The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches
Cloud
IoT
Physical Security
Perimeter
Analytics
Security Monitoring
Security Monitoring
App Sec
Database Security
Database Security
Risk
Compliance
Compliance
Threat Intelligence
Endpoint
Authentication
Mobile Security
Privacy
Authentication
Mobile Security
Privacy
Vulnerabilities / Threats
Advanced Threats
Insider Threats
Vulnerability Management
Advanced Threats
Insider Threats
Vulnerability Management
Operations
Identity & Access Management
Careers & People
Identity & Access Management
Careers & People
Remote Workforce
Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
Dark Reading Virtual Event - June 23 - Learn More
Black Hat USA - August 6-11 - Learn More
Webinars
Outsourcing Cybersecurity: A Decision Maker's Guide
Jun 29, 2022
Using Threat Modeling to Improve Enterprise Cyber Defenses
Jun 28, 2022
Resources
Close
Back
Resources
Reports >
Slideshows >
Tech Library >
Webinars >
White Papers >
Subscribe
Login
/
Register
The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches
Cloud
IoT
Physical Security
Perimeter
Analytics
Security Monitoring
Security Monitoring
App Sec
Database Security
Database Security
Risk
Compliance
Compliance
Threat Intelligence
Endpoint
Authentication
Mobile Security
Privacy
Authentication
Mobile Security
Privacy
Vulnerabilities / Threats
Advanced Threats
Insider Threats
Vulnerability Management
Advanced Threats
Insider Threats
Vulnerability Management
Operations
Identity & Access Management
Careers & People
Identity & Access Management
Careers & People
Remote Workforce
Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
Dark Reading Virtual Event - June 23 - Learn More
Black Hat USA - August 6-11 - Learn More
Webinars
Outsourcing Cybersecurity: A Decision Maker's Guide
Jun 29, 2022
Using Threat Modeling to Improve Enterprise Cyber Defenses
Jun 28, 2022
Resources
Close
Back
Resources
Reports >
Slideshows >
Tech Library >
Webinars >
White Papers >
The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches
Cloud
IoT
Physical Security
Perimeter
Analytics
Security Monitoring
Security Monitoring
App Sec
Database Security
Database Security
Risk
Compliance
Compliance
Threat Intelligence
Endpoint
Authentication
Mobile Security
Privacy
Authentication
Mobile Security
Privacy
Vulnerabilities / Threats
Advanced Threats
Insider Threats
Vulnerability Management
Advanced Threats
Insider Threats
Vulnerability Management
Operations
Identity & Access Management
Careers & People
Identity & Access Management
Careers & People
Remote Workforce
Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
Dark Reading Virtual Event - June 23 - Learn More
Black Hat USA - August 6-11 - Learn More
Webinars
Outsourcing Cybersecurity: A Decision Maker's Guide
Jun 29, 2022
Using Threat Modeling to Improve Enterprise Cyber Defenses
Jun 28, 2022
Resources
Close
Back
Resources
Reports >
Slideshows >
Tech Library >
Webinars >
White Papers >
Subscribe
Login
/
Register
SEARCH
A minimum of 3 characters are required to be typed in the search bar in order to perform a search.
Announcements
Event
HOW DATA BREACHES HAPPEN & WHAT TO DO WHEN THEY HAPPEN TO YOU | June 23 Virtual Event | <Get Your Pass>
Previous
Next
Tech News and Analysis
Brought to you by:
Tech Trends
Cybersecurity technology and product news, analysis, expert commentary, and in-depth feature articles.
DBIR Makes a Case for Passwordless
Verizon's "2022 Data Breach Investigations Report" repeatedly makes the point that criminals are stealing credentials to carry out their attacks.
May 24, 2022
Verizon's "2022 Data Breach Investigations Report" repeatedly makes the point that criminals are stealing credentials to carry out their attacks.
by Dark Reading Staff, Dark Reading
May 24, 2022
3 min read
Article
50% of Orgs Rely on Email to Manage Security
Even with dedicated identity management tools at their disposal, many companies — smaller ones especially — are sticking with email and spreadsheets for handling permissions.
May 16, 2022
Even with dedicated identity management tools at their disposal, many companies — smaller ones especially — are sticking with email and spreadsheets for handling permissions.
by Dark Reading Staff, Dark Reading
May 16, 2022
2 min read
Article
Post-Quantum Cryptography Set to Replace RSA, ECC
In the next 10 years, public-key encryption needs to be replaced by post-quantum techniques that can stand up to the new challenges.
