{"href":"https://informa.com/About-Us/","title":"About Us","__typename":"Link"},"open_new_tab":true,"__typename":"DrNavigationV2SiteInformationLeftColumnLinks"},{"link":{"href":"https://informa.com/","title":"Informa PLC","__typename":"Link"},"open_new_tab":true,"__typename":"DrNavigationV2SiteInformationLeftColumnLinks"},{"link":{"href":"https://informa.com/Investors/","title":"Investor Relations","__typename":"Link"},"open_new_tab":true,"__typename":"DrNavigationV2SiteInformationLeftColumnLinks"},{"link":{"href":"https://informa.com/Talent/","title":"Talent","__typename":"Link"},"open_new_tab":true,"__typename":"DrNavigationV2SiteInformationLeftColumnLinks"}],"__typename":"DrNavigationV2SiteInformationLeftColumn"},"right_column":{"description":"This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.","__typename":"DrNavigationV2SiteInformationRightColumn"},"__typename":"DrNavigationV2SiteInformation"},"search":{"link":{"href":"https://www.darkreading.com/about-us/d/d-id/1113937","title":"Search","__typename":"Link"},"open_new_tab":true,"__typename":"DrNavigationV2Search"},"reports":{"enabled":true,"navigation_link_title":"Resources","links":[{"link":"/must-reads","link_text":"Reports \u003e","open_in_new_tab":true,"__typename":"DrNavigationV2ReportsLinks"},{"link":"/latest/slideshow","link_text":"Slideshows \u003e","open_in_new_tab":true,"__typename":"DrNavigationV2ReportsLinks"},{"link":"https://www.informationweek.com/whitepaper","link_text":"Tech Library \u003e","open_in_new_tab":true,"__typename":"DrNavigationV2ReportsLinks"},{"link":"/upcoming-webinars","link_text":"Webinars \u003e","open_in_new_tab":true,"__typename":"DrNavigationV2ReportsLinks"},{"link":"https://www.informationweek.com/whitepaper/Security","link_text":"White Papers \u003e","open_in_new_tab":true,"__typename":"DrNavigationV2ReportsLinks"},{"link":"https://www.darkreading.com/microsoft","link_text":"Partner Perspectives: Microsoft \u003e","open_in_new_tab":true,"__typename":"DrNavigationV2ReportsLinks"}],"__typename":"DrNavigationV2Reports"},"logo":{"logo_title":"DR Logo New","image_alt_text":"Dark Reading Logo","site_mobile_logoConnection":{"edges":[{"node":{"url":"https://eu-images.contentstack.com/v3/assets/blt66983808af36a8ef/blt69e42f380169c938/620378c0a75f1e5f7d5bce80/DR_Logo_-_White.svg","__typename":"SysAsset"},"__typename":"SysAssetEdge"}],"__typename":"SysAssetConnection"},"logo_imageConnection":{"edges":[{"node":{"url":"https://eu-images.contentstack.com/v3/assets/blt66983808af36a8ef/blt456fd002839bae7e/620377d02be9c249dcea7cc9/Frame_1728.svg","__typename":"SysAsset"},"__typename":"SysAssetEdge"}],"__typename":"SysAssetConnection"},"__typename":"DrNavigationV2Logo"},"feature_links":[{"enabled":true,"display_as_link":true,"navigation_link_title":"Featured","navigation_links":[{"navigation_link_title":"The Edge","text_link":"/edge","navigation_link_background_color":"#9f110d","__typename":"DrNavigationV2FeatureLinksNavigationLinks"},{"navigation_link_title":"DR Tech","text_link":"/dr-tech","navigation_link_background_color":"#9f110d","__typename":"DrNavigationV2FeatureLinksNavigationLinks"}],"links":[{"brand_logoConnection":{"edges":[{"node":{"url":"https://eu-images.contentstack.com/v3/assets/blt66983808af36a8ef/blt0242302270d4c8c5/616053aef0756e7ad17a2766/TheEdge-Logo-K.png","__typename":"SysAsset"},"__typename":"SysAssetEdge"}],"__typename":"SysAssetConnection"},"image_alt_text":"The Edge Logo","link_text":"The Edge","link":"/edge","open_in_new_tab":true,"__typename":"DrNavigationV2FeatureLinksLinks"},{"brand_logoConnection":{"edges":[{"node":{"url":"https://eu-images.contentstack.com/v3/assets/blt66983808af36a8ef/blt13a7bb63bbc84ea1/615573a9486c9a5b53694fea/DR_Technology_Logo_Black.png","__typename":"SysAsset"},"__typename":"SysAssetEdge"}],"__typename":"SysAssetConnection"},"image_alt_text":"DR Technology Logo","link_text":"DR Technology","link":"/dr-tech","open_in_new_tab":true,"__typename":"DrNavigationV2FeatureLinksLinks"}],"__typename":"DrNavigationV2FeatureLinks"}],"events":{"enabled":true,"navigation_link_title":"Events","smartbox":[{"smartbox_entryConnection":{"edges":[{"node":{"type":"Live Events","title":"Events","system":{"uid":"blt8b6a33909c49602f","__typename":"EntrySystemField"},"__typename":"DrSmartbox"},"__typename":"DrNavigationV2EventsSmartboxSmartboxEntryEdge"}],"__typename":"DrNavigationV2EventsSmartboxSmartboxEntryConnection"},"__typename":"DrNavigationV2EventsSmartbox"},{"smartbox_entryConnection":{"edges":[{"node":{"type":"Webinars","title":"Webinars","system":{"uid":"blt8f82585c522cc0f5","__typename":"EntrySystemField"},"__typename":"DrSmartbox"},"__typename":"DrNavigationV2EventsSmartboxSmartboxEntryEdge"}],"__typename":"DrNavigationV2EventsSmartboxSmartboxEntryConnection"},"__typename":"DrNavigationV2EventsSmartbox"}],"__typename":"DrNavigationV2Events"},"topics":{"enabled":true,"navigation_link_title":"Sections","casual_links":{"topic_linkConnection":{"edges":[{"node":{"title":"Breaches","expanded_title":"Attacks / Breaches","url":"/attacks-breaches","system":{"uid":"blt785557489e965a0e","__typename":"EntrySystemField"},"__typename":"DrTopicPrimary"},"__typename":"DrNavigationV2TopicsCasualLinksTopicLinkEdge"},{"node":{"title":"Cloud","expanded_title":"Cloud","url":"/cloud","system":{"uid":"blte0b20eea18da92ac","__typename":"EntrySystemField"},"__typename":"DrTopicPrimary"},"__typename":"DrNavigationV2TopicsCasualLinksTopicLinkEdge"},{"node":{"title":"IoT","expanded_title":"IoT","url":"/iot","system":{"uid":"blt015364f303d8cd5c","__typename":"EntrySystemField"},"__typename":"DrTopicPrimary"},"__typename":"DrNavigationV2TopicsCasualLinksTopicLinkEdge"},{"node":{"title":"Physical","expanded_title":"Physical Security","url":"/physical-security","system":{"uid":"blt67964a3f25e5e5bc","__typename":"EntrySystemField"},"__typename":"DrTopicPrimary"},"__typename":"DrNavigationV2TopicsCasualLinksTopicLinkEdge"},{"node":{"title":"Perimeter","expanded_title":"Perimeter","url":"/perimeter","system":{"uid":"bltdad7410202520cf3","__typename":"EntrySystemField"},"__typename":"DrTopicPrimary"},"__typename":"DrNavigationV2TopicsCasualLinksTopicLinkEdge"},{"node":{"title":"Analytics","expanded_title":"Analytics","url":"/analytics","system":{"uid":"blt77fe1b1ed6a4cb2b","__typename":"EntrySystemField"},"__typename":"DrTopicPrimary"},"__typename":"DrNavigationV2TopicsCasualLinksTopicLinkEdge"},{"node":{"title":"App Sec","expanded_title":"App Sec","url":"/application-security","system":{"uid":"blt5becbd3781fc8e16","__typename":"EntrySystemField"},"__typename":"DrTopicPrimary"},"__typename":"DrNavigationV2TopicsCasualLinksTopicLinkEdge"},{"node":{"title":"Risk","expanded_title":"Risk","url":"/risk","system":{"uid":"bltb4fa098465367813","__typename":"EntrySystemField"},"__typename":"DrTopicPrimary"},"__typename":"DrNavigationV2TopicsCasualLinksTopicLinkEdge"},{"node":{"title":"Threat Intel","expanded_title":"Threat Intelligence","url":"/threat-intelligence","system":{"uid":"blta3feccd65c5cd514","__typename":"EntrySystemField"},"__typename":"DrTopicPrimary"},"__typename":"DrNavigationV2TopicsCasualLinksTopicLinkEdge"},{"node":{"title":"Endpoint","expanded_title":"Endpoint","url":"/endpoint","system":{"uid":"bltca5b5d25e0e89c28","__typename":"EntrySystemField"},"__typename":"DrTopicPrimary"},"__typename":"DrNavigationV2TopicsCasualLinksTopicLinkEdge"},{"node":{"title":"Vulns / Threats","expanded_title":"Vulnerabilities / Threats","url":"/vulnerabilities-threats","system":{"uid":"blt7299bec9b19d3040","__typename":"EntrySystemField"},"__typename":"DrTopicPrimary"},"__typename":"DrNavigationV2TopicsCasualLinksTopicLinkEdge"},{"node":{"title":"Ops","expanded_title":"Operations","url":"/operations","system":{"uid":"blt30a5d434863af8a0","__typename":"EntrySystemField"},"__typename":"DrTopicPrimary"},"__typename":"DrNavigationV2TopicsCasualLinksTopicLinkEdge"},{"node":{"title":"Remote Workforce","expanded_title":"Remote Workforce","url":"/remote-workforce","system":{"uid":"blt66841a34e87f9b7d","__typename":"EntrySystemField"},"__typename":"DrTopicPrimary"},"__typename":"DrNavigationV2TopicsCasualLinksTopicLinkEdge"}],"__typename":"DrNavigationV2TopicsCasualLinksTopicLinkConnection"},"__typename":"DrNavigationV2TopicsCasualLinks"},"__typename":"DrNavigationV2Topics"},"connect":{"brand_engagement_section":{"brand_engagement_moduleConnection":{"edges":[{"node":{"system":{"uid":"bltfd75a966494c9e3c","__typename":"EntrySystemField"},"section_1":{"cta_button_link":"https://www.darkreading.com/?ngAction=register","cta_button_text":"REGISTER","link_target":"Open in new window","section_description":"\u003cul\u003e\u003cli\u003eGain full access to resources (events, white paper, webinars, reports, etc.)\u003c/li\u003e\u003cli\u003eSingle sign-on to all Informa products\u003c/li\u003e\u003c/ul\u003e","section_eyebrow":"Register for a","section_title":"Dark Reading Account","__typename":"DrBrandEngagementSection1"},"section_2":{"cta_button_link":"https://www.darkreading.com/newsletter-signup/?_mc=dr_header","cta_button_text":"SUBSCRIBE","link_target":"Open in new window","section_description":"\u003cp\u003eGet daily Dark Reading top stories every morning straight into your inbox\u003c/p\u003e","section_eyebrow":"Subscribe to the","section_title":"Dark Reading newsletter","__typename":"DrBrandEngagementSection2"},"section_3":{"cta_button_link":"","cta_button_text":"","link_target":"Open in new window","section_description":"\u003cp\u003eFollow us @darkreading to stay up-to-date with the latest news \u0026 insider information about events \u0026 more\u003c/p\u003e","section_eyebrow":"Follow us","section_title":"@DarkReading","__typename":"DrBrandEngagementSection3"},"include_social_links_in_section_3":"Yes","__typename":"DrBrandEngagement"},"__typename":"DrNavigationV2ConnectBrandEngagementSectionBrandEngagementModuleEdge"}],"__typename":"DrNavigationV2ConnectBrandEngagementSectionBrandEngagementModuleConnection"},"__typename":"DrNavigationV2ConnectBrandEngagementSection"},"enabled":false,"navigation_link_title":"Connect","our_network_section":{"enabled":true,"label":"Our Network:","links":[{"brand_logoConnection":{"edges":[{"node":{"url":"https://eu-images.contentstack.com/v3/assets/blt66983808af36a8ef/blt365fc6c2647d15e5/60b1e96052bd6156414f3422/bh_logo_black_1.png","__typename":"SysAsset"},"__typename":"SysAssetEdge"}],"__typename":"SysAssetConnection"},"link":"https://www.blackhat.com/","link_text":"Black Hat","open_new_tab":false,"image_alt_text":"","__typename":"DrNavigationV2ConnectOurNetworkSectionLinks"},{"brand_logoConnection":{"edges":[{"node":{"url":"https://eu-images.contentstack.com/v3/assets/blt66983808af36a8ef/blt5e638427fb7992eb/60b9b81d1ffed8575f140e47/OMDIA_LOGO_BLACK_2_with_extra_height.png","__typename":"SysAsset"},"__typename":"SysAssetEdge"}],"__typename":"SysAssetConnection"},"link":"https://omdia.tech.informa.com/topic-pages/cybersecurity?promo=OmdiaDR","link_text":"OMDIA","open_new_tab":true,"image_alt_text":"","__typename":"DrNavigationV2ConnectOurNetworkSectionLinks"},{"brand_logoConnection":{"edges":[{"node":{"url":"https://eu-images.contentstack.com/v3/assets/blt66983808af36a8ef/blt621a6404bafa0c4d/60b1e8c8d64f195504537b9a/IWK-Color_heigh_adjusted.png","__typename":"SysAsset"},"__typename":"SysAssetEdge"}],"__typename":"SysAssetConnection"},"link":"https://www.informationweek.com","link_text":"InformationWeek","open_new_tab":true,"image_alt_text":"","__typename":"DrNavigationV2ConnectOurNetworkSectionLinks"}],"__typename":"DrNavigationV2ConnectOurNetworkSection"},"links":[{"link":"/about-us","link_text":"About us","open_in_new_tab":true,"__typename":"DrNavigationV2ConnectLinks"},{"link":"https://www.darkreading.com/advertise","link_text":"Advertise with us","open_in_new_tab":true,"__typename":"DrNavigationV2ConnectLinks"},{"link":"https://info.wrightsmedia.com/informa-licensing-reprints-request","link_text":"Reprints","open_in_new_tab":true,"__typename":"DrNavigationV2ConnectLinks"}],"__typename":"DrNavigationV2Connect"},"__typename":"DrNavigationV2"},"navPromotedTopics":{"topics":{"promoted_links":{"topic_linkConnection":{"edges":[{"node":{"title":"Black Hat news","url":"https://www.darkreading.com/black-hat","system":{"uid":"blt58877ad235079f24","__typename":"EntrySystemField"},"__typename":"DrTopicOthers"},"__typename":"DrNavigationV2TopicsPromotedLinksTopicLinkEdge"},{"node":{"title":"Omdia Research","url":"https://www.darkreading.com/omdia","system":{"uid":"blt7757a7dced09e4cc","__typename":"EntrySystemField"},"__typename":"DrTopicOthers"},"__typename":"DrNavigationV2TopicsPromotedLinksTopicLinkEdge"},{"node":{"title":"Security Now","url":"https://www.darkreading.com/security-now.asp","system":{"uid":"blt62de504b94f13f55","__typename":"EntrySystemField"},"__typename":"DrTopicOthers"},"__typename":"DrNavigationV2TopicsPromotedLinksTopicLinkEdge"}],"__typename":"DrNavigationV2TopicsPromotedLinksTopicLinkConnection"},"__typename":"DrNavigationV2TopicsPromotedLinks"},"__typename":"DrNavigationV2Topics"},"__typename":"DrNavigationV2"},"navFeaturedTopics":{"topics":{"featured_sections":{"enabled":true,"topic_linkConnection":{"edges":[{"node":{"title":"The Edge","name":"The Edge","url":"/edge","system":{"uid":"blt1ac900de55b45e3b","__typename":"EntrySystemField"},"__typename":"DrTopicSecondary"},"__typename":"DrNavigationV2TopicsFeaturedSectionsTopicLinkEdge"},{"node":{"title":"Dr Tech","name":"Dark Reading Technology","url":"/dr-tech","system":{"uid":"blta9155e90e5f8030b","__typename":"EntrySystemField"},"__typename":"DrTopicSecondary"},"__typename":"DrNavigationV2TopicsFeaturedSectionsTopicLinkEdge"}],"__typename":"DrNavigationV2TopicsFeaturedSectionsTopicLinkConnection"},"__typename":"DrNavigationV2TopicsFeaturedSections"},"__typename":"DrNavigationV2Topics"},"__typename":"DrNavigationV2"},"topicsWithChild":[{"title":"Remote Workforce","url":"/remote-workforce","expanded_title":"Remote