Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

25 Most Dangerous SW Errors
Memory Buffer issue tops this year's list
FPGAs Do It Faster Than CPUs
Attacks are becoming faster and more efficient
IoT Security: Need to Know
IoT security doesn't match its promises
Dark Reading | Security | Protect The Business - Enable Access
Error 2
Please contact [email protected] if you continue to receive this message.

Dark Reading Home





Security Now
From 2017 to 2020, Security Now was one of the Web's top providers of news and analysis on cybersecurity threats, vulnerabilities, and technology. Today, Security Now is part of Dark Reading, the cybersecurity industry's leading news organization. This page is your entry point to the extensive archive of news articles, commentary, and detailed analysis published by Security Now. We hope you'll take this opportunity to browse the full library of Security Now content, which offers unique reporting and enduring insight on cybersecurity challenges, practices, and solutions. This archive is another step in Dark Reading's ongoing effort to provide the most insightful and comprehensive online resource in the cybersecurity industry.
White Papers
Current Issue
Everything You Need to Know About DNS Attacks
It's important to understand DNS, potential attacks against it, and the tools and techniques required to defend DNS infrastructure. This report answers all the questions you were afraid to ask. Domain Name Service (DNS) is a critical part of any organization's digital infrastructure, but it's also one of the least understood. DNS is designed to be invisible to business professionals, IT stakeholders, and many security professionals, but DNS's threat surface is large and widely targeted. Attackers are causing a great deal of damage with an array of attacks such as denial of service, DNS cache poisoning, DNS hijackin, DNS tunneling, and DNS dangling. They are using DNS infrastructure to take control of inbound and outbound communications and preventing users from accessing the applications they are looking for. To stop attacks on DNS, security teams need to shore up the organization's security hygiene around DNS infrastructure, implement controls such as DNSSEC, and monitor DNS traffic
Back Issues | Must Reads