News & Commentary

News

Researchers examine security incidents over the past several years that seemingly connect North Korea's Lazarus Group with Russian-speaking attackers. Kelly Sheridan ByStaff Editor, Dark Reading, 9/16/2020 0 comments Read | Post a Comment

Quick Hits

Attacks grew in number, size, and sophistication as the coronavirus pandemic took hold. Curtis Franklin Jr. BySenior Editor at Dark Reading, 9/16/2020 0 comments Read | Post a Comment

Quick Hits

The five Chinese nationals are among seven defendants arrested for intrusion campaigns into more than 100 organizations, the DoJ reports. Dark Reading Staff By, 9/16/2020 0 comments Read | Post a Comment

Commentary

Most firewalls and security devices effectively protect systems and data, but are they enough to safeguard business-critical applications? Juan Pablo Perez-Etchegoyen ByCTO, Onapsis, 9/16/2020 0 comments Read | Post a Comment

News

The Cybersecurity and Infrastructure Security Agency will become a peer of MITRE in the CVE program, likely leading to continued increases in disclosed vulnerabilities. Robert Lemos ByContributing Writer, 9/16/2020 0 comments Read | Post a Comment

News

Security Pro File: Award-winning computer scientist and electronic voting expert Barbara Simons chats up her pioneering days in computer programming, paper-ballot backups, Internet voting, math, and sushi. Kelly Jackson Higgins ByExecutive Editor at Dark Reading, 9/16/2020 0 comments Read | Post a Comment

Commentary

While the demand for cybersecurity talent rebounds, organizations will need to focus on cyber-enabled roles to fill immediate skills gaps. Simone Petrella ByChief Executive Officer, CyberVista, 9/16/2020 0 comments Read | Post a Comment

Quick Hits

CISA has issued an alert following the discovery of publicly available exploit code for Windows elevation of privilege flaw CVE-2020-1472. Dark Reading Staff By, 9/15/2020 0 comments Read | Post a Comment

Commentary

As many organizations pivot to working from home, here are some considerations for prioritizing the new security protocols. A.N. Ananth ByPresident, Netsurion, 9/15/2020 0 comments Read | Post a Comment

Quick Hits

Commentary

By building a privacy-forward culture from the ground up and automating processes, organizations can simplify their approach to privacy and be prepared for any upcoming regulations. Hilary Wandall BySenior Vice President, Privacy Intelligence and General Counsel at TrustArc, 9/15/2020 0 comments Read | Post a Comment

News

In a letter, almost 70 different security firms and individual researchers criticize Voatz for misrepresenting to the US Supreme Court widely accepted security research practices. Robert Lemos ByContributing Writer, 9/14/2020 0 comments Read | Post a Comment

News

Pen-test results also show a majority of organizations have few protections against attackers already on the network. Jai Vijayan ByContributing Writer, 9/14/2020 0 comments Read | Post a Comment

Quick Hits

The campaign targeted sites running Magento Version 1, a version of the e-commerce software that is past end-of-life. Dark Reading Staff By, 9/14/2020 0 comments Read | Post a Comment

Quick Hits

The ransomware attack has exposed internal documents from the court and knocked its website offline. Dark Reading Staff By, 9/14/2020 0 comments Read | Post a Comment

Quick Hits

Commentary

With open source developers regularly churning out new tools, the risk landscape has become too fragmented to properly monitor. Lech Sandecki ByProduct Strategy Manager at Canonical, the publisher of Ubuntu, 9/14/2020 0 comments Read | Post a Comment

News

Tricked-out home offices have led to an influx in printers, many of which have not been set up securely, leaving workers and their companies vulnerable. Robert Lemos ByContributing Writer, 9/14/2020 0 comments Read | Post a Comment

News

Commentary