May 06, 2022
In the next 10 years, public-key encryption needs to be replaced by post-quantum techniques that can stand up to the new challenges.
by Dark Reading Staff, Dark Reading
May 06, 2022
2 min read
Article
Good News! IAM Is Near-Universal With SaaS
The less-good news: IAM only works for applications your IT department knows about, so watch for "shadow IT" programs installed or written by users that leave a security gap.
April 29, 2022
The less-good news: IAM only works for applications your IT department knows about, so watch for "shadow IT" programs installed or written by users that leave a security gap.
by Dark Reading Staff, Dark Reading
April 29, 2022
2 min read
Article
Many Medical Device Makers Skimp on Security Practices
Barely over a quarter of medical device companies surveyed maintain a software bill-of-materials, and less than half set security requirements at the design stage.
April 22, 2022
Barely over a quarter of medical device companies surveyed maintain a software bill-of-materials, and less than half set security requirements at the design stage.
by Dark Reading Staff, Dark Reading
April 22, 2022
3 min read
Article
Cloud Cost, Reliability Raise IT Concerns
IT professionals worry most about cloud security, but other questions arise about training, functionality, and performance.
April 15, 2022
IT professionals worry most about cloud security, but other questions arise about training, functionality, and performance.
by Dark Reading Staff, Dark Reading
April 15, 2022
2 min read
Article
The XDR Revolution: Threat Detection and Response for All!
In this webinar replay, Omdia outlines the ways in which XDR facilitates faster and easier threat detection and response, and key points organizations should consider when evaluating XDR technology.
April 13, 2022
In this webinar replay, Omdia outlines the ways in which XDR facilitates faster and easier threat detection and response, and key points organizations should consider when evaluating XDR technology.
by Eric Parizo, Principal Analyst, Omdia
April 13, 2022
1 min read
Article
Software-as-a-Service Rules the Cloud
Half of the IT professionals surveyed who use cloud services also employ infrastructure-as-a-service and platform-as-a-service.
April 08, 2022
Half of the IT professionals surveyed who use cloud services also employ infrastructure-as-a-service and platform-as-a-service.
by Dark Reading Staff, Dark Reading
April 08, 2022
2 min read
Article
Low-Code/No-Code Tools Are Popular but Untrusted
While low-code and no-code tools make application development more flexible, they open up security flaws.
March 29, 2022
While low-code and no-code tools make application development more flexible, they open up security flaws.
by Dark Reading Staff, Dark Reading
March 29, 2022
2 min read
Article
Half of Orgs Use Web Application Firewalls to Paper Over Flaws
WAFs remain a popular backfill for complex and fraught patch management.
March 18, 2022
WAFs remain a popular backfill for complex and fraught patch management.
by Dark Reading Staff, Dark Reading
March 18, 2022
2 min read
Article
When IT Spending Plans Don't Reflect Security Priorities
Data shows a disconnect between what decisionmakers consider top endpoint security priorities and how they focus their budget.
March 11, 2022
Data shows a disconnect between what decisionmakers consider top endpoint security priorities and how they focus their budget.
by Dark Reading Staff, Dark Reading
March 11, 2022
2 min read
Article
What Security Controls Do I Need for My Kubernetes Cluster?
This Tech Tip offers some security controls to embed in your organization's CI/CD pipeline to protect Kubernetes clusters and corporate networks.
March 10, 2022
This Tech Tip offers some security controls to embed in your organization's CI/CD pipeline to protect Kubernetes clusters and corporate networks.
by Ratan Tipirneni, President & CEO, Tigera
March 10, 2022
2 min read
Article
Companies Can't Just Train Their Way to More Secure Endpoints
Criminals will keep stealing end-user credentials despite employee awareness, so organizations need high-tech solutions as well.
March 04, 2022
Criminals will keep stealing end-user credentials despite employee awareness, so organizations need high-tech solutions as well.
by Dark Reading Staff, Dark Reading
March 04, 2022
2 min read
Article
Cybersecurity Mesh Architecture: Hope or Hype?
Gartner has touted CSMA as one of the top technology trends for this year. But what is it really?
March 03, 2022
Gartner has touted CSMA as one of the top technology trends for this year. But what is it really?
by Jai Vijayan, Contributing Writer
March 03, 2022
5 min read
Article
Automakers Need to Lock Their Doors Against Ransomware
Issues with patch management and other security practices leave auto manufacturers open to attacks.
February 23, 2022
Issues with patch management and other security practices leave auto manufacturers open to attacks.
by Dark Reading Staff, Dark Reading
February 23, 2022
2 min read
Article