The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches
Cloud
ICS/OT
Remote Workforce
Perimeter
Analytics
Security Monitoring
Security Monitoring
App Sec
Database Security
Database Security
Risk
Compliance
Compliance
Threat Intelligence
Endpoint
Authentication
Mobile Security
Privacy
Authentication
Mobile Security
Privacy
Vulnerabilities / Threats
Advanced Threats
Insider Threats
Vulnerability Management
Advanced Threats
Insider Threats
Vulnerability Management
Operations
Identity & Access Management
Careers & People
Identity & Access Management
Careers & People
Physical Security
IoT
Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
Black Hat USA - August 5-10 - Learn More
Black Hat Asia - May 9-12 - Learn More
Webinars
How Applications Are Attacked: A Year in Application Security
Apr 04, 2023
Managing Identity in the Cloud
Apr 05, 2023
Resources
Close
Back
Resources
Dark Reading Library >
Webinars >
Reports >
Slideshows >
White Papers >
Partner Perspectives: Microsoft
Tech Library >
Newsletter
The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches
Cloud
ICS/OT
Remote Workforce
Perimeter
Analytics
Security Monitoring
Security Monitoring
App Sec
Database Security
Database Security
Risk
Compliance
Compliance
Threat Intelligence
Endpoint
Authentication
Mobile Security
Privacy
Authentication
Mobile Security
Privacy
Vulnerabilities / Threats
Advanced Threats
Insider Threats
Vulnerability Management
Advanced Threats
Insider Threats
Vulnerability Management
Operations
Identity & Access Management
Careers & People
Identity & Access Management
Careers & People
Physical Security
IoT
Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
Black Hat USA - August 5-10 - Learn More
Black Hat Asia - May 9-12 - Learn More
Webinars
How Applications Are Attacked: A Year in Application Security
Apr 04, 2023
Managing Identity in the Cloud
Apr 05, 2023
Resources
Close
Back
Resources
Dark Reading Library >
Webinars >
Reports >
Slideshows >
White Papers >
Partner Perspectives: Microsoft
Tech Library >
The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches
Cloud
ICS/OT
Remote Workforce
Perimeter
Analytics
Security Monitoring
Security Monitoring
App Sec
Database Security
Database Security
Risk
Compliance
Compliance
Threat Intelligence
Endpoint
Authentication
Mobile Security
Privacy
Authentication
Mobile Security
Privacy
Vulnerabilities / Threats
Advanced Threats
Insider Threats
Vulnerability Management
Advanced Threats
Insider Threats
Vulnerability Management
Operations
Identity & Access Management
Careers & People
Identity & Access Management
Careers & People
Physical Security
IoT
Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
Black Hat USA - August 5-10 - Learn More
Black Hat Asia - May 9-12 - Learn More
Webinars
How Applications Are Attacked: A Year in Application Security
Apr 04, 2023
Managing Identity in the Cloud
Apr 05, 2023
Resources
Close
Back
Resources
Dark Reading Library >
Webinars >
Reports >
Slideshows >
White Papers >
Partner Perspectives: Microsoft
Tech Library >
Newsletter
SEARCH
A minimum of 3 characters are required to be typed in the search bar in order to perform a search.
Announcements
Event
How to Launch a Threat Hunting Program | Webinar <REGISTER>
Event
How to Accelerate XDR Outcomes: Bridging the Gap Between Network and Endpoint | Webinar <REGISTER>
Report
Black Hat USA 2022 Attendee Report | Supply Chain & Cloud Security Risks Are Top of Mind | <READ IT NOW>
Previous
Next
Tech News and Analysis
The Cyber Future
Cybersecurity technology and product news, analysis, expert commentary, and in-depth feature articles.
Cybersecurity 'Nutrition' Labels Still a Work in Progress
Pretty much every aspect of the effort to create easy-to-understand labels for Internet of Things (IoT) products is up in the air, according to participants in the process.
November 11, 2022
Pretty much every aspect of the effort to create easy-to-understand labels for Internet of Things (IoT) products is up in the air, according to participants in the process.
by Robert Lemos, Contributing Writer, Dark Reading
November 11, 2022
4 MIN READ
Article
4 Scenarios for the Digital World of 2040
Our digital future depends on the choices we make today. We need to invest in cybersecurity technologies and skills so that humanity can control its future.
September 02, 2022
Our digital future depends on the choices we make today. We need to invest in cybersecurity technologies and skills so that humanity can control its future.
by Laurent Célérier, Executive VP of Technology & Marketing at Orange Cyberdefense
September 02, 2022
4 MIN READ
Article
'No-Party' Data Architectures Promise More Control, Better Security
Consumers gain control of their data while companies build better relationships with their customers — but third-party ad-tech firms will likely continue to stand in the way.
August 26, 2022
Consumers gain control of their data while companies build better relationships with their customers — but third-party ad-tech firms will likely continue to stand in the way.
by Robert Lemos, Contributing Writer, Dark Reading
August 26, 2022
6 MIN READ
Article
Large Language AI Models Have Real Security Benefits
Complex neural networks, including GPT-3, can deliver useful cybersecurity capabilities, such as explaining malware and quickly classifying websites, researchers find.
