informa

Vulnerability Management

Passwordless Is the Future … but What About the Present?
Password managers, single sign-on, and multifactor authentication each offers its own methodology and unique set of bene...
October 20, 2021
Password managers, single sign-on, and multifactor authentication each offers its own methodology and unique set of bene...
by Idan Fast, Co-Founder and CTO at Grip Security
October 20, 2021
4 min read
Article
Group With Potential Links to Iranian Threat Actor Resurfaces
The Lyceum group has previously been linked to attacks on targets in the Middle East.
October 18, 2021
The Lyceum group has previously been linked to attacks on targets in the Middle East.
by Jai Vijayan, Contributing Writer
October 18, 2021
3 min read
Article
Not Hitting Your Security KPIs? Get the Whole Business Involved
CISOs can deliver better outcomes and get the support they need by linking security processes to business results.
October 12, 2021
CISOs can deliver better outcomes and get the support they need by linking security processes to business results.
by Matt Middleton-Leal, Managing Director, Qualys
October 12, 2021
4 min read
Article
71% of Security Pros Find Patching to be Complex and Time Consuming, Ivanti Study Confirms
Challenges with lack of time and vulnerability and patching prioritization are putting organizations at increased risk o...
October 08, 2021
Challenges with lack of time and vulnerability and patching prioritization are putting organizations at increased risk o...
October 08, 2021
5 min read
Article
A Culture of Unity Is Key to Solving the Cyber Challenge
Lack of unity in vendor solutions and in security teams' culture are detrimental to a successful and productive security...
October 06, 2021
Lack of unity in vendor solutions and in security teams' culture are detrimental to a successful and productive security...
by Nick Schneider, CEO and President at Arctic Wolf
October 06, 2021
4 min read
Article
Top 5 Skills Modern SOC Teams Need to Succeed
From basic coding to threat hunting, here are five skills modern SOC teams need to successfully navigate the future of h...
October 04, 2021
From basic coding to threat hunting, here are five skills modern SOC teams need to successfully navigate the future of h...
by Jack Naglieri, CEO and Founder, Panther Labs
October 04, 2021
4 min read
Article
It's Time to Rethink Identity and Authentication
The concept of identity has been around for decades, yet authentication has not caught up to its advanced threats until ...
October 01, 2021
The concept of identity has been around for decades, yet authentication has not caught up to its advanced threats until ...
by Hemen Vimadalal, CEO and Co-Founder of 1Kosmos
October 01, 2021
4 min read
Article
The New Security Basics: 10 Most Common Defensive Actions
Companies now commonly collect security metrics from their software development life cycle, implement basic security mea...
September 30, 2021
Companies now commonly collect security metrics from their software development life cycle, implement basic security mea...
by Robert Lemos, Contributing Writer
September 30, 2021
4 min read
Article
5 Ways to Become a Better Cyber-Threat Exterminator
Tactical threat intelligence feeds directly into security operations and helps tighten existing security controls and im...
September 30, 2021
Tactical threat intelligence feeds directly into security operations and helps tighten existing security controls and im...
by Mike Wilkes, Chief Information Security Officer at SecurityScorecard
September 30, 2021
5 min read
Article
Modern Security Breaches Demand Diligent Planning and Executive Support
Teams that remain reactive will always be on the back foot — take an active stance.
September 28, 2021
Teams that remain reactive will always be on the back foot — take an active stance.
by Chris Novak, Global Director at the Verizon Threat Research Advisory Center
September 28, 2021
4 min read
Article
Cloudflare Ventures into Simplifying Email Security
The company adds complex email security technologies — including the alphabet soup of SPF, DKIM, and DMARC — as part of ...
September 27, 2021
The company adds complex email security technologies — including the alphabet soup of SPF, DKIM, and DMARC — as part of ...
by Robert Lemos, Contributing Writer
September 27, 2021
5 min read
Article
How to Get Started With Zero Trust in a SaaS Environment
Given current business conditions and the prevalence of SaaS technologies, now is the time to take steps toward zero tru...
September 27, 2021
Given current business conditions and the prevalence of SaaS technologies, now is the time to take steps toward zero tru...
by Lenny Zeltser, Chief Information Security Officer at Axonius
September 27, 2021
5 min read
Article
Endpoint Still a Prime Target for Attack
A vast majority of security professionals surveyed think any exploit will start with the endpoint.
September 24, 2021
A vast majority of security professionals surveyed think any exploit will start with the endpoint.
by Dark Reading Staff, Dark Reading
September 24, 2021
2 min read
Article
Microsoft Exchange Autodiscover Flaw Leaks Thousands of Credentials
Researchers claim to have accessed hundreds of thousands of Windows credentials using a bug in the Autodiscover protocol...
September 23, 2021
Researchers claim to have accessed hundreds of thousands of Windows credentials using a bug in the Autodiscover protocol...
by Dark Reading Staff, Dark Reading
September 23, 2021
2 min read
Article
How to Implement a Security Champions Program
A Security Champions program is a great way to enhance security maturity, reduce vulnerabilities, and make security top ...
September 23, 2021
A Security Champions program is a great way to enhance security maturity, reduce vulnerabilities, and make security top ...
by Simon Maple, Field CTO at Snyk
September 23, 2021
5 min read
Article