Organizations can no longer rely on traditional responses to ransomware.
Read moreLatest episode - listen (or read) now!
Read moreLatest episode - listen (or read) now!
Read moreSmartphones and Civilians in Wartime
June 9 2022Interesting article about civilians using smartphones to assist their militaries in wartime, and how that blurs the important legal distinction between combatants and non-combatants:
The principle of distinction...
Read more
Security & Productivity: The New Power Couple
June 9 2022Seemplicity's Ravid Circus joins Dark Reading's Terry Sweeney at Dark Reading News Desk during RSA Conference to talk up accelerating time-to-remediation and reducing risk.
Read moreAnjuna Security: Tapping ‘Confidential Computing’ to Secure Data, Users, and Organizations
June 9 2022Anjuna Security's Ayal Yogev joins Dark Reading's Terry Sweeney at Dark Reading News Desk during RSA Conference to discuss how confidential computing will improve cloud security.
Read moreDeepSurface Security: Risk-Based Prioritization Adds New Depth to Vulnerability Management
June 8 2022DeepSurface's Tim Morgan joins Dark Reading's Terry Sweeney at Dark Reading News Desk during RSA Conference to discuss how to fortify vulnerability management.
Read moreChina-Sponsored Cyberattackers Target Networking Gear to Build Widespread Attack Infrastructure
June 8 2022Compromised routers, VPNs, and NAS devices from Cisco, Citrix, Pulse, Zyxel, and others are all being used as part of an extensive cyber espionage campaign.
Read moreChina-Sponsored Cyberattackers Target Networking Gear to Build Widespread Attack Infrastructure
June 8 2022Compromised routers, VPNs, and NAS devices from Cisco, Citrix, Pulse, Zyxel, and others are all being used as part of an extensive cyber espionage campaign.
Read moreConcentric AI's Karthik Krishnan joins Dark Reading's Terry Sweeney at Dark Reading News Desk during RSA Conference to discuss how artificial intelligence has transformed the security landscape.
Read more
Recent Comments