informa
/

Vulnerability Management

New Report Examines Top Threats Discussed at Black Hat USA
Supply chain security and vulnerabilities in enterprise software were among the threats most dicussed at this year's sho...
September 17, 2021
Supply chain security and vulnerabilities in enterprise software were among the threats most dicussed at this year's sho...
by Dark Reading Staff, Dark Reading
September 17, 2021
2 min read
Article
Infrastructure, Security, and the Need for Visibility
Government authorities are increasingly trying to bolster critical infrastructure security. But investments in next-gene...
September 17, 2021
Government authorities are increasingly trying to bolster critical infrastructure security. But investments in next-gene...
by Joe Slowik, Senior Manager at Gigamon
September 17, 2021
5 min read
Article
Under Pressure: COVID-19 Forced Many Execs to Sideline Cybersecurity
CISOs are more stressed, and the fallout is increased cyber-risk. Also, budget restrictions lead to a yawning chasm betw...
September 16, 2021
CISOs are more stressed, and the fallout is increased cyber-risk. Also, budget restrictions lead to a yawning chasm betw...
by Marc Wilczek, Digital Strategist & COO of Link11
September 16, 2021
5 min read
Article
ExpressVPN Acquired By Kape Technologies for $936 Million
Privacy firm Kape says deal will double customer base and broaden reach into consumer VPN market
September 15, 2021
Privacy firm Kape says deal will double customer base and broaden reach into consumer VPN market
by Dark Reading Staff, Dark Reading
September 15, 2021
1 min read
Article
How Your Printer Is Like Swiss Cheese
Follow these best practices to avoid the security holes created by these often-overlooked, but ubiquitous, devices.
September 15, 2021
Follow these best practices to avoid the security holes created by these often-overlooked, but ubiquitous, devices.
by Chris Rouland, Co-Founder and Chief Executive Officer at Phosphorus Cybersecurity
September 15, 2021
5 min read
Article
Purchasing Managed Security Services: Strategies for Client References
There's a scarcity of customers using managed security services who are willing to talk to others about their experience...
September 15, 2021
There's a scarcity of customers using managed security services who are willing to talk to others about their experience...
by Bob Blakley, Senior Director, Global Security Services
September 15, 2021
5 min read
Article
Google Patches Chrome Bugs Exploited in the Wild
CISA advises organizations to patch quickly to protect against zero-day exploits.
September 14, 2021
CISA advises organizations to patch quickly to protect against zero-day exploits.
by Dark Reading Staff, Dark Reading
September 14, 2021
1 min read
Article
Apple Patches Zero-Days in iOS 14.8 Update
An important security update addresses vulnerabilities in CoreGraphics and WebKit that may have been actively exploited.
September 13, 2021
An important security update addresses vulnerabilities in CoreGraphics and WebKit that may have been actively exploited.
by Dark Reading Staff, Dark Reading
September 13, 2021
2 min read
Article
Application Security a Growing Priority Among Security Pros
A Dark Reading survey finds most IT and security managers would rather wait to deploy applications than risk security fl...
September 10, 2021
A Dark Reading survey finds most IT and security managers would rather wait to deploy applications than risk security fl...
by Dark Reading Staff, Dark Reading
September 10, 2021
2 min read
Article
Microsoft Warns of Vuln That Allowed Access to Azure Infrastructure
Microsoft ran a five-year-old component that allowed vulnerability researchers to punch through the isolation that norma...
September 09, 2021
Microsoft ran a five-year-old component that allowed vulnerability researchers to punch through the isolation that norma...
by Robert Lemos, Contributing Writer
September 09, 2021
4 min read
Article
33% of Reported Phishing Emails Prove Malicious or Suspect
A new analysis from F-Secure details commonly used phishing phrases and methods seen in attacks.
September 09, 2021
A new analysis from F-Secure details commonly used phishing phrases and methods seen in attacks.
by Dark Reading Staff, Dark Reading
September 09, 2021
1 min read
Article
In the Hybrid Future, Secure Everything Like You're Never Going Back
Security practices must change to reflect the reality that remote/hybrid work is the new norm. Here are three risk mitig...
September 09, 2021
Security practices must change to reflect the reality that remote/hybrid work is the new norm. Here are three risk mitig...
by Dotan Bar Noy, Co-Founder and CEO, Authomize
September 09, 2021
5 min read
Article
Cybercriminals See Bountiful Harvest in Food Supply Chain
Agriculture and food companies are seeing increased attacks from ransomware groups targeting the industry, prompting the...
September 08, 2021
Agriculture and food companies are seeing increased attacks from ransomware groups targeting the industry, prompting the...
by Robert Lemos, Contributing Writer
September 08, 2021
4 min read
Article
Hackers Shut Down a Pipeline. How Should the Energy Sector Respond?
With all eyes on cybersecurity, the energy and utilities industries are adopting zero-trust frameworks. Here are three k...
September 08, 2021
With all eyes on cybersecurity, the energy and utilities industries are adopting zero-trust frameworks. Here are three k...
by Dave Cronin, VP, Cyber Strategy Lead at Capgemini Americas
September 08, 2021
5 min read
Article
Ragnar Locker Threatens to Leak Data if Victims Contact Authorities
The ransomware group says it will leak victims' stolen data if they seek help from law enforcement or data encryption ex...
September 07, 2021
The ransomware group says it will leak victims' stolen data if they seek help from law enforcement or data encryption ex...
by Dark Reading Staff, Dark Reading
September 07, 2021
1 min read
Article