The company plans to automatically enroll users in two-step verification if their accounts are properly configured.
Read moreAttackers used publicly available tools, FiveHands ransomware, and SombRAT to successfully target an organization, officials report.
Read moreInternet security, privacy, and authentication aren't new issues, but IoT presents unique security challenges.
Read moreMore companies moved to cloud-native infrastructure in the past year, and security incidents and malware moved right along with them.
Read moreLatest episode - listen now! (And please share with your friends.)
Read moreThose helming the US supply chain executive order need to leverage standards, measurement, and the lessons cybersecurity leaders have learned.
Read moreThis browser update is for everyone, but it's for Android users particularly.
Read moreHow to Move Beyond Passwords and Basic MFA
May 6 2021It's not a question of whether passwordless is coming -- it's simply a question of when. How should your organization prepare? (Part two of a two-part series.)
Read moreThe Story of Colossus
May 6 2021Nice video of a talk by Chris Shore on the history of Colossus.
Read moreFind video interviews with some of the coolest Black Hat Asia experts right here, as part of the Dark Reading News Desk this week.
Read more
Recent Comments