FreshRSS

🔒
❌ Secure Planet Training Courses Updated For 2019 - Click Here
There are new available articles, click to refresh the page.
☐ ☆ ✇ Dark Reading:

Enterprises Need to Do More to Assure Consumers About Privacy

By: Edge Editors, Dark Reading — January 27th 2023 at 22:00
Organizations care about data privacy, but their priorities appear to be different from what their customers think are important.

☐ ☆ ✇ Dark Reading:

Credential Harvesting Is Retail Industry's Top Threat

By: Edge Editors, Dark Reading — October 7th 2022 at 22:52
Why bother with new tactics and exploits when the old tricks are still effective?

☐ ☆ ✇ Dark Reading:

The Insecurities of Cybersecurity Success

By: Edge Editors, Dark Reading — October 4th 2022 at 22:35
Becoming a big wheel doesn't have to cost your happiness, but grind culture makes that likely.

☐ ☆ ✇ Dark Reading:

No Motivation for Quantum Without Regulatory Push

By: Edge Editors, Dark Reading — September 20th 2022 at 16:44
What's it going to take to prod organizations to implement a post-quantum security plan? Legislative pressure.

☐ ☆ ✇ Dark Reading:

Key Takeaways From the Twitter Whistleblower's Testimony

By: Edge Editors, Dark Reading — September 14th 2022 at 00:59
Twitter did not know what data it had or who had access to it, Peiter "Mudge" Zatko told Congressional lawmakers during a Senate panel hearing.

☐ ☆ ✇ Dark Reading:

Ghost Data Increases Enterprise Business Risk

By: Edge Editors, Dark Reading — September 2nd 2022 at 00:00
IT has to get its hands around cloud data sprawl. Another area of focus should be on ghost data, as it expands the organization's cloud attack surface.

☐ ☆ ✇ Dark Reading:

A Peek Into CISA's Post-Quantum Cryptography Roadmap

By: Edge Editors, Dark Reading — August 30th 2022 at 00:26
To help organizations with their plans, NIST and the Department of Homeland Security developed the Post-Quantum Cryptography Roadmap.

☐ ☆ ✇ Dark Reading:

NIST Weighs in on AI Risk

By: Edge Editors, Dark Reading — August 20th 2022 at 00:00
NIST is developing the AI Risk Management Framework and a companion playbook to help organizations navigate algorithmic bias and risk.

☐ ☆ ✇ Dark Reading:

Cybercriminals Weaponizing Ransomware Data for BEC Attacks

By: Edge Editors, Dark Reading — August 12th 2022 at 22:00
Attacked once, victimized multiple times: Data marketplaces are making it easier for threat actors to find and use data exfiltrated during ransomware attacks in follow-up attacks.

☐ ☆ ✇ Dark Reading:

What Worries Security Teams About the Cloud?

By: Edge Editors, Dark Reading — August 5th 2022 at 18:25
What issues are cybersecurity professionals concerned about in 2022? You tell us!

☐ ☆ ✇ Dark Reading:

Attackers Have 'Favorite' Vulnerabilities to Exploit

By: Edge Editors, Dark Reading — July 29th 2022 at 20:28
While attackers continue to rely on older, unpatched vulnerabilities, many are jumping on new vulnerabilities as soon as they are disclosed.

☐ ☆ ✇ Dark Reading:

Time Constraints Hamper Security Awareness Programs

By: Edge Editors, Dark Reading — July 1st 2022 at 19:08
Even as more attacks target humans, lack of dedicated staff, relevant skills, and time are making it harder to develop a security-aware and engaged workforce, SANS says.

☐ ☆ ✇ Dark Reading:

Organizations Battling Phishing Malware, Viruses the Most

By: Edge Editors, Dark Reading — June 23rd 2022 at 01:24
Organizations may not frequently encounter malware targeting cloud systems or networking equipment, but the array of malware they do encounter just occasionally is no less disruptive or damaging. That is where the focus needs to be.

☐ ☆ ✇ Dark Reading:

Ransomware and Phishing Remain IT's Biggest Concerns

By: Edge Editors, Dark Reading — June 17th 2022 at 20:40
Security teams — who are already fighting off malware challenges — are also facing renewed attacks on cloud assets and remote systems.

☐ ☆ ✇ Dark Reading:

Most Common Threats in DBIR

By: Edge Editors, Dark Reading — May 25th 2022 at 22:11
Supply chain and ransomware attacks increased dramatically in 2021, which explains why so many data breaches in Verizon's "2022 Data Breach Investigations Report" were grouped as system intrusion.