Workforce","topics_secondary":[],"seo":{"meta_title":"","meta_description":"","meta_keywords":"","canonical_url":""},"tags":[],"locale":"en-us","uid":"blt66841a34e87f9b7d","created_by":"bltfcb3d125bf8c49ee","updated_by":"bltfcb3d125bf8c49ee","created_at":"2022-03-03T19:13:38.062Z","updated_at":"2022-03-03T19:13:38.062Z","ACL":{},"_version":1,"_in_progress":false,"publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2022-03-03T19:14:08.678Z","user":"bltfcb3d125bf8c49ee"},"_owner":{"uid":"bltfcb3d125bf8c49ee","created_at":"2021-05-21T10:05:50.071Z","updated_at":"2022-09-12T09:17:24.922Z","email":"edward.canavan@informa.com","username":"edward_blt00302c2c","first_name":"edward","last_name":"canavan","org_uid":[],"shared_org_uid":["blt5948195ac13977b0"],"mobile_number":"07916365746","country_code":"44","tfa_status":"verified","authy_id":"374943478","active":true,"profile_type":"business","failed_attempts":0,"settings":{"preferences":{"global":[],"stack":[{"api_key":"blt66983808af36a8ef","key":"dashboard","value":{"recently_modified_assets":{"order":0,"visibility":"show"},"recently_modified_entries":{"order":1,"visibility":"show"},"prod_update":{"order":2,"visibility":"hide"},"doc_search":{"order":3,"visibility":"show"},"did_you_know":{"order":4,"visibility":"show"}}}]}},"last_login_at":"2022-09-12T09:17:24.921Z"}},{"title":"Omdia","url":"/omdia","expanded_title":"Omdia","topics_secondary":[],"seo":{"meta_title":"","meta_description":"","meta_keywords":"","canonical_url":""},"tags":[],"locale":"en-us","uid":"bltcbdbf86a0551d8bb","created_by":"blta3dd47a38c602549","updated_by":"blta3dd47a38c602549","created_at":"2021-09-29T10:56:10.231Z","updated_at":"2021-09-29T10:56:10.231Z","ACL":{},"_version":1,"_in_progress":false,"publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-09-29T10:57:01.003Z","user":"blta3dd47a38c602549"},"_owner":{"uid":"blta3dd47a38c602549","created_at":"2021-05-21T10:05:50.070Z","updated_at":"2022-08-24T09:15:08.415Z","email":"john.ely@informa.com","username":"john_blt665706a5","first_name":"John","last_name":"Ely","org_uid":[],"shared_org_uid":["blt5948195ac13977b0"],"mobile_number":"07877953454","country_code":"44","tfa_status":"verified","authy_id":"378049479","active":true,"profile_type":"business","failed_attempts":0,"settings":{"preferences":{"global":[],"stack":[]}},"last_login_at":"2022-08-24T09:15:08.415Z"}},{"title":"Vulns / Threats","url":"/vulnerabilities-threats","topics_secondary":[{"_version":6,"locale":"en-us","uid":"bltc0595d7ad0a824f9","ACL":{},"_in_progress":false,"created_at":"2021-05-29T07:24:46.154Z","created_by":"blt9a0fc67c46c47dd7","name":"Advanced Threats","seo":{"meta_title":"Advanced Threats","meta_description":"Advanced Threats","meta_keywords":"","canonical_url":""},"tags":[],"title":"[Vulnerabilities / Threats] Advanced Threats","updated_at":"2021-07-20T13:53:43.004Z","updated_by":"blta3dd47a38c602549","url":"/advanced-threats","_content_type_uid":"dr_topic_secondary","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-07-20T13:53:45.886Z","user":"blta3dd47a38c602549"}},{"_version":2,"locale":"en-us","uid":"blt48c537ccb149ce69","ACL":{},"_in_progress":false,"created_at":"2021-05-29T07:24:36.088Z","created_by":"blt9a0fc67c46c47dd7","name":"Insider Threats","seo":{"meta_title":"Insider Threats","meta_description":"Insider Threats","meta_keywords":"","canonical_url":""},"tags":[],"title":"[Vulnerabilities / Threats] Insider Threats","updated_at":"2021-07-20T13:50:08.841Z","updated_by":"blta3dd47a38c602549","url":"/insider-threats","_content_type_uid":"dr_topic_secondary","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-07-20T13:52:54.877Z","user":"blta3dd47a38c602549"}},{"_version":2,"locale":"en-us","uid":"blt841a890c83604b92","ACL":{},"_in_progress":false,"created_at":"2021-05-29T07:24:37.215Z","created_by":"blt9a0fc67c46c47dd7","name":"Vulnerability Management","seo":{"meta_title":"Vulnerability Management","meta_description":"Vulnerability Management","meta_keywords":"","canonical_url":""},"tags":[],"title":"[Vulnerabilities / Threats] Vulnerability Management","updated_at":"2021-07-20T13:49:38.788Z","updated_by":"blta3dd47a38c602549","url":"/vulnerability-management","_content_type_uid":"dr_topic_secondary","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-07-20T13:49:41.689Z","user":"blta3dd47a38c602549"}}],"seo":{"meta_title":"Vulnerabilities / Threats","meta_description":"Vulnerabilities / Threats","meta_keywords":"","canonical_url":""},"tags":[],"locale":"en-us","ACL":{},"expanded_title":"Vulnerabilities / Threats","uid":"blt7299bec9b19d3040","created_by":"blt9a0fc67c46c47dd7","updated_by":"blt441f3cf9519ce96f","created_at":"2021-05-29T07:24:52.174Z","updated_at":"2021-09-28T06:59:11.602Z","_version":8,"_in_progress":false,"publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-09-28T10:32:40.219Z","user":"blta3dd47a38c602549"}},{"_version":6,"locale":"en-us","uid":"blt30a5d434863af8a0","ACL":{},"_in_progress":false,"created_at":"2021-05-29T07:24:50.221Z","created_by":"blt9a0fc67c46c47dd7","expanded_title":"Operations","seo":{"meta_title":"Operations","meta_description":"Operations","meta_keywords":"","canonical_url":""},"tags":[],"title":"Ops","topics_secondary":[{"_version":2,"locale":"en-us","uid":"bltc66bc15dc564597f","ACL":{},"_in_progress":false,"created_at":"2021-05-29T07:24:45.214Z","created_by":"blt9a0fc67c46c47dd7","name":"Identity \u0026 Access Management","seo":{"meta_title":"Identity \u0026 Access Management","meta_description":"Identity \u0026 Access Management","meta_keywords":"","canonical_url":""},"tags":[],"title":"[Operations] Identity \u0026 Access Management","updated_at":"2021-07-20T13:49:05.230Z","updated_by":"blta3dd47a38c602549","url":"/identity-and-access-management","_content_type_uid":"dr_topic_secondary","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-07-20T13:49:08.073Z","user":"blta3dd47a38c602549"}},{"_version":11,"locale":"en-us","uid":"blte7df9c155852d974","ACL":{},"_in_progress":false,"created_at":"2021-05-29T07:24:47.100Z","created_by":"blt9a0fc67c46c47dd7","name":"Careers \u0026 People","seo":{"meta_title":"Careers \u0026 People","meta_description":"Careers \u0026 People","meta_keywords":"","canonical_url":""},"tags":[],"title":"[Operations] Careers \u0026 People","updated_at":"2021-07-20T12:08:28.689Z","updated_by":"blt986fc66e34c7b415","url":"/careers-and-people","_content_type_uid":"dr_topic_secondary","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-07-20T12:09:57.002Z","user":"blt986fc66e34c7b415"}}],"updated_at":"2021-07-21T15:26:00.567Z","updated_by":"blta3dd47a38c602549","url":"/operations","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-07-21T15:26:04.309Z","user":"blta3dd47a38c602549"}},{"_version":4,"locale":"en-us","uid":"blt015364f303d8cd5c","ACL":{},"_in_progress":false,"created_at":"2021-05-29T07:24:48.288Z","created_by":"blt9a0fc67c46c47dd7","expanded_title":"IoT","seo":{"meta_title":"IoT","meta_description":"IoT","meta_keywords":"","canonical_url":""},"tags":[],"title":"IoT","topics_secondary":[],"updated_at":"2021-07-20T13:40:09.253Z","updated_by":"blta3dd47a38c602549","url":"/iot","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-07-20T13:40:13.450Z","user":"blta3dd47a38c602549"}},{"_version":3,"locale":"en-us","uid":"blt5becbd3781fc8e16","ACL":{},"_in_progress":false,"created_at":"2021-05-29T07:24:49.312Z","created_by":"blt9a0fc67c46c47dd7","expanded_title":"App Sec","seo":{"meta_title":"Application Security","meta_description":"Application Security","meta_keywords":"","canonical_url":""},"tags":[],"title":"App Sec","topics_secondary":[{"_version":2,"locale":"en-us","uid":"blte50120ff0518141d","ACL":{},"_in_progress":false,"created_at":"2021-05-29T07:24:40.692Z","created_by":"blt9a0fc67c46c47dd7","name":"Database Security","seo":{"meta_title":"Database Security","meta_description":"Database Security","meta_keywords":"","canonical_url":""},"tags":[],"title":"[App Sec] Database Security","updated_at":"2021-07-20T13:57:36.610Z","updated_by":"blta3dd47a38c602549","url":"/database-security","_content_type_uid":"dr_topic_secondary","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-07-20T13:57:39.438Z","user":"blta3dd47a38c602549"}}],"updated_at":"2021-07-20T13:39:48.018Z","updated_by":"blta3dd47a38c602549","url":"/application-security","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-07-20T13:39:51.054Z","user":"blta3dd47a38c602549"}},{"_version":3,"locale":"en-us","uid":"blt8edc1edf78525eb9","ACL":{},"_in_progress":false,"created_at":"2021-05-29T07:25:00.989Z","created_by":"blt9a0fc67c46c47dd7","expanded_title":"The Edge","seo":{"meta_title":"The Edge","meta_description":"The Edge","meta_keywords":"","canonical_url":""},"tags":[],"title":"The Edge","topics_secondary":[],"updated_at":"2021-07-20T13:38:58.206Z","updated_by":"blta3dd47a38c602549","url":"/edge","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-07-20T13:39:02.803Z","user":"blta3dd47a38c602549"}},{"_version":3,"locale":"en-us","uid":"blt77fe1b1ed6a4cb2b","ACL":{},"_in_progress":false,"created_at":"2021-05-29T07:24:59.745Z","created_by":"blt9a0fc67c46c47dd7","expanded_title":"Analytics","seo":{"meta_title":"Security Analytics","meta_description":"Security Analytics","meta_keywords":"","canonical_url":""},"tags":[],"title":"Analytics","topics_secondary":[{"_version":2,"locale":"en-us","uid":"blta62ac100505a8b0e","ACL":{},"_in_progress":false,"created_at":"2021-05-29T07:24:38.443Z","created_by":"blt9a0fc67c46c47dd7","name":"Security Monitoring","seo":{"meta_title":"Security Monitoring","meta_description":"Security Monitoring","meta_keywords":"","canonical_url":""},"tags":[],"title":"[Analytics] Security Monitoring","updated_at":"2021-07-20T13:56:52.288Z","updated_by":"blta3dd47a38c602549","url":"/security-monitoring","_content_type_uid":"dr_topic_secondary","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-07-20T13:56:55.022Z","user":"blta3dd47a38c602549"}}],"updated_at":"2021-07-20T13:33:48.424Z","updated_by":"blta3dd47a38c602549","url":"/analytics","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-07-20T13:33:51.625Z","user":"blta3dd47a38c602549"}},{"_version":3,"locale":"en-us","uid":"bltdad7410202520cf3","ACL":{},"_in_progress":false,"created_at":"2021-05-29T07:24:56.377Z","created_by":"blt9a0fc67c46c47dd7","expanded_title":"Perimeter","seo":{"meta_title":"Network Perimeter Security","meta_description":"Network Perimeter Security","meta_keywords":"","canonical_url":""},"tags":[],"title":"Perimeter","topics_secondary":[],"updated_at":"2021-07-20T13:33:14.890Z","updated_by":"blta3dd47a38c602549","url":"/perimeter","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-07-20T13:33:17.858Z","user":"blta3dd47a38c602549"}},{"_version":3,"locale":"en-us","uid":"bltb4fa098465367813","ACL":{},"_in_progress":false,"created_at":"2021-05-29T07:24:54.324Z","created_by":"blt9a0fc67c46c47dd7","expanded_title":"Risk","seo":{"meta_title":"Risk Management","meta_description":"Risk Management","meta_keywords":"","canonical_url":""},"tags":[],"title":"Risk","topics_secondary":[{"_version":2,"locale":"en-us","uid":"bltb0f5be1fbdfcb41a","ACL":{},"_in_progress":false,"created_at":"2021-05-29T07:24:44.181Z","created_by":"blt9a0fc67c46c47dd7","name":"Compliance","seo":{"meta_title":"Compliance","meta_description":"Compliance","meta_keywords":"","canonical_url":""},"tags":[],"title":"[Risk] Compliance","updated_at":"2021-07-20T13:55:48.317Z","updated_by":"blta3dd47a38c602549","url":"/compliance","_content_type_uid":"dr_topic_secondary","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-07-20T13:55:51.514Z","user":"blta3dd47a38c602549"}}],"updated_at":"2021-07-20T13:32:29.960Z","updated_by":"blta3dd47a38c602549","url":"/risk","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-07-20T13:32:33.370Z","user":"blta3dd47a38c602549"}},{"_version":3,"locale":"en-us","uid":"bltca5b5d25e0e89c28","ACL":{},"_in_progress":false,"created_at":"2021-05-29T07:24:55.338Z","created_by":"blt9a0fc67c46c47dd7","expanded_title":"Endpoint","seo":{"meta_title":"Endpoint Security","meta_description":"Endpoint Security","meta_keywords":"","canonical_url":""},"tags":[],"title":"Endpoint","topics_secondary":[{"_version":2,"locale":"en-us","uid":"bltfe4d91925f7db0e1","ACL":{},"_in_progress":false,"created_at":"2021-05-29T07:24:39.671Z","created_by":"blt9a0fc67c46c47dd7","name":"Authentication","seo":{"meta_title":"Authentication","meta_description":"Authentication","meta_keywords":"","canonical_url":""},"tags":[],"title":"[Endpoint] Authentication","updated_at":"2021-07-20T13:54:16.648Z","updated_by":"blta3dd47a38c602549","url":"/authentication","_content_type_uid":"dr_topic_secondary","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-07-20T13:54:19.302Z","user":"blta3dd47a38c602549"}},{"_version":2,"locale":"en-us","uid":"bltbce9bffab0b743c9","ACL":{},"_in_progress":false,"created_at":"2021-05-29T07:24:42.861Z","created_by":"blt9a0fc67c46c47dd7","name":"Mobile Security","seo":{"meta_title":"Mobile Security","meta_description":"Mobile Security","meta_keywords":"","canonical_url":""},"tags":[],"title":"[Endpoint] Mobile","updated_at":"2021-07-20T13:55:17.618Z","updated_by":"blta3dd47a38c602549","url":"/mobile","_content_type_uid":"dr_topic_secondary","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-07-20T13:55:20.835Z","user":"blta3dd47a38c602549"}},{"_version":2,"locale":"en-us","uid":"bltd4b54e4cff686e47","ACL":{},"_in_progress":false,"created_at":"2021-05-29T07:24:41.940Z","created_by":"blt9a0fc67c46c47dd7","name":"Privacy","seo":{"meta_title":"Privacy","meta_description":"Privacy","meta_keywords":"","canonical_url":""},"tags":[],"title":"[Endpoint] Privacy","updated_at":"2021-07-20T13:54:46.246Z","updated_by":"blta3dd47a38c602549","url":"/privacy","_content_type_uid":"dr_topic_secondary","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-07-20T13:54:49.414Z","user":"blta3dd47a38c602549"}}],"updated_at":"2021-07-20T13:32:03.273Z","updated_by":"blta3dd47a38c602549","url":"/endpoint","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-07-20T13:32:06.396Z","user":"blta3dd47a38c602549"}},{"_version":3,"locale":"en-us","uid":"blt67964a3f25e5e5bc","ACL":{},"_in_progress":false,"created_at":"2021-05-29T07:24:53.196Z","created_by":"blt9a0fc67c46c47dd7","expanded_title":"Physical Security","seo":{"meta_title":"Physical Security","meta_description":"Physical Security","meta_keywords":"","canonical_url":""},"tags":[],"title":"Physical","topics_secondary":[],"updated_at":"2021-07-20T13:30:47.664Z","updated_by":"blta3dd47a38c602549","url":"/physical-security","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-07-20T13:30:50.834Z","user":"blta3dd47a38c602549"}},{"_version":6,"locale":"en-us","uid":"blta3feccd65c5cd514","ACL":{},"_in_progress":false,"created_at":"2021-05-29T07:24:51.151Z","created_by":"blt9a0fc67c46c47dd7","expanded_title":"Threat