FreshRSS

πŸ”’
❌ About FreshRSS
There are new available articles, click to refresh the page.
Before yesterdayDark Reading:

Cisco Makes Resilience a Cornerstone of Security Strategy

By Dark Reading Staff, Dark Reading
Cisco's Jeetu Patel joins Dark Reading's Terry Sweeney at Dark Reading News Desk during RSA Conference to discuss the power of information sharing.

  • June 9th 2022 at 18:00

Sophos: Keeping Tabs on the Bad Guys Using Threat Research

By Dark Reading Staff, Dark Reading
Sophos' John Shier joins Dark Reading's Terry Sweeney at Dark Reading News Desk during RSA Conference to discuss the ransomware problem.

  • June 9th 2022 at 17:30

Cisco Revamps Cloud Security Strategy With New Secure Access, SASE Portfolio

By Nathan Eddy, Contributing Writer, Dark Reading
The company's vision for the future of cloud security is based on simplified, horizontal coverage across multiple cloud platforms.

  • June 9th 2022 at 17:26

Want Better Security? Up Your Collaboration Game

By Dark Reading Staff, Dark Reading
BAE Systems' Peder Jungck joins Dark Reading's Terry Sweeney at Dark Reading News Desk during RSA Conference to discuss the importance of collaboration.

  • June 9th 2022 at 17:00

How AI Is Useful β€” and Not Useful β€” for Cybersecurity

By Howie Xu, Vice President of AI and Machine Learning, Zscaler
AI works best when security professionals and AI are complementing each other.

  • June 9th 2022 at 17:00

Uptycs: Observability Is Key to Cloud Security

By Dark Reading Staff, Dark Reading
Uptycs' Ganesh Pai joins Dark Reading's Terry Sweeney at Dark Reading News Desk during RSA Conference to talk about cloud security and observability.

  • June 9th 2022 at 16:00

Automox Adds Automation to Patching, Vuln Management

By Dark Reading Staff, Dark Reading
Automox's Paul Zimski joins Dark Reading's Terry Sweeney at Dark Reading News Desk during RSA Conference to talk about automated patch management.

  • June 9th 2022 at 15:30

Why AIs Will Become Hackers

By Karen Spiegelman, Features Editor
At a 2022 RSA Conference keynote, technologist Bruce Schneier asserted that artificial intelligence agents will start to hack human systems β€” and what that will mean for us.

  • June 9th 2022 at 15:15

ReliaQuest Bolsters Extended Detection With Threat Intelligence

By Dark Reading Staff, Dark Reading
ReliaQuest CTO Joe Partlow joins Dark Reading's Terry Sweeney at Dark Reading News Desk during RSA Conference to discuss extended detection response β€” and acquisition news.

  • June 9th 2022 at 15:00

How Poor Communication Opens the Door to Ransomware and Extortion

By Robert Boyce, Global Cyber Response Lead, Accenture Security
Organizations can no longer rely on traditional responses to ransomware.

  • June 9th 2022 at 14:00

Security & Productivity: The New Power Couple

By Dark Reading Staff, Dark Reading
Seemplicity's Ravid Circus joins Dark Reading's Terry Sweeney at Dark Reading News Desk during RSA Conference to talk up accelerating time-to-remediation and reducing risk.

  • June 9th 2022 at 00:30

Anjuna Security: Tapping β€˜Confidential Computing’ to Secure Data, Users, and Organizations

By Dark Reading Staff, Dark Reading
Anjuna Security's Ayal Yogev joins Dark Reading's Terry Sweeney at Dark Reading News Desk during RSA Conference to discuss how confidential computing will improve cloud security.

  • June 9th 2022 at 00:00

DeepSurface Security: Risk-Based Prioritization Adds New Depth to Vulnerability Management

By Dark Reading Staff, Dark Reading
DeepSurface's Tim Morgan joins Dark Reading's Terry Sweeney at Dark Reading News Desk during RSA Conference to discuss how to fortify vulnerability management.