August 02, 2022
Complex neural networks, including GPT-3, can deliver useful cybersecurity capabilities, such as explaining malware and quickly classifying websites, researchers find.
by Robert Lemos, Contributing Writer, Dark Reading
August 02, 2022
4 MIN READ
Article
The Next Generation of Threat Detection Will Require Both Human and Machine Expertise
To be truly effective, threat detection and response need to combine the strengths of people and technology.
July 14, 2022
To be truly effective, threat detection and response need to combine the strengths of people and technology.
by Kumar Saurabh, CEO and co-founder of LogicHub
July 14, 2022
5 MIN READ
Article
Reinventing How Farming Equipment Is Remotely Controlled and Tracked
Farmers are incorporating high-tech solutions like IoT and drones to address new challenges facing agriculture.
June 23, 2022
Farmers are incorporating high-tech solutions like IoT and drones to address new challenges facing agriculture.
by Xavier Dupont, Senior Director of Product Line, Lantronix
June 23, 2022
5 MIN READ
Article
7 Ways to Bring AI to Cybersecurity
Academic researchers are developing projects to apply artificial intelligence to detect and stop cyberattacks and keep critical infrastructure secure, thanks to grants from the C3.ai Digital Transformation Institute.
June 15, 2022
Academic researchers are developing projects to apply artificial intelligence to detect and stop cyberattacks and keep critical infrastructure secure, thanks to grants from the C3.ai Digital Transformation Institute.
by Shannon Flynn, Contributing Writer
June 15, 2022
9 MIN READ
Slideshow
Post-Quantum Cryptography Set to Replace RSA, ECC
In the next 10 years, public-key encryption needs to be replaced by post-quantum techniques that can stand up to the new challenges.
May 06, 2022
In the next 10 years, public-key encryption needs to be replaced by post-quantum techniques that can stand up to the new challenges.
by Dark Reading Staff, Dark Reading
May 06, 2022
2 MIN READ
Article
Microsoft, Apple, and Google Promise to Expand Passwordless Features
The passwordless future just became closer to reality, as Microsoft, Apple, and Google pledge to make the standard possible across operating systems and browsers.
May 05, 2022
The passwordless future just became closer to reality, as Microsoft, Apple, and Google pledge to make the standard possible across operating systems and browsers.
by Fahmida Y. Rashid, Managing Editor, Features, Dark Reading
May 05, 2022
4 MIN READ
Article
Aryaka, Carnegie Mellon’s CyLab to Research New Threat Mitigation Techniques
The security research partnership will focus on developing new techniques and releasing them as open source.
May 03, 2022
The security research partnership will focus on developing new techniques and releasing them as open source.
by Dark Reading Staff, Dark Reading
May 03, 2022
2 MIN READ
Article
Infineon’s Latest Chip Tackles Post-Quantum Security
Infineon’s latest Trusted Platform Module has a mechanism to still update device firmware after quantum computing breaks existing algorithms.
February 15, 2022
Infineon’s latest Trusted Platform Module has a mechanism to still update device firmware after quantum computing breaks existing algorithms.
by Dark Reading Staff, Dark Reading
February 15, 2022
2 MIN READ
Article
Could Biology Hold the Clue to Better Cybersecurity?
Sophisticated malware attacks underscore the need for a more dynamic security framework, inspired by biological concepts.
February 14, 2022
Sophisticated malware attacks underscore the need for a more dynamic security framework, inspired by biological concepts.
by Samuel Greengard, Freelance Writer
February 14, 2022
5 MIN READ
Article
CISOs Plan What to Buy With Funds From the Infrastructure Bill
CISOs welcome the cybersecurity funding allocated under the Infrastructure Investment and Jobs Act, but say it’s not perfect because it doesn't address a key issue: people.
January 03, 2022
CISOs welcome the cybersecurity funding allocated under the Infrastructure Investment and Jobs Act, but say it’s not perfect because it doesn't address a key issue: people.
by Andrada Fiscutean, Contributing Writer
January 03, 2022
6 MIN READ
Article
3 Must-Know Technologies to Protect Your Hybrid Workforce
Zero-trust, SASE, and XDR have similar goals, but they differ in their approaches to protecting businesses and users.
November 15, 2021
Zero-trust, SASE, and XDR have similar goals, but they differ in their approaches to protecting businesses and users.
by Mary Blackowiak, Lead Product Marketing Manager, AT&T Cybersecurity
November 15, 2021
4 MIN READ
Article
7 Cross-Industry Technology Trends That Will Disrupt the World
Recent McKinsey analysis examines which technologies will have the most momentum in the next 10 years. These are the trends security teams need to know to protect their organizations effectively.
October 18, 2021
Recent McKinsey analysis examines which technologies will have the most momentum in the next 10 years. These are the trends security teams need to know to protect their organizations effectively.
by Dark Reading Staff, Dark Reading
October 18, 2021
5 MIN READ
Article