News & Commentary

News

The strangest connected devices are showing up, and the threats they pose to security should not be overlooked. Jai Vijayan ByContributing Writer, 9/16/2020 0 comments Read | Post a Comment

News

Researchers examine security incidents over the past several years that seemingly connect North Korea's Lazarus Group with Russian-speaking attackers. Kelly Sheridan ByStaff Editor, Dark Reading, 9/16/2020 0 comments Read | Post a Comment

Quick Hits

Attacks grew in number, size, and sophistication as the coronavirus pandemic took hold. Curtis Franklin Jr. BySenior Editor at Dark Reading, 9/16/2020 0 comments Read | Post a Comment

The newly discovered form of HTTP request smuggling could have widespread impact because any proxy can be affected, researchers say. Here's what infosec pros should know. Seth Rosenblatt ByContributing Writer, 9/16/2020 0 comments Read | Post a Comment

News

After the pandemic, companies will continue to invest in improving IT infrastructure and security as well as automate tasks to reduce errors and improve network resiliency. Steve Zurier ByContributing Writer, 9/16/2020 0 comments Read | Post a Comment

Quick Hits

The five Chinese nationals are among seven defendants arrested for intrusion campaigns into more than 100 organizations, the DoJ reports. Dark Reading Staff By, 9/16/2020 0 comments Read | Post a Comment

Commentary

Most firewalls and security devices effectively protect systems and data, but are they enough to safeguard business-critical applications? Juan Pablo Perez-Etchegoyen ByCTO, Onapsis, 9/16/2020 0 comments Read | Post a Comment

News

The Cybersecurity and Infrastructure Security Agency will become a peer of MITRE in the CVE program, likely leading to continued increases in disclosed vulnerabilities. Robert Lemos ByContributing Writer, 9/16/2020 1 Comment Read | Post a Comment

News

Security Pro File: Award-winning computer scientist and electronic voting expert Barbara Simons chats up her pioneering days in computer programming, paper-ballot backups, Internet voting, math, and sushi. Kelly Jackson Higgins ByExecutive Editor at Dark Reading, 9/16/2020 0 comments Read | Post a Comment

Commentary

While the demand for cybersecurity talent rebounds, organizations will need to focus on cyber-enabled roles to fill immediate skills gaps. Simone Petrella ByChief Executive Officer, CyberVista, 9/16/2020 0 comments Read | Post a Comment

News

News

As more organizations face disruptions, a defined approach to recovery is imperative so they can successfully recover, experts say. Kelly Sheridan ByStaff Editor, Dark Reading, 9/15/2020 0 comments Read | Post a Comment

News

Without the right reinforcements, you could be barking at the moon. Joshua Goldfarb ByIndependent Consultant, 9/15/2020 0 comments Read | Post a Comment

Quick Hits

CISA has issued an alert following the discovery of publicly available exploit code for Windows elevation of privilege flaw CVE-2020-1472. Dark Reading Staff By, 9/15/2020 0 comments Read | Post a Comment

Commentary

As many organizations pivot to working from home, here are some considerations for prioritizing the new security protocols. A.N. Ananth ByPresident, Netsurion, 9/15/2020 0 comments Read | Post a Comment

Quick Hits

Commentary

Finding threats in encrypted inbound network traffic is complex and expensive for enterprises, but a fascinating new approach could eliminate the need for decryption. Eric Parizo BySenior Analyst, Omdia, 9/15/2020 0 comments Read | Post a Comment

Commentary

By building a privacy-forward culture from the ground up and automating processes, organizations can simplify their approach to privacy and be prepared for any upcoming regulations. Hilary Wandall BySenior Vice President, Privacy Intelligence and General Counsel at TrustArc, 9/15/2020 0 comments Read | Post a Comment

News