  • June 8th 2022 at 23:00

China-Sponsored Cyberattackers Target Networking Gear to Build Widespread Attack Infrastructure

By Dark Reading Staff, Dark Reading
Compromised routers, VPNs, and NAS devices from Cisco, Citrix, Pulse, Zyxel, and others are all being used as part of an extensive cyber espionage campaign.

  • June 8th 2022 at 22:41

ConcentricAI: How To Maximize Your AI Returns, In and Out of the SOC

By Dark Reading Staff, Dark Reading
Concentric AI's Karthik Krishnan joins Dark Reading's Terry Sweeney at Dark Reading News Desk during RSA Conference to discuss how artificial intelligence has transformed the security landscape.

  • June 8th 2022 at 22:30

Cracking the Email Security Code: 12 Best Practices for Small and Midsize Businesses

It only takes one successful attack to spell disaster for a company. Learn how to protect your company with this email security best practice guide.

  • June 8th 2022 at 22:19

Getting It Right at the Secure Service Edge

By Dark Reading Staff, Dark Reading
Lookout's Jim Dolce joins Dark Reading's Terry Sweeney at Dark Reading News Desk during RSA Conference to discuss the advantages of Secure Service Edge.

  • June 8th 2022 at 22:00

Talon Grasps Victory at a Jubilant RSAC Innovation Sandbox

By Karen Spiegelman, Features Editor
Spirits were high at the return of the in-person contest, which kicked off by bringing last year's virtual event winner on stage.

  • June 8th 2022 at 19:25

Black Basta Ransomware Targets ESXi Servers in Active Campaign

By Nathan Eddy, Contributing Writer, Dark Reading
The new ransomware strain Black Basta is now actively targeting VMware ESXi servers in an ongoing campaign, encrypting files inside a targeted volumes folder.

  • June 8th 2022 at 18:49

How Do We Secure Our Cities From Attack?

By Mark Allen, General Manager, Premises, Identiv
Physical access matters in keeping people and buildings safe. Points to consider when establishing a physical security protocol are ways to lock down an area to keep people safe, approaches to communicate clear safety directions, and access control.

  • June 8th 2022 at 14:00

Now Is the Time to Plan for Post-Quantum Cryptography

By Karen Spiegelman, Features Editor
Panelists from an RSA Conference keynote agreed that organizations need to begin work on PQC migration, if they haven't already.

  • June 8th 2022 at 03:27

An Emerging Threat: Attacking 5G Via Network Slices

By Tara Seals, Managing Editor, News, Dark Reading
A successful attack against 5G networks could disrupt critical infrastructure, manipulate sensor data, or even cause physical harm to humans.

  • June 7th 2022 at 23:15

Mandia: Keep 'Shields Up' to Survive the Current Escalation of Cyberattacks

By Kelly Jackson Higgins, Editor-in-Chief, Dark Reading
As Mandiant CEO Kevin Mandia's company prepares to become part of Google, the incident response company continues to investigate many of the most critical cyber incidents.

  • June 7th 2022 at 19:55

Multilevel Extortion: DeadBolt Ransomware Targets Internet-Facing NAS Devices

By Nathan Eddy, Contributing Writer, Dark Reading
The innovative ransomware targets NAS devices, has a multitiered payment and extortion scheme as well as a flexible configuration, and takes a heavily automated approach.

  • June 7th 2022 at 17:42

How the C-Suite Puts Shoulders Into Zero Trust in 2022

By Ericka Chickowski, Contributing Writer, Dark Reading
A full 77% of tech executives say they'll increase spending in zero-trust architecture in the coming year.

  • June 7th 2022 at 17:22

RSAC Opens With Message of Transformation

By Becky Bracken, Editor, Dark Reading
Cybersecurity needs to shift its thinking ahead of the next disruption, RSA's CEO said during the opening 2022 conference keynote.

  • June 7th 2022 at 17:15

Enterprise Security Around the Dinner Table

By Curtis Franklin, Senior Analyst, Omdia
Enterprise cybersecurity awareness training has evolved to include informal lessons for employees' family members, and it has many benefits.

  • June 7th 2022 at 16:00

7 NFT Scams That Could Be Targeting Your Brand

By Yoav Keren, CEO, BrandShield
Brands should be vigilant to ensure sites and listings promoting NFTs for sale are legitimate and not being used as an instrument by fraudsters to swindle customers.