Intelligence","seo":{"meta_title":"Threat Intel","meta_description":"Threat Intel","meta_keywords":"","canonical_url":""},"tags":[],"title":"Threat Intel","topics_secondary":[],"updated_at":"2021-07-20T13:26:19.607Z","updated_by":"blta3dd47a38c602549","url":"/threat-intelligence","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-07-20T13:26:22.770Z","user":"blta3dd47a38c602549"}},{"_version":3,"locale":"en-us","uid":"blte0b20eea18da92ac","ACL":{},"_in_progress":false,"created_at":"2021-05-29T07:24:58.718Z","created_by":"blt9a0fc67c46c47dd7","expanded_title":"Cloud","seo":{"meta_title":"Cloud","meta_description":"Cloud","meta_keywords":"","canonical_url":""},"tags":[],"title":"Cloud","topics_secondary":[],"updated_at":"2021-07-20T12:12:46.726Z","updated_by":"blta3dd47a38c602549","url":"/cloud","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-07-20T12:12:50.045Z","user":"blta3dd47a38c602549"}},{"_version":3,"locale":"en-us","uid":"blt785557489e965a0e","ACL":{},"_in_progress":false,"created_at":"2021-05-29T07:24:57.504Z","created_by":"blt9a0fc67c46c47dd7","expanded_title":"Attacks / Breaches","seo":{"meta_title":"Attacks / Breaches","meta_description":"Attacks / Breaches","meta_keywords":"","canonical_url":""},"tags":[],"title":"Breaches","topics_secondary":[],"updated_at":"2021-07-20T12:11:31.270Z","updated_by":"blta3dd47a38c602549","url":"/attacks-breaches","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-07-20T12:11:34.853Z","user":"blta3dd47a38c602549"}},{"title":"Topic primary 1","url":"/topic-primary-1","expanded_title":"topic primary 1","topics_secondary":[{"_version":11,"locale":"en-us","uid":"blte7df9c155852d974","ACL":{},"_in_progress":false,"created_at":"2021-05-29T07:24:47.100Z","created_by":"blt9a0fc67c46c47dd7","name":"Careers \u0026 People","seo":{"meta_title":"Careers \u0026 People","meta_description":"Careers \u0026 People","meta_keywords":"","canonical_url":""},"tags":[],"title":"[Operations] Careers \u0026 People","updated_at":"2021-07-20T12:08:28.689Z","updated_by":"blt986fc66e34c7b415","url":"/careers-and-people","_content_type_uid":"dr_topic_secondary","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-07-20T12:09:57.002Z","user":"blt986fc66e34c7b415"}},{"_version":6,"locale":"en-us","uid":"bltc0595d7ad0a824f9","ACL":{},"_in_progress":false,"created_at":"2021-05-29T07:24:46.154Z","created_by":"blt9a0fc67c46c47dd7","name":"Advanced Threats","seo":{"meta_title":"Advanced Threats","meta_description":"Advanced Threats","meta_keywords":"","canonical_url":""},"tags":[],"title":"[Vulnerabilities / Threats] Advanced Threats","updated_at":"2021-07-20T13:53:43.004Z","updated_by":"blta3dd47a38c602549","url":"/advanced-threats","_content_type_uid":"dr_topic_secondary","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-07-20T13:53:45.886Z","user":"blta3dd47a38c602549"}},{"_version":2,"locale":"en-us","uid":"bltc66bc15dc564597f","ACL":{},"_in_progress":false,"created_at":"2021-05-29T07:24:45.214Z","created_by":"blt9a0fc67c46c47dd7","name":"Identity \u0026 Access Management","seo":{"meta_title":"Identity \u0026 Access Management","meta_description":"Identity \u0026 Access Management","meta_keywords":"","canonical_url":""},"tags":[],"title":"[Operations] Identity \u0026 Access Management","updated_at":"2021-07-20T13:49:05.230Z","updated_by":"blta3dd47a38c602549","url":"/identity-and-access-management","_content_type_uid":"dr_topic_secondary","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-07-20T13:49:08.073Z","user":"blta3dd47a38c602549"}},{"_version":2,"locale":"en-us","uid":"bltb0f5be1fbdfcb41a","ACL":{},"_in_progress":false,"created_at":"2021-05-29T07:24:44.181Z","created_by":"blt9a0fc67c46c47dd7","name":"Compliance","seo":{"meta_title":"Compliance","meta_description":"Compliance","meta_keywords":"","canonical_url":""},"tags":[],"title":"[Risk] Compliance","updated_at":"2021-07-20T13:55:48.317Z","updated_by":"blta3dd47a38c602549","url":"/compliance","_content_type_uid":"dr_topic_secondary","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-07-20T13:55:51.514Z","user":"blta3dd47a38c602549"}},{"_version":2,"locale":"en-us","uid":"bltbce9bffab0b743c9","ACL":{},"_in_progress":false,"created_at":"2021-05-29T07:24:42.861Z","created_by":"blt9a0fc67c46c47dd7","name":"Mobile Security","seo":{"meta_title":"Mobile Security","meta_description":"Mobile Security","meta_keywords":"","canonical_url":""},"tags":[],"title":"[Endpoint] Mobile","updated_at":"2021-07-20T13:55:17.618Z","updated_by":"blta3dd47a38c602549","url":"/mobile","_content_type_uid":"dr_topic_secondary","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-07-20T13:55:20.835Z","user":"blta3dd47a38c602549"}},{"_version":2,"locale":"en-us","uid":"bltd4b54e4cff686e47","ACL":{},"_in_progress":false,"created_at":"2021-05-29T07:24:41.940Z","created_by":"blt9a0fc67c46c47dd7","name":"Privacy","seo":{"meta_title":"Privacy","meta_description":"Privacy","meta_keywords":"","canonical_url":""},"tags":[],"title":"[Endpoint] Privacy","updated_at":"2021-07-20T13:54:46.246Z","updated_by":"blta3dd47a38c602549","url":"/privacy","_content_type_uid":"dr_topic_secondary","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-07-20T13:54:49.414Z","user":"blta3dd47a38c602549"}}],"seo":{"meta_title":"","meta_description":"","meta_keywords":"","canonical_url":""},"tags":[],"locale":"en-us","uid":"blt7b335051f439bf6d","created_by":"blt986fc66e34c7b415","updated_by":"blt986fc66e34c7b415","created_at":"2021-07-13T09:41:01.186Z","updated_at":"2021-07-13T09:41:01.186Z","ACL":{},"_version":1,"_in_progress":false,"publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-07-14T09:45:45.870Z","user":"blt8d6e4671551ab970"},"_owner":{"uid":"blt986fc66e34c7b415","created_at":"2021-05-21T10:05:50.073Z","updated_at":"2022-08-12T04:39:55.264Z","email":"thao.pham@xpondigital.com","username":"thao_blt340f44d8","first_name":"Thao","last_name":"Pham","org_uid":[],"shared_org_uid":["blt5948195ac13977b0"],"mobile_number":"932225058","country_code":"84","tfa_status":"verified","authy_id":"378405624","active":true,"profile_type":"developer","failed_attempts":0,"settings":{"preferences":{"global":[],"stack":[]}},"last_login_at":"2022-08-12T04:39:55.264Z"}}],"categories":[{"_version":12,"locale":"en-us","uid":"bltb87a73f19a122791","ACL":{},"_in_progress":false,"branding":{"hub_page_color":"000000","image_alt_text":"","hub_page_description_with_hyperlink":"","hub_page_logo":null},"created_at":"2021-05-29T07:25:11.415Z","created_by":"blt9a0fc67c46c47dd7","display_options":"Standard View","icon":null,"image_alt_text":"","modules":{"module_blocks":[]},"over_the_edge":[],"secondary_categories":[{"_version":9,"locale":"en-us","uid":"blt5159acef8bbbdbd2","ACL":{},"_in_progress":false,"branding":{"hub_page_color":"","hub_page_description":"","hub_page_logo":null},"created_at":"2021-05-29T07:25:50.638Z","created_by":"blt9a0fc67c46c47dd7","display_options":"Standard View","icon":null,"modules":{"module_blocks":[]},"over_the_edge":[],"secondary_category_name":"Intel","seo":{"canonical_url":"","meta_description":"Intel","meta_keywords":"","meta_title":"Intel"},"shown_in_header":true,"slug":"intel","sponsor_logo":null,"sponsor_text":"","tags":[],"title":"[Partner Perspectives] Intel","topic_page_description":"","updated_at":"2021-07-20T06:41:43.675Z","updated_by":"blt986fc66e34c7b415","_content_type_uid":"dr_category_secondary","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2022-09-09T14:10:34.726Z","user":"blt9488f204761710b3"}},{"_version":2,"locale":"en-us","uid":"bltf061b9cae7114970","ACL":{},"_in_progress":false,"branding":{"hub_page_color":"","hub_page_description":"","hub_page_description_with_hyperlink":"","hub_page_logo":null,"image_alt_text":""},"created_at":"2021-05-29T07:25:54.133Z","created_by":"blt9a0fc67c46c47dd7","display_options":"Standard View","icon":null,"image_alt_text":"","modules":{"module_blocks":[]},"over_the_edge":[],"secondary_category_name":"Bitdefender","seo":{"canonical_url":"","meta_description":"","meta_keywords":"","meta_title":""},"shown_in_header":true,"slug":"bitdefender","sponsor_logo":null,"sponsor_text":"","tags":[],"title":"[Partner Perspectives] Bitdefender","topic_page_description":"","updated_at":"2021-09-28T02:59:37.284Z","updated_by":"blt986fc66e34c7b415","_content_type_uid":"dr_category_secondary","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2022-09-09T14:10:34.737Z","user":"blt9488f204761710b3"}},{"_version":2,"locale":"en-us","uid":"bltf3b52db640ece380","ACL":{},"_in_progress":false,"branding":{"hub_page_color":"","hub_page_description":"","hub_page_description_with_hyperlink":"","hub_page_logo":null,"image_alt_text":""},"created_at":"2021-05-29T07:25:52.889Z","created_by":"blt9a0fc67c46c47dd7","display_options":"Standard View","icon":null,"image_alt_text":"","modules":{"module_blocks":[]},"over_the_edge":[],"secondary_category_name":"General Dynamics Fidelis","seo":{"canonical_url":"","meta_description":"","meta_keywords":"","meta_title":""},"shown_in_header":true,"slug":"general-dynamics-fidelis","sponsor_logo":null,"sponsor_text":"","tags":[],"title":"[Partner Perspectives] General Dynamics Fidelis","topic_page_description":"","updated_at":"2021-09-27T05:59:42.791Z","updated_by":"blt986fc66e34c7b415","_content_type_uid":"dr_category_secondary","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2022-09-09T14:10:34.755Z","user":"blt9488f204761710b3"}},{"_version":2,"locale":"en-us","uid":"blt13d8c03c3780161b","ACL":{},"_in_progress":false,"branding":{"hub_page_color":"","hub_page_description":"","hub_page_description_with_hyperlink":"","hub_page_logo":null,"image_alt_text":""},"created_at":"2021-05-29T07:25:56.306Z","created_by":"blt9a0fc67c46c47dd7","display_options":"Standard View","icon":null,"image_alt_text":"","modules":{"module_blocks":[]},"over_the_edge":[],"secondary_category_name":"Tenable","seo":{"canonical_url":"","meta_description":"","meta_keywords":"","meta_title":""},"shown_in_header":true,"slug":"tenable","sponsor_logo":null,"sponsor_text":"","tags":[],"title":"[Partner Perspectives] Tenable","topic_page_description":"","updated_at":"2021-09-28T02:54:32.206Z","updated_by":"blt986fc66e34c7b415","_content_type_uid":"dr_category_secondary","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2022-09-09T14:10:34.787Z","user":"blt9488f204761710b3"}},{"_version":2,"locale":"en-us","uid":"blt080f0617df413219","ACL":{},"_in_progress":false,"branding":{"hub_page_color":"","hub_page_description":"","hub_page_description_with_hyperlink":"","hub_page_logo":null,"image_alt_text":""},"created_at":"2021-05-29T07:25:55.363Z","created_by":"blt9a0fc67c46c47dd7","display_options":"Standard View","icon":null,"image_alt_text":"","modules":{"module_blocks":[]},"over_the_edge":[],"secondary_category_name":"Carbon Black","seo":{"canonical_url":"","meta_description":"","meta_keywords":"","meta_title":""},"shown_in_header":true,"slug":"carbon-black","sponsor_logo":null,"sponsor_text":"","tags":[],"title":"[Partner Perspectives] Carbon Black","topic_page_description":"","updated_at":"2021-09-28T02:56:58.486Z","updated_by":"blt986fc66e34c7b415","_content_type_uid":"dr_category_secondary","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2022-09-09T14:10:34.807Z","user":"blt9488f204761710b3"}},{"_version":2,"locale":"en-us","uid":"blta82e51ec93e2fac1","ACL":{},"_in_progress":false,"branding":{"hub_page_color":"","hub_page_description":"","hub_page_description_with_hyperlink":"","hub_page_logo":null,"image_alt_text":""},"created_at":"2021-05-29T07:25:58.531Z","created_by":"blt9a0fc67c46c47dd7","display_options":"Standard View","icon":null,"image_alt_text":"","modules":{"module_blocks":[]},"over_the_edge":[],"secondary_category_name":"Malwarebytes","seo":{"canonical_url":"","meta_description":"","meta_keywords":"","meta_title":""},"shown_in_header":true,"slug":"malwarebytes","sponsor_logo":null,"sponsor_text":"","tags":[],"title":"[Partner Perspectives] Malwarebytes","topic_page_description":"","updated_at":"2021-09-27T16:03:39.031Z","updated_by":"blt986fc66e34c7b415","_content_type_uid":"dr_category_secondary","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2022-09-09T14:10:34.837Z","user":"blt9488f204761710b3"}},{"_version":2,"locale":"en-us","uid":"bltdce9206e9328d201","ACL":{},"_in_progress":false,"branding":{"hub_page_color":"","hub_page_description":"","hub_page_description_with_hyperlink":"","hub_page_logo":null,"image_alt_text":""},"created_at":"2021-05-29T07:25:57.615Z","created_by":"blt9a0fc67c46c47dd7","display_options":"Standard View","icon":null,"image_alt_text":"","modules":{"module_blocks":[]},"over_the_edge":[],"secondary_category_name":"Evident.io","seo":{"canonical_url":"","meta_description":"","meta_keywords":"","meta_title":""},"shown_in_header":true,"slug":"evident-io","sponsor_logo":null,"sponsor_text":"","tags":[],"title":"[Partner Perspectives] Evident.io","topic_page_description":"","updated_at":"2021-09-28T02:39:01.265Z","updated_by":"blt986fc66e34c7b415","_content_type_uid":"dr_category_secondary","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2022-09-09T14:10:34.849Z","user":"blt9488f204761710b3"}},{"_version":2,"locale":"en-us","uid":"blt9ca336358f505cf7","ACL":{},"_in_progress":false,"branding":{"hub_page_color":"","hub_page_description":"","hub_page_description_with_hyperlink":"","hub_page_logo":null,"image_alt_text":""},"created_at":"2021-05-29T07:26:00.769Z","created_by":"blt9a0fc67c46c47dd7","display_options":"Standard View","icon":null,"image_alt_text":"","modules":{"module_blocks":[]},"over_the_edge":[],"secondary_category_name":"F5","seo":{"canonical_url":"","meta_description":"","meta_keywords":"","meta_title":""},"shown_in_header":true,"slug":"f5","sponsor_logo":null,"sponsor_text":"","tags":[],"title":"[Partner Perspectives] F5","topic_page_description":"","updated_at":"2021-09-27T04:43:08.815Z","updated_by":"blt986fc66e34c7b415","_content_type_uid":"dr_category_secondary","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2022-09-09T14:10:34.861Z","user":"blt9488f204761710b3"}},{"_version":3,"locale":"en-us","uid":"blt759bfac36f41d33f","ACL":{},"_in_progress":false,"branding":{"hub_page_color":"","hub_page_description":"","hub_page_description_with_hyperlink":"","hub_page_logo":null,"image_alt_text":""},"created_at":"2021-05-29T07:25:59.522Z","created_by":"blt9a0fc67c46c47dd7","display_options":"Standard