informa
/

Vulnerability Management

How We Can Start Winning the Cyber War
Government and industry must work hand-in-hand to execute a winning game plan against cyber terrorists.
July 28, 2021
Government and industry must work hand-in-hand to execute a winning game plan against cyber terrorists.
by Mark Carrigan, COO, PAS, Part of Hexagon
July 28, 2021
3 min read
Article
Managing Increased Cyber-Physical Security Threats in a Hyper-Connected World
Physical security and cybersecurity can't be managed separately.
July 28, 2021
Physical security and cybersecurity can't be managed separately.
by Thomas Kopecky, Co-Founder and Chief Strategy Officer
July 28, 2021
5 min read
Article
Praying Mantis Threat Group Targeting US Firms in Sophisticated Attacks
Group's advanced memory-resident attacks similar to those employed in sustained campaign against Australian companies an...
July 27, 2021
Group's advanced memory-resident attacks similar to those employed in sustained campaign against Australian companies an...
by Jai Vijayan, Contributing Writer
July 27, 2021
5 min read
Article
Google Debuts New Bug Hunting Platform
The new platform brings bug reporting for all Google targets into one place.
July 27, 2021
The new platform brings bug reporting for all Google targets into one place.
by Dark Reading Staff, Dark Reading
July 27, 2021
1 min read
Article
Software Time-to-Fix Plateaus as More Apps Tested
The average critical vulnerability took 202 days to fix over the past 12 months, a scarce improvement over 205 days from...
July 27, 2021
The average critical vulnerability took 202 days to fix over the past 12 months, a scarce improvement over 205 days from...
by Robert Lemos, Contributing Writer
July 27, 2021
4 min read
Article
Deloitte Buys TransientX and Sentek Global
The deals are intended to expand Deloitte's zero-trust portfolio and broaden its reach into federal markets, the company...
July 26, 2021
The deals are intended to expand Deloitte's zero-trust portfolio and broaden its reach into federal markets, the company...
by Dark Reading Staff, Dark Reading
July 26, 2021
1 min read
Article
IoT Search Engines Make It Easy to Find Vulnerable Devices, and That's a Problem
Here are five tips to protect your company.
July 26, 2021
Here are five tips to protect your company.
by Pascal Geenens, Director, Threat Intelligence, for Radware
July 26, 2021
6 min read
Article
Ransomware Is Top Concern for Many Security Pros: Report
A survey of IT and security professionals also reveals COVID-19 has significantly changed the malware landscape.
July 23, 2021
A survey of IT and security professionals also reveals COVID-19 has significantly changed the malware landscape.
by Dark Reading Staff, Dark Reading
July 23, 2021
2 min read
Article
Understanding and Mitigating Insider Threats in Today's Remote-Work World
The insider threat menace has grown during the pandemic, worsened by an increase in credential theft and broader use of ...
July 23, 2021
The insider threat menace has grown during the pandemic, worsened by an increase in credential theft and broader use of ...
by Michael Walters, President & Co-Founder of Action1 Corporation
July 23, 2021
5 min read
Article
Memory Corruption Issues Lead 2021 CWE Top 25
The MITRE Common Weakness Enumeration (CWE) team's latest list of most dangerous software flaws includes several that sh...
July 22, 2021
The MITRE Common Weakness Enumeration (CWE) team's latest list of most dangerous software flaws includes several that sh...
by Jai Vijayan, Contributing Writer
July 22, 2021
5 min read
Article
Sophos Buys Network Detection And Response Startup Braintrace
The acquisition will add to Sophos' threat detection capabilities, the company reports.
July 22, 2021
The acquisition will add to Sophos' threat detection capabilities, the company reports.
by Dark Reading Staff, Dark Reading
July 22, 2021
1 min read
Article
Software Security: A Sounding Board for Needed Change
If the federal government is going to have software that performs critical functions, it must take complete ownership, a...
July 22, 2021
If the federal government is going to have software that performs critical functions, it must take complete ownership, a...
by Kevin E. Greene, Director of Security Solutions, Parasoft
July 22, 2021
6 min read
Article
Peloton Breach Reveals a Coming IoT Data Winter
We will see more and more Internet of Things attacks unless we adjust course quickly.
July 22, 2021
We will see more and more Internet of Things attacks unless we adjust course quickly.
by Emil Sayegh, CEO and President, Ntirety
July 22, 2021
5 min read
Article
Nearly All Linux OSes Have a Pair of Privilege Escalation Flaws
The issues, affecting kernels dating back to August 2014, allow an unprivileged user to gain root access to the operatin...
July 21, 2021
The issues, affecting kernels dating back to August 2014, allow an unprivileged user to gain root access to the operatin...
by Robert Lemos, Contributing Writer
July 21, 2021
4 min read
Article
Why the FBI's Recovery of Colonial Pipeline Ransom Signals Hope for the Future
The "win for the good guys" is a monumental step toward breaking down the business model of ransomware and digital extor...
July 21, 2021
The "win for the good guys" is a monumental step toward breaking down the business model of ransomware and digital extor...
by Morgan Demboski and Alexander J. Parella, Threat Intelligence Analyst, IronNet Cybersecurity / Threat Hunter, IronNet Cybersecurity
July 21, 2021
5 min read
Article