News & Commentary

Quick Hits

Quick Hits

Synopsys issues an advisory for vulnerabilities affecting the chipsets of wireless routers from Qualcomm, Mediatek, and Realtek. Dark Reading Staff By, 9/29/2020 0 comments Read | Post a Comment

Commentary

Enabling engineers to share responsibility for security and empowering them to erase common vulnerabilities are good starting points. Matias Madou ByCTO and co-founder, Secure Code Warrior, 9/29/2020 0 comments Read | Post a Comment

Commentary

Step up, put the architecture and organization in place, and take responsibility. If you don't, who will? Dan Hubbard ByCEO at Lacework, 9/29/2020 0 comments Read | Post a Comment

Quick Hits

Commentary

News

While MFA can improve overall security posture, it's not a "silver bullet" -- and hacks continue. Robert Lemos ByContributing Writer, 9/28/2020 0 comments Read | Post a Comment

News

Until all domain controllers are updated, the entire infrastructure remains vulnerable, the DHS' CISA warns. Jai Vijayan ByContributing Writer, 9/25/2020 0 comments Read | Post a Comment

News

At next week's virtual Black Hat Asia, threat intelligence pros will discuss the threats local organizations should prioritize and how they can prepare. Kelly Sheridan ByStaff Editor, Dark Reading, 9/25/2020 0 comments Read | Post a Comment

News

Application security in a DevOps world takes more than great teamwork among security, developers, and operations staff. Ericka Chickowski ByContributing Writer, 9/25/2020 0 comments Read | Post a Comment

Commentary

The wide variety of devices attached to the Internet of Things offers a rich target for purveyors of ransomware. Ed Koehler ByDistinguished Principal Security Engineer, Office of CTO, at Extreme Network, 9/25/2020 0 comments Read | Post a Comment

News

Turns out, creating wireless ecosystems for a vast number of different architectures, configurations, and use cases is hard. Robert Lemos ByContributing Writer, 9/24/2020 0 comments Read | Post a Comment

News

A now-patched remote code execution vulnerability could be exploited with a specially sized image file, researchers report. Kelly Sheridan ByStaff Editor, Dark Reading, 9/24/2020 0 comments Read | Post a Comment

Commentary

More explicit threat models can make security better and open the door to real and needed innovation. Adam Shostack ByConsultant, Entrepreneur, Technologist, Game Designer, 9/24/2020 0 comments Read | Post a Comment

Quick Hits

CrowdStrike plans to use Preempt Security's conditional access technology to strengthen its Falcon platform. Dark Reading Staff By, 9/24/2020 0 comments Read | Post a Comment

Commentary

These three steps will help organizations reduce long-term work-from-home security risks. Mike Wronski ByTechnical Director of Product Marketing, Nutanix, 9/24/2020 0 comments Read | Post a Comment

News

The e-commerce platform has alerted more than 100 merchants of a data breach, highlighting the danger of malicious insiders. Kelly Sheridan ByStaff Editor, Dark Reading, 9/23/2020 0 comments Read | Post a Comment

Commentary

When applications are critical to the business's core functions, the CISO and their staff better get the security right. Jason Fruge ByVP of Business Application Cybersecurity, 9/23/2020 0 comments Read | Post a Comment

Commentary

It's not just technical expertise and certifications that enable analysts to build long-term careers in cybersecurity. Dov Lerner BySecurity Research Lead, Sixgill, 9/23/2020 0 comments Read | Post a Comment

News