View","icon":null,"image_alt_text":"","modules":{"module_blocks":[]},"over_the_edge":[],"secondary_category_name":"Juniper","seo":{"canonical_url":"","meta_description":"","meta_keywords":"","meta_title":""},"shown_in_header":true,"slug":"juniper","sponsor_logo":null,"sponsor_text":"","tags":[],"title":"[Partner Perspectives] Juniper","topic_page_description":"","updated_at":"2021-09-27T16:04:01.683Z","updated_by":"blt986fc66e34c7b415","_content_type_uid":"dr_category_secondary","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2022-09-09T14:10:34.955Z","user":"blt9488f204761710b3"}},{"_version":2,"locale":"en-us","uid":"blt8de203de1204fefa","ACL":{},"_in_progress":false,"branding":{"hub_page_color":"","hub_page_description":"","hub_page_description_with_hyperlink":"","hub_page_logo":null,"image_alt_text":""},"created_at":"2021-05-29T07:26:03.245Z","created_by":"blt9a0fc67c46c47dd7","display_options":"Standard View","icon":null,"image_alt_text":"","modules":{"module_blocks":[]},"over_the_edge":[],"secondary_category_name":"iboss","seo":{"canonical_url":"","meta_description":"","meta_keywords":"","meta_title":""},"shown_in_header":true,"slug":"iboss","sponsor_logo":null,"sponsor_text":"","tags":[],"title":"[Partner Perspectives] iboss","topic_page_description":"","updated_at":"2021-09-27T16:02:15.948Z","updated_by":"blt986fc66e34c7b415","_content_type_uid":"dr_category_secondary","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2022-09-09T14:10:34.960Z","user":"blt9488f204761710b3"}},{"_version":2,"locale":"en-us","uid":"blt0857e3accb1bca3c","ACL":{},"_in_progress":false,"branding":{"hub_page_color":"","hub_page_description":"","hub_page_description_with_hyperlink":"","hub_page_logo":null,"image_alt_text":""},"created_at":"2021-05-29T07:26:02.003Z","created_by":"blt9a0fc67c46c47dd7","display_options":"Standard View","icon":null,"image_alt_text":"","modules":{"module_blocks":[]},"over_the_edge":[],"secondary_category_name":"Gigamon","seo":{"canonical_url":"","meta_description":"","meta_keywords":"","meta_title":""},"shown_in_header":true,"slug":"gigamon","sponsor_logo":null,"sponsor_text":"","tags":[],"title":"[Partner Perspectives] Gigamon","topic_page_description":"","updated_at":"2021-09-27T15:59:04.124Z","updated_by":"blt986fc66e34c7b415","_content_type_uid":"dr_category_secondary","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2022-09-09T14:10:34.953Z","user":"blt9488f204761710b3"}},{"_version":2,"locale":"en-us","uid":"blt0f2b2ba95fdf65ba","ACL":{},"_in_progress":false,"branding":{"hub_page_logo":null,"image_alt_text":"","hub_page_description_with_hyperlink":"","hub_page_color":""},"created_at":"2021-10-28T15:37:45.384Z","created_by":"bltfcb3d125bf8c49ee","display_options":"Standard View","icon":null,"image_alt_text":"","modules":{"module_blocks":[]},"over_the_edge":[],"secondary_category_name":"CrowdStrike","seo":{"meta_title":"","meta_description":"","meta_keywords":"","canonical_url":""},"shown_in_header":true,"slug":"crowdstrike","sponsor_logo":null,"sponsor_text":"","tags":[],"title":"[Partner Perspectives] CrowdStrike","topic_page_description":"","updated_at":"2021-10-28T15:41:17.530Z","updated_by":"bltfcb3d125bf8c49ee","_content_type_uid":"dr_category_secondary","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-12-06T21:12:52.566Z","user":"bltfcb3d125bf8c49ee"}},{"_version":1,"locale":"en-us","uid":"blt81e53b0d8a1f159a","ACL":{},"_in_progress":false,"branding":{"hub_page_logo":null,"image_alt_text":"","hub_page_description_with_hyperlink":"","hub_page_color":""},"created_at":"2021-10-28T15:38:57.813Z","created_by":"bltfcb3d125bf8c49ee","display_options":"Standard View","icon":null,"image_alt_text":"","modules":{"module_blocks":[]},"over_the_edge":[],"secondary_category_name":"Darktrace","seo":{"meta_title":"","meta_description":"","meta_keywords":"","canonical_url":""},"shown_in_header":true,"slug":"darktrace","sponsor_logo":null,"sponsor_text":"","tags":[],"title":"{Partner Perspectives] Darktrace","topic_page_description":"","updated_at":"2021-10-28T15:38:57.813Z","updated_by":"bltfcb3d125bf8c49ee","_content_type_uid":"dr_category_secondary","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2022-01-05T22:48:48.368Z","user":"bltfcb3d125bf8c49ee"}},{"_version":1,"locale":"en-us","uid":"bltf9ffef9c7c4fca81","ACL":{},"_in_progress":false,"branding":{"hub_page_logo":null,"image_alt_text":"","hub_page_description_with_hyperlink":"","hub_page_color":""},"created_at":"2022-09-07T17:20:29.124Z","created_by":"blt9488f204761710b3","display_options":"Standard View","icon":null,"image_alt_text":"","modules":{"module_blocks":[]},"over_the_edge":[],"secondary_category_name":"Microsoft","seo":{"meta_title":"","meta_description":"","meta_keywords":"","canonical_url":""},"shown_in_header":true,"slug":"microsoft","sponsor_logo":null,"sponsor_text":"","tags":[],"title":"[Partner Perspectives] Microsoft","topic_page_description":"","updated_at":"2022-09-07T17:20:29.124Z","updated_by":"blt9488f204761710b3","_content_type_uid":"dr_category_secondary","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2022-09-07T17:20:41.292Z","user":"blt9488f204761710b3"}}],"seo":{"canonical_url":"","meta_description":"Partner Perspectives","meta_keywords":"","meta_title":"Partner Perspectives"},"slug":"partner-perspectives","sponsor_logo":null,"sponsor_text":"","tags":[],"title":"Partner Perspectives","topic_page_description":"","updated_at":"2022-09-09T14:10:13.664Z","updated_by":"blt9488f204761710b3","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2022-09-09T14:10:35.011Z","user":"blt9488f204761710b3"}},{"_version":14,"locale":"en-us","uid":"blt8622595eba1da383","ACL":{},"_in_progress":false,"branding":{"hub_page_color":"","hub_page_description_with_hyperlink":"\u003cp\u003e\u003c/p\u003e\n\u003cp\u003e\u003c/p\u003e\n\u003cp\u003eThe Global Leader in Cybersecurity Events \u0026 Trainings.\u0026nbsp;\u003c/p\u003e\n\u003cp\u003eClick \u003ca href=\"https://www.blackhat.com\" target=\"_blank\"\u003ehere\u003c/a\u003e to learn more.\u003c/p\u003e\n\u003cp\u003e\u003c/p\u003e\n\u003cp\u003e\u003c/p\u003e","hub_page_logo":{"_version":1,"is_dir":false,"uid":"blt4ddfe1d59823f8f3","ACL":{},"content_type":"image/png","created_at":"2022-02-28T14:45:33.919Z","created_by":"blta3dd47a38c602549","file_size":"4211","filename":"Black_Hat.png","parent_uid":"blt966fbf792d032939","tags":[],"title":"Black_Hat.png","updated_at":"2022-02-28T14:45:33.919Z","updated_by":"blta3dd47a38c602549","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2022-07-21T15:40:26.097Z","user":"blt86eeaee2e17f91dc"},"url":"https://eu-images.contentstack.com/v3/assets/blt66983808af36a8ef/blt4ddfe1d59823f8f3/621ce00dba1c6a10726d97c4/Black_Hat.png"},"image_alt_text":"Black Hat Temporary"},"created_at":"2021-06-16T21:13:12.377Z","created_by":"blt9488f204761710b3","display_options":"Modular View","icon":null,"image_alt_text":"","modules":{"module_blocks":[{"uid":"blt7f631c6ec34e5f81","_content_type_uid":"dr_module_jobs"},{"uid":"blt3011a4d7f52f0425","_content_type_uid":"dr_module_jobs"},{"uid":"blt9d87466a690e2652","_content_type_uid":"dr_module_article_promo"},{"uid":"blt6e2f0c4102bcde09","_content_type_uid":"dr_featured_content"}]},"over_the_edge":[],"secondary_categories":[{"_version":1,"locale":"en-us","uid":"blt6725e33b8598a69d","ACL":{},"_in_progress":false,"branding":{"hub_page_logo":null,"image_alt_text":"","hub_page_description_with_hyperlink":"","hub_page_color":""},"created_at":"2022-05-30T12:59:33.578Z","created_by":"blta3dd47a38c602549","display_options":"Standard View","icon":null,"image_alt_text":"","modules":{"module_blocks":[]},"over_the_edge":[],"secondary_category_name":"Black Hat News","seo":{"meta_title":"","meta_description":"","meta_keywords":"","canonical_url":""},"shown_in_header":false,"slug":"black-hat-news","sponsor_logo":null,"sponsor_text":"","tags":[],"title":"Black Hat News","topic_page_description":"","updated_at":"2022-05-30T12:59:33.578Z","updated_by":"blta3dd47a38c602549","_content_type_uid":"dr_category_secondary","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2022-07-21T15:40:26.005Z","user":"blt86eeaee2e17f91dc"}}],"seo":{"canonical_url":"","meta_description":"Updates and insights from the Black Hat cybersecurity conference","meta_keywords":"","meta_title":""},"slug":"black-hat","sponsor_logo":null,"sponsor_text":"","tags":[],"title":"Black Hat","topic_page_description":"Updates and insights from Black Hat.","updated_at":"2022-07-07T17:43:03.736Z","updated_by":"blt86eeaee2e17f91dc","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2022-07-21T15:40:26.124Z","user":"blt86eeaee2e17f91dc"},"_owner":{"uid":"blt9488f204761710b3","created_at":"2021-05-21T10:05:50.071Z","updated_at":"2022-10-03T11:50:11.193Z","email":"roma.nowak@informa.com","username":"roma_blt4d352a9b","first_name":"roma","last_name":"nowak","org_uid":[],"shared_org_uid":["blt5948195ac13977b0"],"mobile_number":"5167901481","country_code":"1","tfa_status":"verified","authy_id":"375656345","active":true,"profile_type":"business","failed_attempts":0,"settings":{"global":[{"key":"favorite_stacks","value":[{"org_uid":"blt5948195ac13977b0","stacks":[{"api_key":"bltbbbdd615c0ee9096"},{"api_key":"blt95b381df7c12c15d"},{"api_key":"blt66983808af36a8ef"}]}]}]},"last_login_at":"2022-10-03T11:50:11.193Z"}},{"_version":17,"locale":"en-us","uid":"blt0db4b40b15bb3ca2","ACL":{},"_in_progress":false,"branding":{"image_alt_text":"Dark Reading Technology Logo","hub_page_color":"000000","hub_page_description_with_hyperlink":"\u003cp\u003eTech News and Analysis\u003c/p\u003e","hub_page_logo":{"parent_uid":"blt966fbf792d032939","uid":"blte2d0d4f2e812b871","created_by":"blta3dd47a38c602549","updated_by":"blta3dd47a38c602549","created_at":"2021-09-30T08:22:01.619Z","updated_at":"2021-09-30T08:22:01.619Z","content_type":"image/png","file_size":"8009","filename":"DR_Technology_Logo_White.png","title":"DR_Technology_Logo_White.png","ACL":[],"_version":1,"is_dir":false,"tags":[],"publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-10-01T12:34:45.120Z","user":"blta3dd47a38c602549"},"url":"https://eu-images.contentstack.com/v3/assets/blt66983808af36a8ef/blte2d0d4f2e812b871/615573a972a0487ccb343d41/DR_Technology_Logo_White.png"}},"created_at":"2021-09-10T17:46:13.387Z","created_by":"blta3dd47a38c602549","display_options":"Modular View","icon":null,"image_alt_text":"","modules":{"module_blocks":[{"uid":"blt2bf72304a6aba7a2","_content_type_uid":"dr_featured_content"},{"uid":"blt81cfb8f03ba8dbbd","_content_type_uid":"dr_module_article_promo"},{"uid":"blt60343bf2d91f1598","_content_type_uid":"dr_module_article_promo"},{"uid":"bltb2833b9c1bc25adc","_content_type_uid":"dr_module_latest_content"}]},"over_the_edge":[],"secondary_categories":[{"title":"[DR-TECH] The Cyber Future","secondary_category_name":"The Cyber Future","slug":"the-cyber-future","shown_in_header":true,"branding":{"hub_page_logo":null,"image_alt_text":"","hub_page_description":"","hub_page_color":""},"sponsor_text":"","sponsor_logo":null,"image_alt_text":"","over_the_edge":[],"display_options":"Standard View","modules":{"module_blocks":[]},"seo":{"meta_title":"","meta_description":"","meta_keywords":"","canonical_url":""},"icon":null,"topic_page_description":"","tags":[],"locale":"en-us","uid":"bltc11ff98f98398512","created_by":"blta3dd47a38c602549","updated_by":"blta3dd47a38c602549","created_at":"2021-09-10T17:49:59.274Z","updated_at":"2021-09-10T17:49:59.274Z","_content_type_uid":"dr_category_secondary","ACL":{},"_version":1,"_in_progress":false,"publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-10-01T12:34:45.095Z","user":"blta3dd47a38c602549"}},{"_version":1,"locale":"en-us","uid":"bltb60f3c528a3177f8","ACL":{},"_in_progress":false,"branding":{"hub_page_logo":null,"image_alt_text":"","hub_page_description":"","hub_page_color":""},"created_at":"2021-09-10T17:49:23.472Z","created_by":"blta3dd47a38c602549","display_options":"Standard View","icon":null,"image_alt_text":"","modules":{"module_blocks":[]},"over_the_edge":[],"secondary_category_name":"Emerging Tech","seo":{"meta_title":"","meta_description":"","meta_keywords":"","canonical_url":""},"shown_in_header":true,"slug":"emerging-tech","sponsor_logo":null,"sponsor_text":"","tags":[],"title":"[DR-TECH] Emerging Tech","topic_page_description":"","updated_at":"2021-09-10T17:49:23.472Z","updated_by":"blta3dd47a38c602549","_content_type_uid":"dr_category_secondary","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-10-01T14:12:01.048Z","user":"blta3dd47a38c602549"}},{"title":"[DR-TECH] Tech Talks","secondary_category_name":"Tech Talks","slug":"tech-talks","shown_in_header":true,"branding":{"hub_page_logo":null,"image_alt_text":"","hub_page_description":"","hub_page_color":""},"sponsor_text":"","sponsor_logo":null,"image_alt_text":"","over_the_edge":[],"display_options":"Standard View","modules":{"module_blocks":[]},"seo":{"meta_title":"","meta_description":"","meta_keywords":"","canonical_url":""},"icon":null,"topic_page_description":"","tags":[],"locale":"en-us","uid":"bltb9fce7117e1d3083","created_by":"blta3dd47a38c602549","updated_by":"blta3dd47a38c602549","created_at":"2021-09-10T17:48:56.310Z","updated_at":"2021-09-10T17:48:56.310Z","_content_type_uid":"dr_category_secondary","ACL":{},"_version":1,"_in_progress":false,"publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-10-01T12:34:45.102Z","user":"blta3dd47a38c602549"}},{"title":"[DR-TECH] Tech Trends","secondary_category_name":"Tech Trends","slug":"tech-trends","shown_in_header":true,"branding":{"hub_page_logo":null,"image_alt_text":"","hub_page_description":"","hub_page_color":""},"sponsor_text":"","sponsor_logo":null,"image_alt_text":"","over_the_edge":[],"display_options":"Standard View","modules":{"module_blocks":[]},"seo":{"meta_title":"","meta_description":"","meta_keywords":"","canonical_url":""},"icon":null,"topic_page_description":"","tags":[],"locale":"en-us","uid":"blt54beaadb3c555193","created_by":"blta3dd47a38c602549","updated_by":"blta3dd47a38c602549","created_at":"2021-09-10T17:48:10.159Z","updated_at":"2021-09-10T17:48:10.159Z","_content_type_uid":"dr_category_secondary","ACL":{},"_version":1,"_in_progress":false,"publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-10-01T12:34:45.114Z","user":"blta3dd47a38c602549"}}],"seo":{"meta_title":"","meta_description":"Cybersecurity