News & Commentary

News

A pair of reports reach similar conclusions about some of the threats growing in cyberspace and the industries likely to be most affected. Curtis Franklin Jr. BySenior Editor at Dark Reading, 2/27/2019 0 comments Read | Post a Comment

News

As in previous years, input validation vulnerabilities accounted for a substantial proportion of total, Risk Based Security report shows. Jai Vijayan ByFreelance writer, 2/27/2019 0 comments Read | Post a Comment

News

The new Intel SGX Card is intended to extend application memory security using Intel SGX in existing data center infrastructure. Kelly Sheridan ByStaff Editor, Dark Reading, 2/27/2019 0 comments Read | Post a Comment

News

Study of the Bronze Union groupalso known as APT27 or Emissary Pandaunderscores how most advanced persistent threat (APT) groups now use administrative tools or slight variants of well-known tools. By Robert Lemos , 2/27/2019 0 comments Read | Post a Comment

Quick Hits

News

CQTools suite includes both exploit kits and information-extraction functions, its developers say. Kelly Jackson Higgins ByExecutive Editor at Dark Reading, 2/27/2019 0 comments Read | Post a Comment

Quick Hits

Commentary

Although human oversight is required, advanced technologies built on AI will become pivotal in building safer financial markets and a safer world. Eric Winston ByExecutive Vice President, General Counsel, and Chief Ethics and Compliance Officer at Mphasis, 2/27/2019 0 comments Read | Post a Comment

News

Commentary

In the cyber threat climate of the 21st century, sticking with DevOps is no longer an option. Sam Bocetta BySecurity Analyst, 2/27/2019 0 comments Read | Post a Comment

News

Quick Hits

News

Because many organizations tend to overlook or underestimate the threat, social media sites, including Facebook, Twitter, and Instagram, are a huge blind spot in enterprise defenses. Jai Vijayan ByFreelance writer, 2/26/2019 0 comments Read | Post a Comment

Commentary

Botnets continue to spread to places never dreamed of a few years ago. But you can fight them off, and these tips can help. Johnathan Azaria ByData Scientist and Security Researcher at Imperva, 2/26/2019 0 comments Read | Post a Comment

News

Quick Hits

The pairing brings Sonatype data on open source components to the Kenna Security platform. Dark Reading Staff By, 2/26/2019 0 comments Read | Post a Comment

News

Commentary

As more organizations move to the public cloud and to DevOps and DevSecOps processes, the open source alternative for host-based intrusion detection is finding new uses. Scott Shinn ByFounder & CTO, Atomicorp, 2/26/2019 0 comments Read | Post a Comment

Security practitioners are most likely to stay at organizations that offer career development. Here are eight tips to consider as you plan your course of action. Kelly Sheridan ByStaff Editor, Dark Reading, 2/26/2019 0 comments Read | Post a Comment