  • June 7th 2022 at 14:00

Harnessing AI to Proactively Thwart Threats

By Fahmida Y. Rashid, Managing Editor, Features, Dark Reading
By using artificial intelligence to predict how an attacker would carry out their attack, we can deploy defenses and preemptively shut down vulnerable entry points.

  • June 7th 2022 at 14:00

Akamai Launches New Malware Protection for Uploaded Files

Edge-based solution detects and blocks malicious files uploaded to Web apps and APIs.
  • June 7th 2022 at 13:38

Cybersecurity Industry Leaders Launch Campaign to Close the Cybersecurity Talent Gap

A coalition of over 25 industry leaders, led by NightDragon and non-profit NextGen Cyber Talent, partner to raise $1 million for collegiate cybersecurity education
  • June 7th 2022 at 13:35

Forescout Announces Intent to Acquire Cysiv to Deliver Data-Powered Threat Detection and Response

Acquisition will leverage Forescout’s automated cybersecurity with Cysiv's cloud-native platform to deliver data-powered analytics for 24/7 threat detection and response.
  • June 7th 2022 at 13:22

CyberRatings.org Announces Test on Cloud Network Firewall

Fortinet FortiGate-VM receives AAA rating across all five categories in CyberRating's assessment.
  • June 7th 2022 at 13:17

Bugcrowd Expands Pen Testing Solutions with New Platform Services

Basic Pen Tests support rapid, basic vulnerability discovery, while Standard Pen Tests provide compliance-driven testing to meet requirements for Web apps, APIs, and networks.
  • June 7th 2022 at 13:10

Fortinet Unveils New Digital Risk Protection Offering

FortiRecon combines machine learning, automation, and human intelligence to continually monitor an organization’s external attack surface.
  • June 7th 2022 at 13:00

Snowflake Debuts Cybersecurity Workload to Aid Visibility, Automation

By Nathan Eddy, Contributing Writer, Dark Reading
The tool underpins cybersecurity capabilities including SIEM, SOAR, compliance automation, and vulnerability management.

  • June 7th 2022 at 13:00

Ransomware's ROI Retreat Will Drive More BEC Attacks

By Becky Bracken, Editor, Dark Reading
Crackdowns are driving down ransomware profits, and analysts see signs that operators are pivoting to business email compromise attacks, security researcher warned.

  • June 6th 2022 at 22:16

Communication Is Key to CISO Success

By Becky Bracken, Editor, Dark Reading
A panel of CISOs at the RSA Conference outlined what a successful first 90-day plan looks like, and it boiled down to effective communication and listening.

  • June 6th 2022 at 20:39

Optiv Launches Cyber Recovery Solution Focused on Protection and Rapid Recovery

CRS helps minimize the impact a cyberattack has on business operations, finances and reputation.
  • June 6th 2022 at 19:05

BigID Introduces Cloud Data Security On Demand

New SmallID offering brings cloud-native data privacy and protection to organizations of all sizes.
  • June 6th 2022 at 19:00

IBM to Buy Attack Surface-Management Firm Randori

By Dark Reading Staff, Dark Reading
Randori’s attack-surface management software will be integrated into IBM Security QRadar extended detection and response (XDR) features.

  • June 6th 2022 at 16:38

Cybersecurity M&A Activity Shows No Signs of Slowdown

By Jai Vijayan, Contributing Writer, Dark Reading
But valuations have dropped β€” and investors are paying closer attention to revenues and profitability, industry analysts say.

  • June 6th 2022 at 15:56

The CISO Shortlist: Top Priorities at RSAC 2022

By Will Lin, Managing Director, Forgepoint Capital
The buzz on the show floor during RSA Conference is about aligning the organization's security priorities with the right technology. Will Lin, managing director and founding member at Forgepoint Capital, weighs in on the biggest security priorities for 2022 β€” and what kind of tech senior-level executives are looking for.

  • June 6th 2022 at 15:45

Are You Ready for a Breach in Your Organization's Slack Workspace?

