The Security Pros and Cons of Using Email Aliases
August 10 2022One way to tame your email inbox is to get in the habit of using unique email aliases when signing up for new accounts online. Adding a "+" character...
Read moreOne way to tame your email inbox is to get in the habit of using unique email aliases when signing up for new accounts online. Adding a "+" character...
Read moreNew release also includes enterprise-grade cloud security posture management (CSPM) and YARA-based malware scanning capabilities.
Read moreZero trust and XDR are complementary and both are necessary in today's modern IT environment. In this article, we discuss the intersection of zero trust and XDR.
Read moreBecause demonstrating compliance with industry regulations can be cumbersome and expensive, it's important to ensure they're also absolutely essential.
Read moreFirst-of-its-kind solution discovers and protects both data at rest and in motion.
Read moreTODAY at 10 PT: Dark Reading News Desk returns to Black Hat USA 2022
Read moreThe Black Hat USA conference's silver jubilee is an opportunity to remember its defining moments, the impact it has made on the security community, and its legacy.
Read moreMicrosoft today released updates to fix a record 141 security vulnerabilities in its Windows operating systems and related software. Once again, Microsoft is patching a zero-day vulnerability in the...
Read moreA Q&A with NCC Group's Viktor Gazdag ahead of a Black Hat USA session on CI/CD pipeline risks reveals a scary, and expanding, campaign vector for software supply chain...
Read moreThe computing giant issued a massive Patch Tuesday update, including a pair of remote execution flaws in the Microsoft Support Diagnostic Tool (MSDT) after attackers used one of the...
Read more
Recent Comments