The era of digital trust is broken, and constant vigilance is needed to get things back on track.
Read moreDark Reading's Kelly Jackson Higgins explains the enormous legacy left behind by Dan Kaminsky and his seminal "Great DNS Vulnerability" talk at Black Hat 2008.
Read moreWar and Geopolitical Conflict: The New Battleground for DDoS Attacks
December 30 2022The effectiveness of attacks largely depends on organizations' distributed denial-of-service defenses.
Read moreAdobe, Apple, Cisco, Microsoft Flaws Make Up Half of KEV Catalog
December 30 2022CISA’s Known Exploited Vulnerabilities Catalog has become a valuable repository of vulnerabilities to be patched. A pair of reports analyze the vulnerabilities under attack to understand the kind of...
Read moreBeyond the Obvious: The Boldest Cybersecurity Predictions for 2023
December 30 2022Dark Reading's panel of security experts deliver a magnum of bubbly hot takes on what 2023 will look like, featuring evil AIs, WWIII, wild workplace soon-to-be-norms, and more.
Read more6 Ways to Protect Your Organization Against LAPSUS$
December 30 2022Businesses need to educate employees the type of social engineering attacks used by hacking group DEV-0537 (LAPSUS$) and strengthen their security posture.
Read more3 Industries, 3 Security Programs
December 30 2022Security leaders from a media corporation, a commercial real estate company, and an automotive technology company share how they address cyber-risk.
Read more3 Industries, 3 Security Programs
December 30 2022Security leaders from a media corporation, a commercial real estate company, and an automotive technology company share how they address cyber-risk.
Read more
Recent Comments