By Ofer Maor, CTO and Co-Founder, Mitiga
A single compromised Slack account can easily be leveraged to deceive other users and gain additional access to other users and multiple Slack channels.

  • June 6th 2022 at 14:00

Name That Edge Toon: Hey, Batter Batter!

By John Klossner, Cartoonist
Come up with a clever caption, and our panel of experts will reward the winner with a $25 Amazon gift card.

  • June 6th 2022 at 13:15

Gathering Momentum: 3 Steps Forward to Expand SBoM Use

By Ericka Chickowski, Contributing Writer, Dark Reading
New studies show less than a third of organizations use software bills of materials (SBoMs), but momentum is building to boost that number.

  • June 6th 2022 at 13:00

FDA: Patch Illumina DNA Sequencing Instruments, Stat

By Dark Reading Staff, Dark Reading
A critical security bug could lead to remote device control, altered lab results, and more, putting patients in danger, agency warns.

  • June 3rd 2022 at 20:05

YourCyanide Ransomware Propagates With PasteBin, Discord, Microsoft Links

By Dark Reading Staff, Dark Reading
The latest iteration of CMD-based ransomware is sophisticated and tricky to detect – and integrates token theft and worming capabilities into its feature set.

  • June 3rd 2022 at 17:45

Iconium Software Releases DataLenz v1.3 for IBM zSystems

DataLenz delivers real-time, machine learning-based breach detection with user behavior modeling for IBM zSystems.
  • June 3rd 2022 at 17:19

Microsoft Disables Iran-Linked Lebanese Hacking Group Polonium

By Nathan Eddy, Contributing Writer, Dark Reading
The attack on Israeli organizations is the latest in a long line of attempts to compromise supply chains, as the APT looks to leverage that access to target a multitude of potential victims.

  • June 3rd 2022 at 16:50

Actively Exploited Atlassian Zero-Day Bug Allows Full System Takeover

By Tara Seals, Managing Editor, News, Dark Reading
A remote code execution (RCE) vulnerability in all versions of the popular Confluence collaboration platform can be abused in credential harvesting, cyber espionage, and network backdoor attacks.

  • June 3rd 2022 at 15:17

Why Network Object Management Is Critical for Managing Multicloud Network Security

By Avishai Wool, Co-Founder and CTO, AlgoSec
If you want your IT and security administrators to get buried in trivial workloads and productivity bottlenecks, having poor network object management is a great way to accomplish that.

  • June 3rd 2022 at 14:00

For Ransomware, Speed Matters

By Fahmida Y. Rashid, Managing Editor, Features, Dark Reading
Someone interested in putting together a ransomware campaign has to consider several factors. The LockBit group touts its speed over competing families to attract potential buyers for its ransowmare-as-a-service.

  • June 3rd 2022 at 13:16

Cerberus Sentinel Completes Acquisition of Creatrix, Inc.

U.S. cybersecurity services firm expands security and identity management services with woman-owned business.
  • June 2nd 2022 at 21:03

Research Reveals 75% of CISOs Are Worried Too Many Application Vulnerabilities Leak Into Production, Despite a Multi-Layered Security Approach

79% of CISOs say continuous runtime vulnerability management is an essential capability to keep up with the expanding complexity of modern multi-cloud environments.
  • June 2nd 2022 at 20:54

Intel Chipset Firmware Actively Targeted by Conti Group

By Dark Reading Staff, Dark Reading
Conti threat actors are betting chipset firmware is updated less frequently than other software β€” and winning big, analysts say.

  • June 2nd 2022 at 20:50

Gurucul Launches Cloud-Native SOC Platform Pushing the Boundaries of Next-Gen SIEM and XDR with Identity Threat Detection and Response

Gurucul automating threat detection, investigation and response (TDIR) with advanced analytics, comprehensive threat content, and a flexible enterprise risk engine for hybrid and multi-cloud environments.
  • June 2nd 2022 at 20:44

Phishers Having a Field Day on WhatsApp, Telegraph

By Dark Reading Staff, Dark Reading
A pair of phishing campaigns against users of WhatsApp and Telegram's Telegraph expose them to extortion, credential harvesting, and even account takeover.

  • June 2nd 2022 at 19:54
❌