informa
/

Vulnerability Management

Top 5 Techniques Attackers Use to Bypass MFA
Like other protective measures, multifactor authentication isn't failsafe or foolproof.
August 05, 2021
Like other protective measures, multifactor authentication isn't failsafe or foolproof.
by Hitesh Sheth, CEO, Vectra
August 05, 2021
4 min read
Article
Researchers Find Significant Vulnerabilities in macOS Privacy Protections
Attacks require executing code on a system but foil Apple's approach to protecting private data and systems files.
August 05, 2021
Attacks require executing code on a system but foil Apple's approach to protecting private data and systems files.
by Robert Lemos, Contributing Writer
August 05, 2021
4 min read
Article
4 Common Challenges of 'Shift Left' Security
Involving security in the earliest stages of software development helps prevent defects, but it's not without problems.
August 05, 2021
Involving security in the earliest stages of software development helps prevent defects, but it's not without problems.
by Tzury Bar Yochay, Co-founder and CTO of Reblaze and co-creator of Curiefense
August 05, 2021
3 min read
Article
Organizations Still Struggle to Hire & Retain Infosec Employees: Report
Security leaders are challenged to fill application security and cloud computing jobs in particular, survey data shows.
August 04, 2021
Security leaders are challenged to fill application security and cloud computing jobs in particular, survey data shows.
by Joan Goodchild, Senior Editor
August 04, 2021
3 min read
Article
Think Having Avoided Kaseya Means You're Safe? Guess Again
The lesson: Don't assume that everything coming from an apparently benign source is safe.
August 04, 2021
The lesson: Don't assume that everything coming from an apparently benign source is safe.
by Alan Brill, Senior Managing Director, Cyber Risk Practice, Kroll
August 04, 2021
5 min read
Article
5 Questions Your Organization Must Ask to Prepare for a Ransomware Attack
Ransomware's evolving all the time, but here are some issues to address now to mitigate the impact of the next ransomwar...
August 03, 2021
Ransomware's evolving all the time, but here are some issues to address now to mitigate the impact of the next ransomwar...
by Yassir Abousselham, Chief Information Security Officer, Splunk
August 03, 2021
5 min read
Article
Get Ahead of the Hack: Why Cyber Insurance Is Not Enough
Cybersecurity insurance is a smart investment to protect against the effects of ransomware and other attacks, but it sho...
August 03, 2021
Cybersecurity insurance is a smart investment to protect against the effects of ransomware and other attacks, but it sho...
by Jay Prassl, CEO and Founder, Automox
August 03, 2021
5 min read
Article
Defenders Face New Challenges As Attack Complexity Grows
A new report states sophisticated attacks and a complex threat landscape lead to burnout among security pros.
August 02, 2021
A new report states sophisticated attacks and a complex threat landscape lead to burnout among security pros.
by Dark Reading Staff, Dark Reading
August 02, 2021
1 min read
Article
Build a Continuous Education Program for Better Cybersecurity
Addictive learning works because it keeps students interested and challenged at all times.
August 02, 2021
Addictive learning works because it keeps students interested and challenged at all times.
by Margus Ernits, CTO of RangeForce
August 02, 2021
5 min read
Article
What's Essential in an Incident Response Plan? Security Leaders Weigh In
A new report examines the must-have components of a security incident readiness and response playbook.
July 30, 2021
A new report examines the must-have components of a security incident readiness and response playbook.
by Dark Reading Staff, Dark Reading
July 30, 2021
1 min read
Article
Next for Bug Bounties: More Open Source Funding
Ten years after kicking off its Vulnerability Rewards Program, Google sees another decade of bounties with a focus on sh...
July 30, 2021
Ten years after kicking off its Vulnerability Rewards Program, Google sees another decade of bounties with a focus on sh...
by Robert Lemos, Contributing Writer
July 30, 2021
5 min read
Article
Lower-Level Employees Become Top Spear-Phishing Targets
Cybercriminals seek employees who will be a "weak link" in the organization when designing phishing attacks, a new repor...
July 29, 2021
Cybercriminals seek employees who will be a "weak link" in the organization when designing phishing attacks, a new repor...
by Dark Reading Staff, Dark Reading
July 29, 2021
2 min read
Article
How Adversaries Still Target Microsoft Active Directory 20 Years Later
Attack paths allow adversaries to reliably take control of nearly every Active Directory in the world.
July 29, 2021
Attack paths allow adversaries to reliably take control of nearly every Active Directory in the world.
by Andy Robbins, Technical Architect, SpecterOps
July 29, 2021
6 min read
Article
Why Your People Are the Best Untapped Security Strategy
To elevate your security strategy, hire skilled security talent while establishing a security-centric culture among empl...
July 29, 2021
To elevate your security strategy, hire skilled security talent while establishing a security-centric culture among empl...
by Jason Lee, Chief Information Security Officer, Zoom
July 29, 2021
4 min read
Article
White House Issues Memo on US Critical Infrastructure Security
The memo describes critical infrastructure threats as one of the most significant issues confronting the nation.
July 28, 2021
The memo describes critical infrastructure threats as one of the most significant issues confronting the nation.
by Dark Reading Staff, Dark Reading
July 28, 2021
2 min read
Article