technology and product news, analysis, expert commentary, and in-depth feature articles.","meta_keywords":"","canonical_url":""},"slug":"dr-tech","sponsor_logo":null,"sponsor_text":"","tags":[],"title":"DR Tech","topic_page_description":"Cybersecurity technology and product news, analysis, expert commentary, and in-depth feature articles.","updated_at":"2022-07-05T17:29:28.761Z","updated_by":"blt7639e1b0bae9533a","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2022-07-05T17:29:37.178Z","user":"blt7639e1b0bae9533a"},"_owner":{"uid":"blta3dd47a38c602549","created_at":"2021-05-21T10:05:50.070Z","updated_at":"2022-09-29T08:18:59.891Z","email":"john.ely@informa.com","username":"john_blt665706a5","first_name":"John","last_name":"Ely","org_uid":[],"shared_org_uid":["blt5948195ac13977b0"],"mobile_number":"07877953454","country_code":"44","tfa_status":"verified","authy_id":"378049479","active":true,"profile_type":"business","failed_attempts":0,"settings":{"preferences":{"global":[],"stack":[]}},"last_login_at":"2022-09-29T08:18:59.890Z"}},{"_version":6,"locale":"en-us","uid":"blta6cab0108fb2fe2d","ACL":{},"_in_progress":false,"branding":{"hub_page_color":"000000","hub_page_description_with_hyperlink":"","hub_page_logo":null,"image_alt_text":""},"created_at":"2021-05-29T07:25:21.501Z","created_by":"blt9a0fc67c46c47dd7","display_options":"Standard View","icon":null,"image_alt_text":"","modules":{"module_blocks":[]},"over_the_edge":[],"secondary_categories":[{"_version":2,"locale":"en-us","uid":"blt3a07a5f6f122df83","ACL":{},"_in_progress":false,"branding":{"hub_page_color":"","hub_page_description":"","hub_page_logo":null},"created_at":"2021-05-29T07:25:45.829Z","created_by":"blt9a0fc67c46c47dd7","display_options":"Standard View","icon":null,"modules":{"module_blocks":[]},"over_the_edge":[],"secondary_category_name":"Advanced Threats","seo":{"canonical_url":"","meta_description":"Advanced Threats","meta_keywords":"","meta_title":"Advanced Threats"},"shown_in_header":true,"slug":"advanced-threats","sponsor_logo":null,"sponsor_text":"","tags":[],"title":"[Vulnerabilities/Threats] Advanced Threats","topic_page_description":"","updated_at":"2021-07-16T11:10:36.838Z","updated_by":"blta3dd47a38c602549","_content_type_uid":"dr_category_secondary","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-07-20T11:43:56.836Z","user":"blta3dd47a38c602549"}},{"_version":2,"locale":"en-us","uid":"blt2e8d75e7e5494295","ACL":{},"_in_progress":false,"branding":{"hub_page_color":"","hub_page_description":"","hub_page_logo":null},"created_at":"2021-05-29T07:25:44.920Z","created_by":"blt9a0fc67c46c47dd7","display_options":"Standard View","icon":null,"modules":{"module_blocks":[]},"over_the_edge":[],"secondary_category_name":"Insider Threats","seo":{"canonical_url":"","meta_description":"Insider Threats","meta_keywords":"","meta_title":"Insider Threats"},"shown_in_header":true,"slug":"insider-threats","sponsor_logo":null,"sponsor_text":"","tags":[],"title":"[Vulnerabilities/Threats] Insider Threats","topic_page_description":"","updated_at":"2021-07-16T11:07:19.341Z","updated_by":"blta3dd47a38c602549","_content_type_uid":"dr_category_secondary","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-07-20T11:43:31.039Z","user":"blta3dd47a38c602549"}},{"_version":3,"locale":"en-us","uid":"blteb326d2311783787","ACL":{},"_in_progress":false,"branding":{"hub_page_color":"","hub_page_description":"","hub_page_logo":null},"created_at":"2021-05-29T07:25:47.773Z","created_by":"blt9a0fc67c46c47dd7","display_options":"Standard View","icon":null,"modules":{"module_blocks":[]},"over_the_edge":[],"secondary_category_name":"Vulnerability Management","seo":{"canonical_url":"","meta_description":"Vulnerability Management","meta_keywords":"","meta_title":"Vulnerability Management"},"shown_in_header":true,"slug":"vulnerability-management","sponsor_logo":null,"sponsor_text":"","tags":[],"title":"{Vulnerabilities/Threats] Vulnerability Management","topic_page_description":"","updated_at":"2021-07-20T08:20:16.855Z","updated_by":"blt986fc66e34c7b415","_content_type_uid":"dr_category_secondary","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-07-20T11:42:56.421Z","user":"blta3dd47a38c602549"}}],"seo":{"canonical_url":"","meta_description":"Breaking news, analysis, and expert commentary on software \u0026 hardware vulnerabilities and cyber threats, and the tools, tech, and practices for addressing them","meta_keywords":"","meta_title":"Vulnerabilities / Threats"},"slug":"vulnerabilities-threats","sponsor_logo":null,"sponsor_text":"","tags":[],"title":"Vulnerabilities/Threats","topic_page_description":"Breaking news, news analysis, and expert commentary on cybersecurity threat intelligence, including tools \u0026 technologies. ","updated_at":"2022-02-28T13:38:26.594Z","updated_by":"bltfcb3d125bf8c49ee","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2022-02-28T13:38:32.017Z","user":"bltfcb3d125bf8c49ee"}},{"_version":4,"locale":"en-us","uid":"bltdeb10b926a7ccf5c","ACL":{},"_in_progress":false,"branding":{"hub_page_color":"000000","hub_page_description_with_hyperlink":"","hub_page_logo":null,"image_alt_text":""},"created_at":"2021-05-29T07:25:17.673Z","created_by":"blt9a0fc67c46c47dd7","display_options":"Standard View","icon":null,"image_alt_text":"","modules":{"module_blocks":[]},"over_the_edge":[],"secondary_categories":[],"seo":{"canonical_url":"","meta_description":"Breaking news, news analysis, and expert commentary on cybersecurity threat intelligence, including tools \u0026 technologies","meta_keywords":"","meta_title":"Threat Intelligence"},"slug":"threat-intelligence","sponsor_logo":null,"sponsor_text":"","tags":[],"title":"Threat Intelligence","topic_page_description":"Breaking news, news analysis, and expert commentary on cybersecurity threat intelligence, including tools \u0026 technologies.","updated_at":"2022-02-28T13:36:02.565Z","updated_by":"bltfcb3d125bf8c49ee","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2022-02-28T13:36:07.579Z","user":"bltfcb3d125bf8c49ee"}},{"_version":2,"locale":"en-us","uid":"blt000a3e5dc1d51c08","ACL":{},"_in_progress":false,"branding":{"hub_page_color":"","hub_page_description_with_hyperlink":"","hub_page_logo":null,"image_alt_text":""},"created_at":"2021-06-16T21:13:39.947Z","created_by":"blt9488f204761710b3","display_options":"Standard View","icon":null,"image_alt_text":"","modules":{"module_blocks":[]},"over_the_edge":[],"secondary_categories":[],"seo":{"canonical_url":"","meta_description":"Archive of cybersecurity news articles, expert commentary, and detailed analysis published by the former Security Now website, now part of Dark Reading.","meta_keywords":"","meta_title":""},"slug":"security-now","sponsor_logo":null,"sponsor_text":"","tags":[],"title":"Security Now","topic_page_description":"In 2020, Security Now became part of Dark Reading. This page contains an archive of cybersecurity news articles, detailed analysis, and expert commentary published by Security Now. ","updated_at":"2022-02-28T13:34:44.576Z","updated_by":"bltfcb3d125bf8c49ee","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2022-02-28T13:34:49.315Z","user":"bltfcb3d125bf8c49ee"},"_owner":{"uid":"blt9488f204761710b3","created_at":"2021-05-21T10:05:50.071Z","updated_at":"2022-10-03T11:50:11.193Z","email":"roma.nowak@informa.com","username":"roma_blt4d352a9b","first_name":"roma","last_name":"nowak","org_uid":[],"shared_org_uid":["blt5948195ac13977b0"],"mobile_number":"5167901481","country_code":"1","tfa_status":"verified","authy_id":"375656345","active":true,"profile_type":"business","failed_attempts":0,"settings":{"global":[{"key":"favorite_stacks","value":[{"org_uid":"blt5948195ac13977b0","stacks":[{"api_key":"bltbbbdd615c0ee9096"},{"api_key":"blt95b381df7c12c15d"},{"api_key":"blt66983808af36a8ef"}]}]}]},"last_login_at":"2022-10-03T11:50:11.193Z"}},{"_version":4,"locale":"en-us","uid":"blt7095e7265cf0f380","ACL":{},"_in_progress":false,"branding":{"hub_page_color":"000000","hub_page_description_with_hyperlink":"","hub_page_logo":null,"image_alt_text":""},"created_at":"2021-05-29T07:25:22.491Z","created_by":"blt9a0fc67c46c47dd7","display_options":"Standard View","icon":null,"image_alt_text":"","modules":{"module_blocks":[]},"over_the_edge":[],"secondary_categories":[{"_version":2,"locale":"en-us","uid":"blt9d07d0a4c0d8cb54","ACL":{},"_in_progress":false,"branding":{"hub_page_color":"","hub_page_description":"","hub_page_logo":null},"created_at":"2021-05-29T07:25:43.070Z","created_by":"blt9a0fc67c46c47dd7","display_options":"Standard View","icon":null,"modules":{"module_blocks":[]},"over_the_edge":[],"secondary_category_name":"Compliance","seo":{"canonical_url":"","meta_description":"Compliance","meta_keywords":"","meta_title":"Compliance"},"shown_in_header":true,"slug":"compliance","sponsor_logo":null,"sponsor_text":"","tags":[],"title":"[Risk] Compliance","topic_page_description":"","updated_at":"2021-07-16T11:20:24.692Z","updated_by":"blta3dd47a38c602549","_content_type_uid":"dr_category_secondary","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-07-20T11:46:22.899Z","user":"blta3dd47a38c602549"}}],"seo":{"canonical_url":"","meta_description":"Breaking news, news analysis, and expert commentary on cybersecurity risk, and the tools, technologies, and practices for assessing risk","meta_keywords":"","meta_title":"Risk"},"slug":"risk","sponsor_logo":null,"sponsor_text":"","tags":[],"title":"Risk","topic_page_description":"Breaking news, news analysis, and expert commentary on cybersecurity risk, and the tools, technologies, and practices for assessing risk.","updated_at":"2022-02-28T13:33:37.389Z","updated_by":"bltfcb3d125bf8c49ee","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2022-02-28T13:33:43.718Z","user":"bltfcb3d125bf8c49ee"}},{"_version":4,"locale":"en-us","uid":"bltaebee183784263bf","ACL":{},"_in_progress":false,"branding":{"hub_page_color":"000000","hub_page_description_with_hyperlink":"","hub_page_logo":null,"image_alt_text":""},"created_at":"2021-05-29T07:25:18.693Z","created_by":"blt9a0fc67c46c47dd7","display_options":"Standard View","icon":null,"image_alt_text":"","modules":{"module_blocks":[]},"over_the_edge":[],"secondary_categories":[],"seo":{"canonical_url":"","meta_description":"Breaking news, news analysis, and expert commentary on the intersection of cybersecurity and physical security","meta_keywords":"","meta_title":"Physical Security"},"slug":"physical-security","sponsor_logo":null,"sponsor_text":"","tags":[],"title":"Physical Security","topic_page_description":"Breaking news, news analysis, and expert commentary on the intersection of cybersecurity and physical security.","updated_at":"2022-02-28T13:31:50.971Z","updated_by":"bltfcb3d125bf8c49ee","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2022-02-28T13:32:02.329Z","user":"bltfcb3d125bf8c49ee"}},{"_version":5,"locale":"en-us","uid":"blta96d37f2f5d942cf","ACL":{},"_in_progress":false,"branding":{"hub_page_color":"000000","hub_page_description_with_hyperlink":"","hub_page_logo":null,"image_alt_text":""},"created_at":"2021-05-29T07:25:15.618Z","created_by":"blt9a0fc67c46c47dd7","display_options":"Standard View","icon":null,"image_alt_text":"","modules":{"module_blocks":[]},"over_the_edge":[],"secondary_categories":[],"seo":{"canonical_url":"","meta_description":"Breaking news, news analysis, and expert commentary on threats to the network perimeter, and the tools \u0026 technologies for securing it","meta_keywords":"","meta_title":"Perimeter"},"slug":"perimeter","sponsor_logo":null,"sponsor_text":"","tags":[],"title":"Perimeter","topic_page_description":"Breaking news, news analysis, and expert commentary on threats to the network perimeter, and the tools \u0026 technologies for securing it.","updated_at":"2022-02-28T13:17:18.892Z","updated_by":"bltfcb3d125bf8c49ee","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2022-02-28T13:29:22.075Z","user":"bltfcb3d125bf8c49ee"}},{"_version":4,"locale":"en-us","uid":"blt072b989d237a00d2","ACL":{},"_in_progress":false,"branding":{"hub_page_color":"000000","hub_page_description_with_hyperlink":"","hub_page_logo":null,"image_alt_text":""},"created_at":"2021-05-29T07:25:19.615Z","created_by":"blt9a0fc67c46c47dd7","display_options":"Standard View","icon":null,"image_alt_text":"","modules":{"module_blocks":[]},"over_the_edge":[],"secondary_categories":[{"_version":4,"locale":"en-us","uid":"blt1922da536f26f75a","ACL":{},"_in_progress":false,"branding":{"hub_page_color":"","hub_page_description":"","hub_page_logo":null},"created_at":"2021-05-29T07:25:46.834Z","created_by":"blt9a0fc67c46c47dd7","display_options":"Standard View","icon":null,"modules":{"module_blocks":[]},"over_the_edge":[],"secondary_category_name":"Identity \u0026 Access Management","seo":{"canonical_url":"","meta_description":"Identity \u0026 Access Management","meta_keywords":"","meta_title":"Identity \u0026 Access Management"},"shown_in_header":true,"slug":"identity-and-access-management","sponsor_logo":null,"sponsor_text":"","tags":[],"title":"[Operations] Identity \u0026 Access Management","topic_page_description":"","updated_at":"2021-07-20T12:02:06.708Z","updated_by":"blt986fc66e34c7b415","_content_type_uid":"dr_category_secondary","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-07-20T12:09:06.252Z","user":"blt986fc66e34c7b415"}}],"seo":{"canonical_url":"","meta_description":"Breaking news, news analysis, and expert commentary on cybersecurity operations, and the tools \u0026 technologies for security teams","meta_keywords":"","meta_title":"Operations"},"slug":"operations","sponsor_logo":null,"sponsor_text":"","tags":[],"title":"Operations","topic_page_description":"Breaking news, news analysis, and expert commentary on cybersecurity operations, and the tools \u0026 technologies for security teams.","updated_at":"2022-02-28T13:16:25.930Z","updated_by":"bltfcb3d125bf8c49ee","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2022-02-28T13:16:33.681Z","user":"bltfcb3d125bf8c49ee"}},{"_version":155,"locale":"en-us","uid":"blt7a29bd8a29d3130b","ACL":{},"_in_progress":false,"branding":{"hub_page_color":"000000","image_alt_text":"Edge Logo","hub_page_description_with_hyperlink":"\u003cp\u003eCybersecurity