News & Commentary

Quick Hits

Synopsys issues an advisory for vulnerabilities affecting the chipsets of wireless routers from Qualcomm, Mediatek, and Realtek. Dark Reading Staff By, 9/29/2020 0 comments Read | Post a Comment

Commentary

Enabling engineers to share responsibility for security and empowering them to erase common vulnerabilities are good starting points. Matias Madou ByCTO and co-founder, Secure Code Warrior, 9/29/2020 0 comments Read | Post a Comment

Commentary

Step up, put the architecture and organization in place, and take responsibility. If you don't, who will? Dan Hubbard ByCEO at Lacework, 9/29/2020 0 comments Read | Post a Comment

Commentary

News

At next week's virtual Black Hat Asia, threat intelligence pros will discuss the threats local organizations should prioritize and how they can prepare. Kelly Sheridan ByStaff Editor, Dark Reading, 9/25/2020 0 comments Read | Post a Comment

News

Application security in a DevOps world takes more than great teamwork among security, developers, and operations staff. Ericka Chickowski ByContributing Writer, 9/25/2020 0 comments Read | Post a Comment

News

Commentary

The wide variety of devices attached to the Internet of Things offers a rich target for purveyors of ransomware. Ed Koehler ByDistinguished Principal Security Engineer, Office of CTO, at Extreme Network, 9/25/2020 0 comments Read | Post a Comment

News

A now-patched remote code execution vulnerability could be exploited with a specially sized image file, researchers report. Kelly Sheridan ByStaff Editor, Dark Reading, 9/24/2020 0 comments Read | Post a Comment

Commentary

More explicit threat models can make security better and open the door to real and needed innovation. Adam Shostack ByConsultant, Entrepreneur, Technologist, Game Designer, 9/24/2020 0 comments Read | Post a Comment

Quick Hits

The Security Intelligence team at Microsoft is tracking newly waged exploits in the wild. Dark Reading Staff By, 9/24/2020 0 comments Read | Post a Comment

Commentary

These three steps will help organizations reduce long-term work-from-home security risks. Mike Wronski ByTechnical Director of Product Marketing, Nutanix, 9/24/2020 0 comments Read | Post a Comment

News

The e-commerce platform has alerted more than 100 merchants of a data breach, highlighting the danger of malicious insiders. Kelly Sheridan ByStaff Editor, Dark Reading, 9/23/2020 0 comments Read | Post a Comment

News

Lockdown economics are driving a threat-intelligence business boom. Chronicle Detect is Google's answer to monitoring so much log data created by the distributed workforce. Robert Lemos ByContributing Writer, 9/23/2020 0 comments Read | Post a Comment

News

News

The update, one of several announced today, is intended to help employees remain compliant when handling data across cloud applications. Kelly Sheridan ByStaff Editor, Dark Reading, 9/22/2020 0 comments Read | Post a Comment

Commentary

In today's COVID-19 era, managing access has become even more difficult, especially for large organizations. Here's how to get it "just right." Dotan Bar Noy ByCo-Founder and CEO, Authomize, 9/22/2020 0 comments Read | Post a Comment

News

More than three-quarters of IT executives worry that data sprawl puts their data at risk, especially with employees working from insecure home networks, survey finds. Robert Lemos ByContributing Writer, 9/21/2020 0 comments Read | Post a Comment

Quick Hits