☐ ☆ ✇ Dark Reading:

2022 Security Priorities: Staffing and Remote Work

By: Edge Editors, Dark Reading — April 30th 2022 at 02:00
A comprehensive security strategy balances technology, processes, and people — and hiring and retaining security personnel and securing the remote workforce are firmly people priorities.

☐ ☆ ✇ Dark Reading:

IT Teams Worry Staff Lack Cloud-Specific Skills

By: Edge Editors, Dark Reading — April 28th 2022 at 21:42
Security, cost, and reliability top the list of concerns IT teams have about their cloud operations, according to a recent report.

☐ ☆ ✇ Dark Reading:

Adversaries Look for 'Attackability' When Selecting Targets

By: Edge Editors, Dark Reading — April 19th 2022 at 13:35
A large number of enterprise applications are affected by the vulnerability in Log4j, but adversaries aren't just looking for the most common applications. They are looking for targets that are easier to exploit and/or have the biggest payoff.

☐ ☆ ✇ Dark Reading:

Upgrades for Spring Framework Have Stalled

By: Edge Editors, Dark Reading — April 16th 2022 at 01:10
Upgrading and fixing the vulnerability in the Spring Framework doesn't seem to have the same level of urgency or energy as patching the Log4j library did back in December.

☐ ☆ ✇ Dark Reading:

Precursor Malware Is an Early Warning Sign for Ransomware

By: Edge Editors, Dark Reading — March 29th 2022 at 21:48
Ransomware typically relies on malware downloaders and other delivery mechanisms. Detecting and removing precursor malware improves the odds that a ransomware attack has been blocked.

☐ ☆ ✇ Dark Reading:

Downloaders Currently the Most Prevalent Android Malware

By: Edge Editors, Dark Reading — March 24th 2022 at 22:21
Of the top 10 Trojans targeting Android devices, downloaders and infostealers accounted for 87% of detections in February, Bitdefender says.

☐ ☆ ✇ Dark Reading:

Security Teams Need to Investigate the Okta Breach Themselves

By: Edge Editors, Dark Reading — March 22nd 2022 at 22:54
Trust, but verify. While organizations wait for official alerts and notifications from Okta, security teams should also begin their own investigations to determine whether they have been exposed.

☐ ☆ ✇ Dark Reading:

Security Teams Struggle to Get Started With Zero Trust

By: Edge Editors, Dark Reading — March 18th 2022 at 18:00
Nearly a third of respondents in a Dark Reading survey on endpoint security strategy say zero trust is too confusing to implement.

☐ ☆ ✇ Dark Reading:

Name That Edge Toon: Animal Instincts

By: Edge Editors, Dark Reading — March 7th 2022 at 22:08
Come up with a clever caption, and our panel of experts will reward the winner with a $25 Amazon gift card.

☐ ☆ ✇ Dark Reading:

After a Busy December, Attacks on Log4j Vulnerability Dropped

By: Edge Editors, Dark Reading — March 4th 2022 at 23:32
While attackers and researchers shift their attention to the next new vulnerability, security teams make sure they finish patching vulnerable Log4j versions in their applications and services.

☐ ☆ ✇ Dark Reading:

Security Teams Expect Attackers to Go After End Users First

By: Edge Editors, Dark Reading — February 17th 2022 at 19:30
Phishing, malware, and ransomware have spurred organizations to increase their investments in endpoint security, according to Dark Reading’s Endpoint Security Survey.

☐ ☆ ✇ Dark Reading:

The 3 Most Common Causes of Data Breaches in 2021

By: Edge Editors, Dark Reading — February 4th 2022 at 21:23
Phishing, smishing, and business email compromise continue to do their dirty work.

☐ ☆ ✇ Dark Reading:

IT Pros May Use Cloud, But They Trust On-Prem More

By: Edge Editors, Dark Reading — January 27th 2022 at 02:00
While opinions about the trustworthiness of the cloud are split, everyone believes that's where hackers will focus their efforts.

☐ ☆ ✇ Dark Reading:

Fraud Is On the Rise, and It's Going to Get Worse

By: Edge Editors, Dark Reading — January 21st 2022 at 21:30
The acceleration of the digital transformation resulted in a surge of online transactions, greater adoption of digital payments, and increased fraud.