In-Depth\u003c/p\u003e","hub_page_logo":{"parent_uid":"blt966fbf792d032939","uid":"blt482d47e4fd046239","created_by":"blta3dd47a38c602549","updated_by":"blta3dd47a38c602549","created_at":"2021-10-08T14:20:30.584Z","updated_at":"2021-10-08T14:20:30.584Z","content_type":"image/png","file_size":"4884","filename":"TheEdge-Logo-0.png","title":"TheEdge-Logo-0.png","ACL":[],"_version":1,"is_dir":false,"tags":[],"publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-10-08T14:21:25.169Z","user":"blta3dd47a38c602549"},"url":"https://eu-images.contentstack.com/v3/assets/blt66983808af36a8ef/blt482d47e4fd046239/616053ae5cf2461e097404d8/TheEdge-Logo-0.png"}},"created_at":"2021-05-29T07:25:25.978Z","created_by":"blt9a0fc67c46c47dd7","display_options":"Modular View","icon":null,"image_alt_text":"","modules":{"module_blocks":[{"uid":"blt0a4a76389ec40ec6","_content_type_uid":"dr_featured_content"},{"uid":"blt2a13fe94a98405cd","_content_type_uid":"dr_module_article_promo"},{"uid":"bltefdbbe29deef8414","_content_type_uid":"dr_module_article_promo"},{"uid":"blt801b94c10208828e","_content_type_uid":"dr_module_latest_content"}]},"over_the_edge":[],"secondary_categories":[{"_content_type_uid":"dr_category_secondary","_version":40,"locale":"en-us","uid":"bltb7711dfcd24f1fc0","ACL":{},"_in_progress":false,"branding":{"hub_page_color":"000000","hub_page_logo":{"_version":1,"is_dir":false,"uid":"blt2bc2d9dd689b0def","ACL":{},"content_type":"image/png","created_at":"2021-06-07T21:43:29.490Z","created_by":"bltfcb3d125bf8c49ee","file_size":"4813","filename":"TheEdge-Logo.png","tags":[],"title":"TheEdge-Logo.png","updated_at":"2021-06-07T21:43:29.490Z","updated_by":"bltfcb3d125bf8c49ee","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-07-15T11:49:43.071Z","user":"blt986fc66e34c7b415"},"url":"https://eu-images.contentstack.com/v3/assets/blt66983808af36a8ef/blt2bc2d9dd689b0def/60be930173c30c216ca2a004/TheEdge-Logo.png"},"image_alt_text":"","hub_page_description_with_hyperlink":""},"created_at":"2021-05-29T07:25:49.625Z","created_by":"blt9a0fc67c46c47dd7","display_options":"Standard View","icon":{"uid":"bltf050bd5685cd6a94","created_by":"blt6fb043d513578596","updated_by":"blt6fb043d513578596","created_at":"2021-07-06T15:53:38.409Z","updated_at":"2021-07-06T15:53:38.409Z","content_type":"image/svg+xml","file_size":"3222","filename":"edge-article-icon.svg","title":"edge-article-icon.svg","ACL":[],"_version":1,"is_dir":false,"tags":[],"publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-07-15T11:54:17.246Z","user":"blt986fc66e34c7b415"},"url":"https://eu-images.contentstack.com/v3/assets/blt66983808af36a8ef/bltf050bd5685cd6a94/60e47c8244e9812aec444767/edge-article-icon.svg"},"image_alt_text":"","modules":{"module_blocks":[]},"over_the_edge":[],"secondary_category_name":"Edge Articles","seo":{"canonical_url":"","meta_description":"In-Depth feature articles, analysis, and commentary on cybersecurity trends and best practices.","meta_keywords":"","meta_title":"Edge Articles"},"shown_in_header":true,"slug":"edge-articles","sponsor_logo":null,"sponsor_text":"Brought to you by","tags":[],"title":"[Edge] Edge Articles","topic_page_description":"In-Depth feature articles, analysis, and commentary on cybersecurity trends and best practices.","updated_at":"2022-03-23T20:45:39.501Z","updated_by":"bltfcb3d125bf8c49ee","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2022-03-23T20:45:50.888Z","user":"bltfcb3d125bf8c49ee"}},{"_version":38,"locale":"en-us","uid":"blt3a5a059746d0ef60","ACL":{},"_in_progress":false,"branding":{"hub_page_color":"","hub_page_description":"","hub_page_logo":null},"created_at":"2021-05-29T07:25:48.749Z","created_by":"blt9a0fc67c46c47dd7","display_options":"Standard View","icon":null,"modules":{"module_blocks":[{"uid":"blt0a4a76389ec40ec6","_content_type_uid":"dr_featured_content"},{"uid":"bltefdbbe29deef8414","_content_type_uid":"dr_module_article_promo"},{"uid":"blt2a13fe94a98405cd","_content_type_uid":"dr_module_article_promo"},{"uid":"blt801b94c10208828e","_content_type_uid":"dr_module_latest_content"}]},"over_the_edge":[],"secondary_category_name":"Edge Ask the Experts","seo":{"canonical_url":"","meta_description":"A forum for cybersecurity professionals to ask questions and get answers about IT security threats and best practices.","meta_keywords":"","meta_title":"Edge Ask the Experts"},"shown_in_header":true,"slug":"edge-ask-the-experts","sponsor_logo":null,"sponsor_text":"","tags":[],"title":"[Edge] Edge Ask the Experts","topic_page_description":"A forum for cybersecurity professionals to ask questions and get answers about IT security threats and best practices.","updated_at":"2021-07-21T02:55:50.043Z","updated_by":"blt986fc66e34c7b415","_content_type_uid":"dr_category_secondary","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-07-21T02:55:54.234Z","user":"blt986fc66e34c7b415"}},{"_version":12,"locale":"en-us","uid":"blt224b0dfefd4bcafa","ACL":{},"_in_progress":false,"branding":{"hub_page_color":"000000","hub_page_logo":{"_version":1,"is_dir":false,"uid":"blt2bc2d9dd689b0def","ACL":{},"content_type":"image/png","created_at":"2021-06-07T21:43:29.490Z","created_by":"bltfcb3d125bf8c49ee","file_size":"4813","filename":"TheEdge-Logo.png","tags":[],"title":"TheEdge-Logo.png","updated_at":"2021-06-07T21:43:29.490Z","updated_by":"bltfcb3d125bf8c49ee","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-07-15T11:49:43.071Z","user":"blt986fc66e34c7b415"},"url":"https://eu-images.contentstack.com/v3/assets/blt66983808af36a8ef/blt2bc2d9dd689b0def/60be930173c30c216ca2a004/TheEdge-Logo.png"},"image_alt_text":"","hub_page_description_with_hyperlink":""},"created_at":"2021-05-29T07:25:38.968Z","created_by":"blt9a0fc67c46c47dd7","display_options":"Standard View","icon":null,"image_alt_text":"","modules":{"module_blocks":[]},"over_the_edge":[],"secondary_category_name":"Edge Slideshows","seo":{"canonical_url":"","meta_description":"Images, illustrations, and graphics describing emerging cybersecurity threats and best practices.","meta_keywords":"","meta_title":"Edge Slideshows | Dark Reading"},"shown_in_header":true,"slug":"edge-slideshows","sponsor_logo":null,"sponsor_text":"Brought to you by","tags":[],"title":"[Edge] Edge Slideshows","topic_page_description":"Images, illustrations, and graphics describing emerging cybersecurity threats and best practices.","updated_at":"2022-03-24T17:23:46.177Z","updated_by":"blt9488f204761710b3","_content_type_uid":"dr_category_secondary","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2022-03-24T17:23:56.621Z","user":"blt9488f204761710b3"}},{"_version":16,"locale":"en-us","uid":"bltcda9b1fc00b570f2","ACL":{},"_in_progress":false,"branding":{"hub_page_color":"000000","hub_page_logo":null,"hub_page_description_with_hyperlink":"","image_alt_text":""},"created_at":"2021-05-29T07:25:51.768Z","created_by":"blt9a0fc67c46c47dd7","display_options":"Standard View","icon":null,"image_alt_text":"","modules":{"module_blocks":[]},"over_the_edge":[],"secondary_category_name":"Edge Threat Monitor","seo":{"canonical_url":"","meta_description":"Graphic data and analysis of emerging cybersecurity attacks, threats, and trends.","meta_keywords":"","meta_title":"Edge Threat Monitor"},"shown_in_header":true,"slug":"edge-threat-monitor","sponsor_logo":null,"sponsor_text":"Brought to you by","tags":[],"title":"[Edge] Edge Threat Monitor","topic_page_description":"Graphic data and analysis of emerging cybersecurity attacks, threats, and trends.","updated_at":"2022-03-24T17:19:59.274Z","updated_by":"blt9488f204761710b3","_content_type_uid":"dr_category_secondary","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2022-03-24T17:20:08.918Z","user":"blt9488f204761710b3"}}],"seo":{"canonical_url":"","meta_description":"In-Depth feature articles, analysis, and expert expert commentary on cybersecurity trends and best practices","meta_keywords":"","meta_title":"Edge"},"slug":"edge","sponsor_logo":null,"sponsor_text":"","tags":[],"title":"Edge","topic_page_description":"In-Depth feature articles, analysis, and expert commentary on cybersecurity trends and best practices.","updated_at":"2022-02-25T15:46:20.858Z","updated_by":"blt31bd4bcd14669cc0","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2022-02-25T15:46:31.216Z","user":"blt31bd4bcd14669cc0"}},{"_version":9,"locale":"en-us","uid":"blt318dca99b92ea6b7","ACL":{},"_in_progress":false,"branding":{"hub_page_color":"000000","hub_page_description_with_hyperlink":"","hub_page_logo":null,"image_alt_text":""},"created_at":"2021-05-29T07:25:13.674Z","created_by":"blt9a0fc67c46c47dd7","display_options":"Standard View","icon":null,"image_alt_text":"","modules":{"module_blocks":[]},"over_the_edge":[],"secondary_categories":[],"seo":{"canonical_url":"","meta_description":"Breaking news, news analysis, and expert commentary on cybersecurity threats to the cloud as well as coverage of cloud security tools \u0026 technologiesBreaking new","meta_keywords":"","meta_title":"Cloud"},"slug":"cloud","sponsor_logo":null,"sponsor_text":"","tags":[],"title":"Cloud","topic_page_description":"Breaking news, news analysis, and expert commentary on cybersecurity threats to the cloud as well as security tools \u0026 technologies to protect it.","updated_at":"2022-02-25T15:40:37.460Z","updated_by":"blt31bd4bcd14669cc0","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2022-02-25T15:40:48.099Z","user":"blt31bd4bcd14669cc0"}},{"_version":6,"locale":"en-us","uid":"blta1a9507fc4e576e5","ACL":{},"_in_progress":false,"branding":{"hub_page_color":"000000","hub_page_description_with_hyperlink":"","hub_page_logo":null,"image_alt_text":""},"created_at":"2021-05-29T07:25:14.614Z","created_by":"blt9a0fc67c46c47dd7","display_options":"Standard View","icon":null,"image_alt_text":"","modules":{"module_blocks":[]},"over_the_edge":[],"secondary_categories":[],"seo":{"canonical_url":"","meta_description":"Breaking news, news analysis, and expert commentary on cyberattacks and data breaches, as well as tools, technologies, and practices for threat defense","meta_keywords":"","meta_title":"Attacks / Breaches"},"slug":"attacks-breaches","sponsor_logo":null,"sponsor_text":"","tags":[],"title":"Attacks/Breaches","topic_page_description":"Breaking news, news analysis, and expert commentary on cyberattacks and data breaches, as well as the tools, technologies, and practices for defense.","updated_at":"2022-02-25T15:33:04.411Z","updated_by":"bltfcb3d125bf8c49ee","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2022-02-25T15:33:11.389Z","user":"bltfcb3d125bf8c49ee"}},{"_version":4,"locale":"en-us","uid":"bltf294cb1507e8f8f0","ACL":{},"_in_progress":false,"branding":{"hub_page_color":"000000","hub_page_description_with_hyperlink":"","hub_page_logo":null,"image_alt_text":""},"created_at":"2021-05-29T07:25:23.818Z","created_by":"blt9a0fc67c46c47dd7","display_options":"Standard View","icon":null,"image_alt_text":"","modules":{"module_blocks":[]},"over_the_edge":[],"secondary_categories":[],"seo":{"canonical_url":"","meta_description":"Breaking news, news analysis, and expert commentary on cyber threats to mobile devices and the tools \u0026 technologies to protect them.","meta_keywords":"","meta_title":"Mobile"},"slug":"mobile","sponsor_logo":null,"sponsor_text":"","tags":[],"title":"Mobile","topic_page_description":"Breaking news, news analysis, and expert commentary on cyber threats to mobile devices and the tools \u0026 technologies to protect them.","updated_at":"2022-02-23T16:40:39.389Z","updated_by":"bltfcb3d125bf8c49ee","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2022-02-23T16:40:47.486Z","user":"bltfcb3d125bf8c49ee"}},{"_version":23,"locale":"en-us","uid":"blt2ad9c5595f143d37","ACL":{},"_in_progress":false,"branding":{"hub_page_color":"000000","hub_page_description_with_hyperlink":"","hub_page_logo":null,"image_alt_text":""},"created_at":"2021-05-29T07:25:16.736Z","created_by":"blt9a0fc67c46c47dd7","display_options":"Standard View","icon":null,"image_alt_text":"","modules":{"module_blocks":[]},"over_the_edge":[],"secondary_categories":[],"seo":{"canonical_url":"","meta_description":"Breaking news, news analysis, and expert commentary on cybersecurity threats to Internet of Things (IoT) devices, and the tools \u0026 technologies to protect them","meta_keywords":"","meta_title":"IoT"},"slug":"iot","sponsor_logo":null,"sponsor_text":"","tags":[],"title":"IoT","topic_page_description":"Breaking news, news analysis, and expert commentary on cyber threats to Internet of Things (IoT) devices and the tools \u0026 technologies to protect them.","updated_at":"2022-02-23T16:38:34.620Z","updated_by":"bltfcb3d125bf8c49ee","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2022-02-23T16:38:40.328Z","user":"bltfcb3d125bf8c49ee"}},{"_version":4,"locale":"en-us","uid":"blt88fe329e8d35e99f","ACL":{},"_in_progress":false,"branding":{"hub_page_color":"000000","hub_page_description_with_hyperlink":"","hub_page_logo":null,"image_alt_text":""},"created_at":"2021-05-29T07:25:20.552Z","created_by":"blt9a0fc67c46c47dd7","display_options":"Standard View","icon":null,"image_alt_text":"","modules":{"module_blocks":[]},"over_the_edge":[],"secondary_categories":[{"_version":2,"locale":"en-us","uid":"blt038394f2fc302955","ACL":{},"_in_progress":false,"branding":{"hub_page_color":"","hub_page_description":"","hub_page_logo":null},"created_at":"2021-05-29T07:25:41.005Z","created_by":"blt9a0fc67c46c47dd7","display_options":"Standard View","icon":null,"modules":{"module_blocks":[]},"over_the_edge":[],"secondary_category_name":"Authentication","seo":{"canonical_url":"","meta_description":"Authentication","meta_keywords":"","meta_title":"Authentication"},"shown_in_header":true,"slug":"authentication","sponsor_logo":null,"sponsor_text":"","tags":[],"title":"[Endpoint] Authentication","topic_page_description":"","updated_at":"2021-07-15T08:43:26.396Z","updated_by":"blt986fc66e34c7b415","_content_type_uid":"dr_category_secondary","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-07-20T11:44:33.457Z","user":"blta3dd47a38c602549"}},{"_version":2,"locale":"en-us","uid":"blt9f22a744d7b136d6","ACL":{},"_in_progress":false,"branding":{"hub_page_color":"","hub_page_description":"","hub_page_logo":null},"created_at":"2021-05-29T07:25:44.029Z","created_by":"blt9a0fc67c46c47dd7","display_options":"Standard