informa
/

Vulnerability Management

Endpoint Still a Prime Target for Attack
A vast majority of security professionals surveyed think any exploit will start with the endpoint.
September 24, 2021
A vast majority of security professionals surveyed think any exploit will start with the endpoint.
by Dark Reading Staff, Dark Reading
September 24, 2021
2 min read
Article
Microsoft Exchange Autodiscover Flaw Leaks Thousands of Credentials
Researchers claim to have accessed hundreds of thousands of Windows credentials using a bug in the Autodiscover protocol...
September 23, 2021
Researchers claim to have accessed hundreds of thousands of Windows credentials using a bug in the Autodiscover protocol...
by Dark Reading Staff, Dark Reading
September 23, 2021
2 min read
Article
How to Implement a Security Champions Program
A Security Champions program is a great way to enhance security maturity, reduce vulnerabilities, and make security top ...
September 23, 2021
A Security Champions program is a great way to enhance security maturity, reduce vulnerabilities, and make security top ...
by Simon Maple, Field CTO at Snyk
September 23, 2021
5 min read
Article
UK MoD Data Breach Shows Cybersecurity Must Protect Both People and Data
The UK MoD has failed to protect personally identifiable information (PII) for Afghan interpreters; the incident highlig...
September 22, 2021
The UK MoD has failed to protect personally identifiable information (PII) for Afghan interpreters; the incident highlig...
by Maxine Holt, Research Director, Omdia
September 22, 2021
3 min read
Article
Strained Relationships Hinder DevSecOps Innovation
A new survey from Forrester and VMware finds more than half of developers still think security gets in the way.
September 22, 2021
A new survey from Forrester and VMware finds more than half of developers still think security gets in the way.
by Dark Reading Staff, Dark Reading
September 22, 2021
2 min read
Article
Why Security Pros Should Rethink Their Focus on Information Resilience
Resilience is often defined as being able to withstand disruptions and rebound to a previous state. But a system's abili...
September 22, 2021
Resilience is often defined as being able to withstand disruptions and rebound to a previous state. But a system's abili...
by Sounil Yu, CISO and Head of Research of JupiterOne
September 22, 2021
5 min read
Article
5 Ways to Become a Better Cyber-Threat Exterminator
Tactical threat intelligence feeds directly into security operations and helps tighten existing security controls and im...
September 21, 2021
Tactical threat intelligence feeds directly into security operations and helps tighten existing security controls and im...
by Mike Wilkes, Chief Information Security Officer at SecurityScorecard
September 21, 2021
5 min read
Article
New Report Examines Top Threats Discussed at Black Hat USA
Supply chain security and vulnerabilities in enterprise software were among the threats most dicussed at this year's sho...
September 17, 2021
Supply chain security and vulnerabilities in enterprise software were among the threats most dicussed at this year's sho...
by Dark Reading Staff, Dark Reading
September 17, 2021
2 min read
Article
Infrastructure, Security, and the Need for Visibility
Government authorities are increasingly trying to bolster critical infrastructure security. But investments in next-gene...
September 17, 2021
Government authorities are increasingly trying to bolster critical infrastructure security. But investments in next-gene...
by Joe Slowik, Senior Manager at Gigamon
September 17, 2021
5 min read
Article
Under Pressure: COVID-19 Forced Many Execs to Sideline Cybersecurity
CISOs are more stressed, and the fallout is increased cyber-risk. Also, budget restrictions lead to a yawning chasm betw...
September 16, 2021
CISOs are more stressed, and the fallout is increased cyber-risk. Also, budget restrictions lead to a yawning chasm betw...
by Marc Wilczek, Digital Strategist & COO of Link11
September 16, 2021
5 min read
Article
ExpressVPN Acquired By Kape Technologies for $936 Million
Privacy firm Kape says deal will double customer base and broaden reach into consumer VPN market
September 15, 2021
Privacy firm Kape says deal will double customer base and broaden reach into consumer VPN market
by Dark Reading Staff, Dark Reading
September 15, 2021
1 min read
Article
How Your Printer Is Like Swiss Cheese
Follow these best practices to avoid the security holes created by these often-overlooked, but ubiquitous, devices.
September 15, 2021
Follow these best practices to avoid the security holes created by these often-overlooked, but ubiquitous, devices.
by Chris Rouland, Co-Founder and Chief Executive Officer at Phosphorus Cybersecurity
September 15, 2021
5 min read
Article
Purchasing Managed Security Services: Strategies for Client References
There's a scarcity of customers using managed security services who are willing to talk to others about their experience...
September 15, 2021
There's a scarcity of customers using managed security services who are willing to talk to others about their experience...
by Bob Blakley, Senior Director, Global Security Services
September 15, 2021
5 min read
Article
Google Patches Chrome Bugs Exploited in the Wild
CISA advises organizations to patch quickly to protect against zero-day exploits.
September 14, 2021
CISA advises organizations to patch quickly to protect against zero-day exploits.
by Dark Reading Staff, Dark Reading
September 14, 2021
1 min read
Article
Apple Patches Zero-Days in iOS 14.8 Update
An important security update addresses vulnerabilities in CoreGraphics and WebKit that may have been actively exploited.
September 13, 2021
An important security update addresses vulnerabilities in CoreGraphics and WebKit that may have been actively exploited.
by Dark Reading Staff, Dark Reading
September 13, 2021
2 min read
Article