FreshRSS

🔒
❌ Secure Planet Training Courses Updated For 2019 - Click Here
There are new available articles, click to refresh the page.
Before yesterdayYour RSS feeds

Enterprises Need to Do More to Assure Consumers About Privacy

Organizations care about data privacy, but their priorities appear to be different from what their customers think are important.

Credential Harvesting Is Retail Industry's Top Threat

Why bother with new tactics and exploits when the old tricks are still effective?

The Insecurities of Cybersecurity Success

Becoming a big wheel doesn't have to cost your happiness, but grind culture makes that likely.

No Motivation for Quantum Without Regulatory Push

What's it going to take to prod organizations to implement a post-quantum security plan? Legislative pressure.

Key Takeaways From the Twitter Whistleblower's Testimony

Twitter did not know what data it had or who had access to it, Peiter "Mudge" Zatko told Congressional lawmakers during a Senate panel hearing.

Ghost Data Increases Enterprise Business Risk

IT has to get its hands around cloud data sprawl. Another area of focus should be on ghost data, as it expands the organization's cloud attack surface.

A Peek Into CISA's Post-Quantum Cryptography Roadmap

To help organizations with their plans, NIST and the Department of Homeland Security developed the Post-Quantum Cryptography Roadmap.

NIST Weighs in on AI Risk

NIST is developing the AI Risk Management Framework and a companion playbook to help organizations navigate algorithmic bias and risk.

Cybercriminals Weaponizing Ransomware Data for BEC Attacks

Attacked once, victimized multiple times: Data marketplaces are making it easier for threat actors to find and use data exfiltrated during ransomware attacks in follow-up attacks.

What Worries Security Teams About the Cloud?

What issues are cybersecurity professionals concerned about in 2022? You tell us!

Attackers Have 'Favorite' Vulnerabilities to Exploit

While attackers continue to rely on older, unpatched vulnerabilities, many are jumping on new vulnerabilities as soon as they are disclosed.

Time Constraints Hamper Security Awareness Programs

Even as more attacks target humans, lack of dedicated staff, relevant skills, and time are making it harder to develop a security-aware and engaged workforce, SANS says.

Organizations Battling Phishing Malware, Viruses the Most

Organizations may not frequently encounter malware targeting cloud systems or networking equipment, but the array of malware they do encounter just occasionally is no less disruptive or damaging. That is where the focus needs to be.

Ransomware and Phishing Remain IT's Biggest Concerns

Security teams — who are already fighting off malware challenges — are also facing renewed attacks on cloud assets and remote systems.

Most Common Threats in DBIR

Supply chain and ransomware attacks increased dramatically in 2021, which explains why so many data breaches in Verizon's "2022 Data Breach Investigations Report" were grouped as system intrusion.

2022 Security Priorities: Staffing and Remote Work

A comprehensive security strategy balances technology, processes, and people — and hiring and retaining security personnel and securing the remote workforce are firmly people priorities.

IT Teams Worry Staff Lack Cloud-Specific Skills

Security, cost, and reliability top the list of concerns IT teams have about their cloud operations, according to a recent report.

Adversaries Look for 'Attackability' When Selecting Targets

A large number of enterprise applications are affected by the vulnerability in Log4j, but adversaries aren't just looking for the most common applications. They are looking for targets that are easier to exploit and/or have the biggest payoff.

Upgrades for Spring Framework Have Stalled

Upgrading and fixing the vulnerability in the Spring Framework doesn't seem to have the same level of urgency or energy as patching the Log4j library did back in December.

Precursor Malware Is an Early Warning Sign for Ransomware

Ransomware typically relies on malware downloaders and other delivery mechanisms. Detecting and removing precursor malware improves the odds that a ransomware attack has been blocked.

Downloaders Currently the Most Prevalent Android Malware

Of the top 10 Trojans targeting Android devices, downloaders and infostealers accounted for 87% of detections in February, Bitdefender says.