View","icon":null,"modules":{"module_blocks":[]},"over_the_edge":[],"secondary_category_name":"Privacy","seo":{"canonical_url":"","meta_description":"Privacy","meta_keywords":"","meta_title":"Privacy"},"shown_in_header":true,"slug":"privacy","sponsor_logo":null,"sponsor_text":"","tags":[],"title":"[Endpoint] Privacy","topic_page_description":"","updated_at":"2021-07-16T11:18:55.988Z","updated_by":"blta3dd47a38c602549","_content_type_uid":"dr_category_secondary","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-07-20T11:44:57.811Z","user":"blta3dd47a38c602549"}}],"seo":{"canonical_url":"","meta_description":"Breaking news, news analysis, and expert commentary on endpoint security, including tools \u0026 technologies","meta_keywords":"","meta_title":"Endpoint"},"slug":"endpoint","sponsor_logo":null,"sponsor_text":"","tags":[],"title":"Endpoint","topic_page_description":"Breaking news, news analysis, and expert commentary on endpoint security, including tools \u0026 technologies.","updated_at":"2022-02-23T16:36:06.407Z","updated_by":"bltfcb3d125bf8c49ee","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2022-02-23T16:36:30.291Z","user":"bltfcb3d125bf8c49ee"}},{"_version":4,"locale":"en-us","uid":"bltd3cfe11c117abf74","ACL":{},"_in_progress":false,"branding":{"hub_page_logo":null,"image_alt_text":"","hub_page_description_with_hyperlink":"","hub_page_color":""},"created_at":"2022-01-31T10:12:03.498Z","created_by":"bltfcb3d125bf8c49ee","display_options":"Standard View","icon":null,"image_alt_text":"","modules":{"module_blocks":[]},"over_the_edge":[],"secondary_categories":[],"seo":{"meta_title":"","meta_description":"Breaking news, news analysis, and expert commentary on cyber threats targeting remote users and their devices, and the tools \u0026 technologies to protect them.","meta_keywords":"","canonical_url":""},"slug":"remote-workforce","sponsor_logo":null,"sponsor_text":"","tags":[],"title":"Remote Workforce","topic_page_description":"Breaking news, news analysis, and expert commentary on cybersecurity threats that target remote users and their devices and the tools \u0026 technologies to protect them.","updated_at":"2022-02-23T15:58:45.216Z","updated_by":"bltfcb3d125bf8c49ee","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2022-02-23T15:58:50.081Z","user":"bltfcb3d125bf8c49ee"},"_owner":{"uid":"bltfcb3d125bf8c49ee","created_at":"2021-05-21T10:05:50.071Z","updated_at":"2022-09-12T09:17:24.922Z","email":"edward.canavan@informa.com","username":"edward_blt00302c2c","first_name":"edward","last_name":"canavan","org_uid":[],"shared_org_uid":["blt5948195ac13977b0"],"mobile_number":"07916365746","country_code":"44","tfa_status":"verified","authy_id":"374943478","active":true,"profile_type":"business","failed_attempts":0,"settings":{"preferences":{"global":[],"stack":[{"api_key":"blt66983808af36a8ef","key":"dashboard","value":{"recently_modified_assets":{"order":0,"visibility":"show"},"recently_modified_entries":{"order":1,"visibility":"show"},"prod_update":{"order":2,"visibility":"hide"},"doc_search":{"order":3,"visibility":"show"},"did_you_know":{"order":4,"visibility":"show"}}}]}},"last_login_at":"2022-09-12T09:17:24.921Z"}},{"_version":4,"locale":"en-us","uid":"bltd1eb4d6946b90153","ACL":{},"_in_progress":false,"branding":{"hub_page_color":"000000","hub_page_description_with_hyperlink":"","hub_page_logo":null,"image_alt_text":""},"created_at":"2021-05-29T07:25:27.087Z","created_by":"blt9a0fc67c46c47dd7","display_options":"Standard View","icon":null,"image_alt_text":"","modules":{"module_blocks":[]},"over_the_edge":[],"secondary_categories":[],"seo":{"canonical_url":"","meta_description":"Breaking news, news analysis and expert commentary on cybersecurity careers and industry leaders","meta_keywords":"","meta_title":"Careers \u0026 People"},"slug":"careers-and-people","sponsor_logo":null,"sponsor_text":"","tags":[],"title":"Careers \u0026 People","topic_page_description":"Breaking news, news analysis, and expert commentary on cybersecurity careers and industry leaders.","updated_at":"2022-02-23T15:53:43.785Z","updated_by":"bltfcb3d125bf8c49ee","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2022-02-23T15:54:44.662Z","user":"bltfcb3d125bf8c49ee"}},{"_version":4,"locale":"en-us","uid":"blt153276da84f3050e","ACL":{},"_in_progress":false,"branding":{"hub_page_color":"000000","hub_page_description_with_hyperlink":"","hub_page_logo":null,"image_alt_text":""},"created_at":"2021-05-29T07:25:24.935Z","created_by":"blt9a0fc67c46c47dd7","display_options":"Standard View","icon":null,"image_alt_text":"","modules":{"module_blocks":[]},"over_the_edge":[],"secondary_categories":[{"title":"[App-Sec] Database Security","secondary_category_name":"Database Security","slug":"database-security","shown_in_header":true,"tags":[],"locale":"en-us","ACL":{},"uid":"blt185c79bc5185685f","created_by":"blt9a0fc67c46c47dd7","updated_by":"blta3dd47a38c602549","created_at":"2021-05-29T07:25:42.038Z","updated_at":"2021-07-16T11:21:34.290Z","_content_type_uid":"dr_category_secondary","_version":2,"_in_progress":false,"branding":{"hub_page_color":"","hub_page_description":"","hub_page_logo":null},"display_options":"Standard View","icon":null,"modules":{"module_blocks":[]},"over_the_edge":[],"seo":{"canonical_url":"","meta_description":"Database Security","meta_keywords":"","meta_title":"Database Security"},"sponsor_logo":null,"sponsor_text":"","topic_page_description":"","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-07-20T11:41:13.664Z","user":"blta3dd47a38c602549"}}],"seo":{"canonical_url":"","meta_description":"Breaking news, news analysis, and expert commentary on application security, including tools \u0026 technologies","meta_keywords":"","meta_title":"Application Security"},"slug":"application-security","sponsor_logo":null,"sponsor_text":"","tags":[],"title":"Application Security","topic_page_description":"Breaking news, news analysis, and expert commentary on application security, including tools \u0026 technologies.","updated_at":"2022-02-23T15:22:10.587Z","updated_by":"bltfcb3d125bf8c49ee","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2022-02-23T15:22:20.056Z","user":"bltfcb3d125bf8c49ee"}},{"_version":7,"locale":"en-us","uid":"bltf8dd78a4e0baf1e3","ACL":{},"_in_progress":false,"branding":{"hub_page_color":"000000","hub_page_description_with_hyperlink":"\u003cp\u003e\u003c/p\u003e\n\u003cp\u003e\u003cbr\u003e\u003c/p\u003e\n\u003cp\u003e\u003c/p\u003e","hub_page_logo":null,"image_alt_text":""},"created_at":"2021-05-29T07:25:12.643Z","created_by":"blt9a0fc67c46c47dd7","display_options":"Standard View","icon":null,"image_alt_text":"","modules":{"module_blocks":[]},"over_the_edge":[],"secondary_categories":[{"_version":6,"locale":"en-us","uid":"blt510176d85efe2f04","ACL":{},"_in_progress":false,"branding":{"hub_page_color":"","hub_page_description":"","hub_page_logo":null},"created_at":"2021-05-29T07:25:39.882Z","created_by":"blt9a0fc67c46c47dd7","display_options":"Standard View","icon":null,"modules":{"module_blocks":[]},"over_the_edge":[],"secondary_category_name":"Security Monitoring","seo":{"canonical_url":"","meta_description":"Security Monitoring","meta_keywords":"","meta_title":"Security Monitoring"},"shown_in_header":true,"slug":"security-monitoring","sponsor_logo":null,"sponsor_text":"Sponsor Text","tags":[],"title":"[Analytics] Security Monitoring","topic_page_description":"","updated_at":"2021-07-20T11:46:58.515Z","updated_by":"blta3dd47a38c602549","_content_type_uid":"dr_category_secondary","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-07-20T11:47:01.191Z","user":"blta3dd47a38c602549"}}],"seo":{"canonical_url":"","meta_description":"Breaking news, news analysis, and expert commentary about cybersecurity data analytics, including tools \u0026 technologies","meta_keywords":"analytics,data analytics,security,cybersecurity","meta_title":"Breaking news, news analysis, commentary on security data analytics."},"slug":"analytics","sponsor_logo":null,"sponsor_text":"","tags":[],"title":"Analytics","topic_page_description":"Breaking news, news analysis, and expert commentary about cybersecurity data analytics, including tools \u0026 technologies.","updated_at":"2022-02-23T15:17:04.315Z","updated_by":"bltfcb3d125bf8c49ee","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2022-02-23T15:17:13.080Z","user":"bltfcb3d125bf8c49ee"}},{"_version":26,"locale":"en-us","uid":"blt47ebc4f3a45cfe48","ACL":{},"_in_progress":false,"branding":{"hub_page_color":"000000","image_alt_text":"Omdia Logo","hub_page_description_with_hyperlink":"\u003cp\u003eEnterprise cybersecurity technology\u003c/p\u003e\n\u003cp\u003eresearch that connects the dots \u003cstrong\u003e|\u003c/strong\u003e\u0026nbsp;\u003ca href=\"https://omdia.tech.informa.com/\" target=\"_blank\"\u003eLearn more\u003c/a\u003e\u003c/p\u003e","hub_page_logo":{"uid":"blt41661bfd68149993","created_by":"blt986fc66e34c7b415","updated_by":"blt986fc66e34c7b415","created_at":"2021-09-23T02:34:37.142Z","updated_at":"2021-09-23T02:34:37.142Z","content_type":"image/png","file_size":"9803","filename":"Vector.png","title":"Vector.png","ACL":[],"_version":1,"is_dir":false,"tags":[],"publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-10-25T13:38:23.525Z","user":"blt9488f204761710b3"},"url":"https://eu-images.contentstack.com/v3/assets/blt66983808af36a8ef/blt41661bfd68149993/614be7bd6db99f25817e6c21/Vector.png"}},"created_at":"2021-06-16T21:12:18.733Z","created_by":"blt9488f204761710b3","display_options":"Modular View","icon":null,"image_alt_text":"","modules":{"module_blocks":[{"uid":"blt7ef981a3c49f83e4","_content_type_uid":"dr_module_article_promo"},{"uid":"blt06b0e4fcb74a2904","_content_type_uid":"dr_module_jobs"},{"uid":"bltf0145cf743710573","_content_type_uid":"dr_module_latest_content_grid"},{"uid":"blt74c7a7dbe5919173","_content_type_uid":"dr_module_article_promo"},{"uid":"bltb08e2126c3aea60b","_content_type_uid":"dr_modular_external_link"}]},"over_the_edge":[],"secondary_categories":[],"seo":{"canonical_url":"","meta_description":"","meta_keywords":"","meta_title":""},"slug":"omdia","sponsor_logo":null,"sponsor_text":"","tags":[],"title":"Omdia","topic_page_description":"","updated_at":"2021-12-15T21:17:16.402Z","updated_by":"bltb9dc8193e565cad1","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-12-15T21:17:26.312Z","user":"bltb9dc8193e565cad1"},"_owner":{"uid":"blt9488f204761710b3","created_at":"2021-05-21T10:05:50.071Z","updated_at":"2022-10-03T11:50:11.193Z","email":"roma.nowak@informa.com","username":"roma_blt4d352a9b","first_name":"roma","last_name":"nowak","org_uid":[],"shared_org_uid":["blt5948195ac13977b0"],"mobile_number":"5167901481","country_code":"1","tfa_status":"verified","authy_id":"375656345","active":true,"profile_type":"business","failed_attempts":0,"settings":{"global":[{"key":"favorite_stacks","value":[{"org_uid":"blt5948195ac13977b0","stacks":[{"api_key":"bltbbbdd615c0ee9096"},{"api_key":"blt95b381df7c12c15d"},{"api_key":"blt66983808af36a8ef"}]}]}]},"last_login_at":"2022-10-03T11:50:11.193Z"}}],"smartbox":[{"feed":{"href":"https://smartbox.techweb.com/smartbox/externalsmartbox?site_id=162801002\u0026taxonomy_ids=\u0026num_display=5\u0026article_type=upcoming_webinars\u0026output_type=xml","title":"Webinars","__typename":"Link"},"read_more_link":{"href":"https://www.darkreading.com/upcoming-webinars","title":"More Webinars","__typename":"Link"},"title":"Webinars","type":"Webinars","system":{"publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2022-08-23T19:57:57.348Z","user":"blt9488f204761710b3","__typename":"SystemPublishDetails"},"uid":"blt8f82585c522cc0f5","__typename":"EntrySystemField"},"hidden":false,"ordinal":1,"__typename":"DrSmartbox","articles":[{"title":["Using Zero Trust to Protect Remote and Home Workers"],"link":["https://webinar.darkreading.com/1316745?keycode=sbx\u0026cid=smartbox_techweb_upcoming_webinars_8.500001216\u0026_mc=smartbox_techweb_upcoming_webinars_8.500001216"],"publishDate":["Sep 14, 2022"],"publishedSite":[""],"eventDate":["Oct 06, 2022"],"publishedSiteURL":[""],"description":["When COVID-19 hit, many organizations attempted to implement Zero Trust environments to protect their data from online threats presented by unsecured home office equipment. But these efforts were often temporary and not particularly effective. In this webinar, experts offer a more permanent, more effective strategy for using Zero Trust to secure remote and hybrid workers and protect critical data from unauthorized access."]},{"title":["Strategies for DDoS Resilience and Response"],"link":["https://webinar.darkreading.com/1781964?keycode=sbx\u0026cid=smartbox_techweb_upcoming_webinars_8.500001218\u0026_mc=smartbox_techweb_upcoming_webinars_8.500001218"],"publishDate":["Sep 15, 2022"],"publishedSite":[""],"eventDate":["Oct 18, 2022"],"publishedSiteURL":[""],"description":["There are few things more disruptive than a distributed denial-of-service (DDoS) attack. The criminals behind these attacks have one objective: to bring everything to a stop so you can't conduct business as usual. How can you ensure business continuity during these events? What is your plan for communicating with essential stakeholders if services are down? Who should you contact outside of your organization for help? Are your backup and recovery plans in place and ready to go in the event of an attack? In this webinar, learn what processes and procedures should go into your DDoS response playbook, and learn about the tools and techniques that will help you bounce back from a DDoS without any major impact to productivity."]},{"title":["Next-Gen Security Operations: Building the SOC of the Future"],"link":["https://webinar.darkreading.com/1341545?keycode=sbx\u0026cid=smartbox_techweb_upcoming_webinars_8.500001219\u0026_mc=smartbox_techweb_upcoming_webinars_8.500001219"],"publishDate":["Sep 15, 2022"],"publishedSite":[""],"eventDate":["Oct 19, 2022"],"publishedSiteURL":[""],"description":["What does a security operations center (SOCs) require in 2022? The practice of monitoring and responding to threats looks very different today than it did just a few years ago. Which tools and skills do you need know to outfit a SOC to respond to today's most current threats and online exploits? In this webinar, experts offer insight and recommendations on how to build a next-generation SOC."]