☐ ☆ ✇ Dark Reading:

End Users Remain Organizations' Biggest Security Risk

By: Edge Editors, Dark Reading — January 18th 2022 at 22:00
Yet they're showing signs of improvement across several important areas, a Dark Reading survey reveals.

☐ ☆ ✇ Dark Reading:

Enterprises Worry About Increased Data Risk in Cloud

By: Edge Editors, Dark Reading — January 6th 2022 at 23:27
The 2021 Strategic Security Survey highlights concerns related to the cloud environment, such as the ability to detect breaches and the increasing number of attacks against cloud systems.

☐ ☆ ✇ Dark Reading:

How Risky Is the Log4J Vulnerability?

By: Edge Editors, Dark Reading — December 17th 2021 at 20:53
Security teams around the world are on high alert dealing with the Log4j vulnerability, but how risky is it, really?

☐ ☆ ✇ Dark Reading:

Cisco's Ash Devata on Securing the Hybrid Workforce With Zero Trust

By: Edge Editors, Dark Reading — December 15th 2021 at 02:19
Hybrid work is here to stay, and organizations can apply zero trust's three core principles to ensure a secure workforce, Devata says.

☐ ☆ ✇ Dark Reading:

NIST Cyber-Resiliency Framework Extended to Include Critical Infrastructure Controls

By: Edge Editors, Dark Reading — December 10th 2021 at 21:47
The latest NIST publication outlines how organizations can build systems that can anticipate, withstand, recover from, and adapt to cyberattacks.

☐ ☆ ✇ Dark Reading:

Ripple Effects Felt Across the Internet With AWS Outage

By: Edge Editors, Dark Reading — December 7th 2021 at 23:14
AWS Console was among the many services that were unavailable during the outage at Amazon Web Services.

☐ ☆ ✇ Dark Reading:

Phishing Remains the Most Common Cause of Data Breaches, Survey Says

By: Edge Editors, Dark Reading — November 29th 2021 at 22:03
Despite heightened concerns over ransomware, fewer organizations in a Dark Reading survey reported being an actual victim of a ransomware attack over the past year.

☐ ☆ ✇ Dark Reading:

Suppliers, Cloud Providers Are Threats to Enterprise Data, Survey Says

By: Edge Editors, Dark Reading — November 16th 2021 at 23:06
Other threats to enterprise data include cybercriminals, authorized users, foreign governments, and application vulnerabilities, according to Dark Reading's recent Strategic Security Report.

☐ ☆ ✇ Dark Reading:

Defenders Worry Orgs Are More Vulnerable Than Last Year

By: Edge Editors, Dark Reading — October 27th 2021 at 21:17
Most IT and security leaders are confident their cybersecurity strategies are on the right track, but they still believe their organizations are as vulnerable as they were a year ago.

☐ ☆ ✇ Dark Reading:

Enterprise Cybersecurity Strategies Are Getting More Attention

By: Edge Editors, Dark Reading — October 19th 2021 at 21:22
Data in Dark Reading's "2021 Strategic Security Survey" report suggest organizations are taking the security challenge seriously.

☐ ☆ ✇ Dark Reading:

High-Profile Breaches Are Shifting Enterprise Security Strategy

By: Edge Editors, Dark Reading — October 12th 2021 at 21:00
Increased media attention is driving changes in enterprise security strategy -- some positive, some negative.

☐ ☆ ✇ Dark Reading:

Loss of Intellectual Property, Customer Data Pose Greatest Business Risks

By: Edge Editors, Dark Reading — October 5th 2021 at 20:44
The slightly "good" news? Security professionals are a little less concerned about certain threats than last year, according to Dark Reading's "State of Incident Response 2021" report.

☐ ☆ ✇ Dark Reading:

Outsourced Software Poses Greater Risks to Enterprise Application Security

By: Edge Editors, Dark Reading — September 28th 2021 at 21:47
In the wake of SolarWinds and other third-party attacks, security teams worry that outsourced applications pose risks to an organization's application security, according to Dark Reading's recent "How Enterprises Are Developing Secure Applications" report.

☐ ☆ ✇ Dark Reading:

Edge Chat With Cisco Secure CTO TK Keanini on Achieving Better Security Outcomes

By: Edge Editors, Dark Reading — November 9th 2021 at 06:37
Now is the time for organizations to rethink their security strategies with a platform- and architecture-based approach in mind. Keanini explains.

❌