Security Teams Need to Investigate the Okta Breach Themselves

Trust, but verify. While organizations wait for official alerts and notifications from Okta, security teams should also begin their own investigations to determine whether they have been exposed.

Security Teams Struggle to Get Started With Zero Trust

Nearly a third of respondents in a Dark Reading survey on endpoint security strategy say zero trust is too confusing to implement.

Name That Edge Toon: Animal Instincts

Come up with a clever caption, and our panel of experts will reward the winner with a $25 Amazon gift card.

After a Busy December, Attacks on Log4j Vulnerability Dropped

While attackers and researchers shift their attention to the next new vulnerability, security teams make sure they finish patching vulnerable Log4j versions in their applications and services.

Security Teams Expect Attackers to Go After End Users First

Phishing, malware, and ransomware have spurred organizations to increase their investments in endpoint security, according to Dark Reading’s Endpoint Security Survey.

The 3 Most Common Causes of Data Breaches in 2021

Phishing, smishing, and business email compromise continue to do their dirty work.

IT Pros May Use Cloud, But They Trust On-Prem More

While opinions about the trustworthiness of the cloud are split, everyone believes that's where hackers will focus their efforts.

Fraud Is On the Rise, and It's Going to Get Worse

The acceleration of the digital transformation resulted in a surge of online transactions, greater adoption of digital payments, and increased fraud.

End Users Remain Organizations' Biggest Security Risk

Yet they're showing signs of improvement across several important areas, a Dark Reading survey reveals.

Enterprises Worry About Increased Data Risk in Cloud

The 2021 Strategic Security Survey highlights concerns related to the cloud environment, such as the ability to detect breaches and the increasing number of attacks against cloud systems.

How Risky Is the Log4J Vulnerability?

Security teams around the world are on high alert dealing with the Log4j vulnerability, but how risky is it, really?

Cisco's Ash Devata on Securing the Hybrid Workforce With Zero Trust

Hybrid work is here to stay, and organizations can apply zero trust's three core principles to ensure a secure workforce, Devata says.

NIST Cyber-Resiliency Framework Extended to Include Critical Infrastructure Controls

The latest NIST publication outlines how organizations can build systems that can anticipate, withstand, recover from, and adapt to cyberattacks.

Ripple Effects Felt Across the Internet With AWS Outage

AWS Console was among the many services that were unavailable during the outage at Amazon Web Services.

Phishing Remains the Most Common Cause of Data Breaches, Survey Says

Despite heightened concerns over ransomware, fewer organizations in a Dark Reading survey reported being an actual victim of a ransomware attack over the past year.

Suppliers, Cloud Providers Are Threats to Enterprise Data, Survey Says

Other threats to enterprise data include cybercriminals, authorized users, foreign governments, and application vulnerabilities, according to Dark Reading's recent Strategic Security Report.

Defenders Worry Orgs Are More Vulnerable Than Last Year

Most IT and security leaders are confident their cybersecurity strategies are on the right track, but they still believe their organizations are as vulnerable as they were a year ago.

Enterprise Cybersecurity Strategies Are Getting More Attention

Data in Dark Reading's "2021 Strategic Security Survey" report suggest organizations are taking the security challenge seriously.

High-Profile Breaches Are Shifting Enterprise Security Strategy

Increased media attention is driving changes in enterprise security strategy -- some positive, some negative.

Loss of Intellectual Property, Customer Data Pose Greatest Business Risks

The slightly "good" news? Security professionals are a little less concerned about certain threats than last year, according to Dark Reading's "State of Incident Response 2021" report.

Outsourced Software Poses Greater Risks to Enterprise Application Security

In the wake of SolarWinds and other third-party attacks, security teams worry that outsourced applications pose risks to an organization's application security, according to Dark Reading's recent "How Enterprises Are Developing Secure Applications" report.

Edge Chat With Cisco Secure CTO TK Keanini on Achieving Better Security Outcomes

Now is the time for organizations to rethink their security strategies with a platform- and architecture-based approach in mind. Keanini explains.

❌