},{"title":["Hacks That Bypass Multi-Factor Authentication and How to Make Your MFA Solution Phishing Resistant"],"link":["https://webinar.darkreading.com/1835400?keycode=sbx\u0026cid=smartbox_techweb_upcoming_webinars_8.500001220\u0026_mc=smartbox_techweb_upcoming_webinars_8.500001220"],"publishDate":["Sep 21, 2022"],"publishedSite":[""],"eventDate":["Oct 25, 2022"],"publishedSiteURL":[""],"description":["The average person believes using Multi-Factor Authentication (MFA) makes them significantly less likely to be hacked. That is simply not true! Hackers can bypass 90-95% of MFA solutions much easier than you would think. Using a regular looking phishing email, they can bypass MFA just as easily as if it were a simple password.\r\n\r\nJoin Roger A. Grimes, KnowBe4's Data-Driven Defense Evangelist for this new webinar to learn common MFA hacking techniques and what it takes to make your MFA phishing resistant. He'll also share a pre-filmed MFA hacking demo from Kevin Mitnick, KnowBe4's Chief Hacking Officer. Get the information you need to know now to better defend your network."]},{"title":["Threat Hunting Today: The Tools and Techniques That Get You Out in Front of Criminals"],"link":["https://darkreading.tradepub.com/c/pubRD.mpl?secure=1\u0026sr=pp\u0026_t=pp:\u0026qf=w_defa3231\u0026ch=sbx\u0026cid=smartbox_techweb_upcoming_webinars_8.500001221\u0026_mc=smartbox_techweb_upcoming_webinars_8.500001221"],"publishDate":["Sep 27, 2022"],"publishedSite":[""],"eventDate":["Oct 26, 2022"],"publishedSiteURL":[""],"description":["Proactive \"threat hunting\" is becoming a more common practice for organizations who know it is no longer enough to detect threats and defend against them. Security teams are increasingly taking a more proactive approach--seeking out potential threats using analytical tools. How do these enterprises build threat hunting programs? How do they staff them, and what tools do they need? In this Dark Reading webinar, a top expert discusses the process for building a threat hunting program, and for optimizing the efforts of designated threat hunters in the organization.\r\n\r\nAttend this webinar and you'll: \r\n-Get the fundamentals of a good threat hunting program\r\n-Learn tips and techniques for better threat hunting\r\n-Find out how the top organizations handle threat intelligence gathering and reporting\r\n-Gather resources to help start your own threat hunting program"]}]},{"feed":{"href":"https://smartbox.techweb.com/smartbox/externalsmartbox?site_id=162801002\u0026taxonomy_ids=\u0026num_display=\u0026article_type=whitepaper\u0026output_type=xml","title":"White Papers","__typename":"Link"},"read_more_link":{"href":"https://www.informationweek.com/whitepaper/Security","title":"More White Papers","__typename":"Link"},"title":"White Papers","type":"Whitepapers","system":{"publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2022-09-02T13:14:06.993Z","user":"blt9488f204761710b3","__typename":"SystemPublishDetails"},"uid":"blt1192837947494c5f","__typename":"EntrySystemField"},"hidden":false,"ordinal":3,"__typename":"DrSmartbox","articles":[{"title":["State of Email Security"],"link":["https://www.informationweek.com/whitepaper/cybersecurity/security/state-of-email-security/442233?keycode=sbx\u0026cid=smartbox_techweb_whitepaper_14.500005228\u0026_mc=smartbox_techweb_whitepaper_14.500005228"],"publishedSite":[""],"publishedSiteURL":[""]},{"title":["Ransomware Resilience and Response: The Next-Generation"],"link":["https://www.informationweek.com/whitepaper/cybersecurity/endpoint-security/ransomware-resilience-and-response-the-next-generation/442223?keycode=sbx\u0026cid=smartbox_techweb_whitepaper_14.500005227\u0026_mc=smartbox_techweb_whitepaper_14.500005227"],"publishedSite":[""],"publishedSiteURL":[""]},{"title":["Ransomware in Focus: New Research on CISO Perceptions, Perspectives, and Plans"],"link":["https://www.informationweek.com/whitepaper/cloud-security/risk-management/ransomware-in-focus-new-research-on-ciso-perceptions,-perspectives,-and-plans/438043?keycode=sbx\u0026cid=smartbox_techweb_whitepaper_14.500005206\u0026_mc=smartbox_techweb_whitepaper_14.500005206"],"publishedSite":[""],"publishedSiteURL":[""]},{"title":["IDC: The Critical Nature of Cloud Incident Readiness and Response"],"link":["https://www.informationweek.com/whitepaper/cloud-security/cybersecurity/idc-the-critical-nature-of-cloud-incident-readiness-and-response/437693?keycode=sbx\u0026cid=smartbox_techweb_whitepaper_14.500005193\u0026_mc=smartbox_techweb_whitepaper_14.500005193"],"publishedSite":[""],"publishedSiteURL":[""]},{"title":["Unit 42 Retainer"],"link":["https://www.informationweek.com/whitepaper/risk-management-security/cybersecurity/unit-42-retainer/437683?keycode=sbx\u0026cid=smartbox_techweb_whitepaper_14.500005192\u0026_mc=smartbox_techweb_whitepaper_14.500005192"],"publishedSite":[""],"publishedSiteURL":[""]}]},{"feed":{"href":"https://smartbox.techweb.com/smartbox/externalsmartbox?site_id=162801002\u0026taxonomy_ids=\u0026num_display=5\u0026article_type=analytics\u0026output_type=xml","title":"Reports","__typename":"Link"},"read_more_link":{"href":"/must-reads","title":"More Reports","__typename":"Link"},"title":"Reports","type":"Reports","system":{"publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2022-09-02T13:14:06.971Z","user":"blt9488f204761710b3","__typename":"SystemPublishDetails"},"uid":"blt5145c70334f61d02","__typename":"EntrySystemField"},"hidden":false,"ordinal":1,"__typename":"DrSmartbox","articles":[{"title":["How Machine Learning, AI \u0026 Deep Learning Improve Cybersecurity"],"link":["https://www.informationweek.com/whitepaper/cybersecurity/cloud-security/how-machine-learning,-ai-and-deep-learning-improve-cybersecurity/442433?keycode=sbx\u0026cid=smartbox_techweb_analytics_7.300005958\u0026_mc=smartbox_techweb_analytics_7.300005958"],"publishedSite":[""],"publishedSiteURL":[""]},{"title":["Breaches Prompt Changes to Enterprise IR Plans and Processes"],"link":["https://www.informationweek.com/whitepaper/security-monitoring/cloud-security/breaches-prompt-changes-to-enterprise-ir-plans-and-processes/439583?cid=smartbox_techweb_analytics_7.300005941\u0026_mc=smartbox_techweb_analytics_7.300005941"],"publishedSite":[""],"publishedSiteURL":[""]},{"title":["6 Elements of a Solid IoT Security Strategy"],"link":["https://www.informationweek.com/whitepaper/endpoint-security/network-and-perimeter-security/6-elements-of-a-solid-iot-security-strategy/439873?cid=smartbox_techweb_analytics_7.300005939\u0026_mc=smartbox_techweb_analytics_7.300005939"],"publishedSite":[""],"publishedSiteURL":[""]},{"title":["Incorporating a Prevention Mindset into Threat Detection and Response"],"link":["https://www.informationweek.com/whitepaper/network-and-perimeter-security/networking/incorporating-a-prevention-mindset-into-threat-detection-and-response/439373?cid=smartbox_techweb_analytics_7.300005934\u0026_mc=smartbox_techweb_analytics_7.300005934"],"publishedSite":[""],"publishedSiteURL":[""]},{"title":["Practical Network Security Approaches for a Multicloud, Hybrid IT World"],"link":["https://www.informationweek.com/whitepaper/cloud-security/network-and-perimeter-security/practical-network-security-approaches-for-a-multicloud,-hybrid-it-world/438913?cid=smartbox_techweb_analytics_7.300005932\u0026_mc=smartbox_techweb_analytics_7.300005932"],"publishedSite":[""],"publishedSiteURL":[""],"description":["The report covers areas enterprises should focus on for their multicloud/hybrid cloud security strategy:\r\n-increase visibility over the environment\r\n-learning cloud-specific skills\r\n-relying on established security frameworks\r\n-re-architecting the network\r\n"]}]},{"feed":{"href":"https://smartbox.techweb.com/smartbox/externalsmartbox?site_id=162801002\u0026taxonomy_ids=\u0026num_display=3\u0026article_type=session\u0026output_type=xml","title":"Events","__typename":"Link"},"read_more_link":{"href":"https://www.darkreading.com/upcoming-events","title":"More Events","__typename":"Link"},"title":"Events","type":"Live Events","system":{"publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-10-19T13:23:56.785Z","user":"blt9488f204761710b3","__typename":"SystemPublishDetails"},"uid":"blt8b6a33909c49602f","__typename":"EntrySystemField"},"hidden":false,"ordinal":2,"__typename":"DrSmartbox","articles":[{"title":["Understanding Cyber Attackers - A Dark Reading Nov 17 Event"],"link":["https://vts.informaengage.com/dark-reading-understanding-cyber-attackers-and-their-methods/?kcode=sbx\u0026cid=smartbox_techweb_session_16.500277\u0026_mc=smartbox_techweb_session_16.500277"],"publishDate":["Nov 17, 2022"],"publishedSite":[""],"publishedSiteURL":[""],"description":["Every day, your enterprise is at risk of being hacked. But just who are the cyber attackers, and what are their motivations? What methods might they use to crack enterprise data, and how do they stage their attacks? Do you know which attacks are most likely to be used against an organization like yours, and which attackers are most likely to target you?\r\n\r\nThese are just some of the questions that will be explored and answered at Dark Reading's free virtual event on November 17, set to offer insight, advice, and best practices for stopping the current wave of online attackers - and the exploits they use to target enterprises."]},{"title":["Black Hat Europe - December 5-8 - Learn More"],"link":["https://www.blackhat.com/eu-22/?cid=smartbox_techweb_session_16.500275\u0026_mc=smartbox_techweb_session_16.500275"],"publishDate":["Dec 05, 2022"],"publishedSite":[""],"publishedSiteURL":[""]},{"title":["Black Hat Middle East \u0026 Africa - November 15-17 - Learn More"],"link":["https://blackhatmea.com/?cid=smartbox_techweb_session_16.500274\u0026_mc=smartbox_techweb_session_16.500274"],"publishDate":["Nov 15, 2022"],"publishedSite":[""],"publishedSiteURL":[""]}]},{"feed":{"href":"https://smartbox.techweb.com/smartbox/externalsmartbox?site_id=162801002\u0026taxonomy_ids=\u0026num_display=3\u0026article_type=session\u0026output_type=xml","title":"Thao tests smartbox","__typename":"Link"},"read_more_link":{"href":"https://finance.vietstock.vn/TDC-ctcp-kinh-doanh-va-phat-trien-binh-duong.htm","title":"Read more","__typename":"Link"},"title":"Thao test smartbox","type":"Webinars","system":{"publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2021-10-13T09:32:03.167Z","user":"blta36fe02d0bc9c8a3","__typename":"SystemPublishDetails"},"uid":"blt378d3b273bbe06e9","__typename":"EntrySystemField"},"hidden":false,"ordinal":1,"__typename":"DrSmartbox","articles":[{"title":["Understanding Cyber Attackers - A Dark Reading Nov 17 Event"],"link":["https://vts.informaengage.com/dark-reading-understanding-cyber-attackers-and-their-methods/?kcode=sbx\u0026cid=smartbox_techweb_session_16.500277\u0026_mc=smartbox_techweb_session_16.500277"],"publishDate":["Nov 17, 2022"],"publishedSite":[""],"publishedSiteURL":[""],"description":["Every day, your enterprise is at risk of being hacked. But just who are the cyber attackers, and what are their motivations? What methods might they use to crack enterprise data, and how do they stage their attacks? Do you know which attacks are most likely to be used against an organization like yours, and which attackers are most likely to target you?\r\n\r\nThese are just some of the questions that will be explored and answered at Dark Reading's free virtual event on November 17, set to offer insight, advice, and best practices for stopping the current wave of online attackers - and the exploits they use to target enterprises."]},{"title":["Black Hat Europe - December 5-8 - Learn More"],"link":["https://www.blackhat.com/eu-22/?cid=smartbox_techweb_session_16.500275\u0026_mc=smartbox_techweb_session_16.500275"],"publishDate":["Dec 05, 2022"],"publishedSite":[""],"publishedSiteURL":[""]},{"title":["Black Hat Middle East \u0026 Africa - November 15-17 - Learn More"],"link":["https://blackhatmea.com/?cid=smartbox_techweb_session_16.500274\u0026_mc=smartbox_techweb_session_16.500274"],"publishDate":["Nov 15, 2022"],"publishedSite":[""],"publishedSiteURL":[""]}]}],"articleSettings":{"_version":93,"locale":"en-us","uid":"blt71c2ca1d1bdca542","ACL":{},"_in_progress":false,"article_display_settings":{"article_template":"two-column"},"created_at":"2021-08-03T04:55:12.335Z","created_by":"blt986fc66e34c7b415","modules":{"module_blocks":[]},"right_hand_rail_configuration":{"right_component":[{"uid":"blt9262b8fd3485b1dc","_content_type_uid":"dr_editor_s_choice"},{"uid":"blt8f82585c522cc0f5","_content_type_uid":"dr_smartbox"},{"uid":"blt5145c70334f61d02","_content_type_uid":"dr_smartbox"},{"uid":"blt1192837947494c5f","_content_type_uid":"dr_smartbox"},{"uid":"blt8b6a33909c49602f","_content_type_uid":"dr_smartbox"}]},"subscribe_to_newsletters":{"message":"Keep up with the latest cybersecurity threats, newly-discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.","open_subscribe_link_on_new_tab":true,"subscribe_link":{"title":"Subscribe","href":"https://www.darkreading.com/newsletter-signup/?_mc=dr_eoa"}},"tags":[],"title":"[DR] Settings - Article","updated_at":"2022-06-27T04:52:27.736Z","updated_by":"blt986fc66e34c7b415","publish_details":{"environment":"bltb15a99bc500ea1b8","locale":"en-us","time":"2022-09-02T13:14:07.021Z","user":"blt9488f204761710b3"}}},"adsPattern":"article/risk","sponsoredContentSettings":{"title":"Sponsored Content Settings","sponsored_content_label":"Sponsored","label_background_color":"ffdc2d","label_text_color":"000","__typename":"DrSponsoredContent"},"slideshowItems":[],"tagManagerSlideArticleArgs":{},"isEdgePage":true,"pageAid":99708,"ptype":"article","listModuleData":[],"pageName":"article","keyword":""}},"__N_SSP":true},"page":"/[category]/[hybidPage]","query":{"category":"risk","hybidPage":"google-chrome-polishes-its-first-security-update"},"buildId":"TGotc7nVXUU30O1wT1zea","assetPrefix":"https://beta.darkreading.com","runtimeConfig":{"environment":"dr_production","contentApiUrl":"http://localhost:3000/api"},"isFallback":false,"gssp":true,"scriptLoader":[]}</script><script async="" src="https://securepubads.g.doubleclick.net/tag/js/gpt.js"></script></body></html><script defer src="https://static.cloudflareinsights.com/beacon.min.js/v652eace1692a40cfa3763df669d7439c1639079717194" integrity="sha512-Gi7xpJR8tSkrpF7aordPZQlW2DLtzUlZcumS8dMQjwDHEnw9I7ZLyiOj/6tZStRBGtGgN6ceN6cMH8z7etPGlw==" data-cf-beacon='{"rayId":"754c1df12df9c1e8","token":"af0cdaaec56f4ed087ea8bc39ec08d1b","version":"2022.8.1","si":100}' crossorigin="anonymous"></script>