Deepfence ThreatMapper 1.4 Unveils Open Source Threat Graph to Visualize Cloud-Native Threat Landscape
August 10 2022New release also includes enterprise-grade cloud security posture management (CSPM) and YARA-based malware scanning capabilities.
Read moreZero Trust & XDR: The New Architecture of Defense
August 10 2022Zero trust and XDR are complementary and both are necessary in today's modern IT environment. In this article, we discuss the intersection of zero trust and XDR.
Read moreCompliance Certifications: Worth the Effort?
August 10 2022Because demonstrating compliance with industry regulations can be cumbersome and expensive, it's important to ensure they're also absolutely essential.
Read moreFlow Security Launches Next-Gen Data Security Platform Following $10 Million Seed Round
August 10 2022First-of-its-kind solution discovers and protects both data at rest and in motion.
Read moreDark Reading News Desk: Live at Black Hat USA 2022
August 10 2022TODAY at 10 PT: Dark Reading News Desk returns to Black Hat USA 2022
Read moreLooking Back at 25 Years of Black Hat
August 10 2022The Black Hat USA conference's silver jubilee is an opportunity to remember its defining moments, the impact it has made on the security community, and its legacy.
Read moreSoftware Development Pipelines Offer Cybercriminals ‘Free-Range’ Access to Cloud, On-Prem
August 9 2022A Q&A with NCC Group's Viktor Gazdag ahead of a Black Hat USA session on CI/CD pipeline risks reveals a scary, and expanding, campaign vector for software supply chain...
Read moreThe computing giant issued a massive Patch Tuesday update, including a pair of remote execution flaws in the Microsoft Support Diagnostic Tool (MSDT) after attackers used one of the...
Read more
Recent Comments