Dark Reading
- TorchLight Expands Cybersecurity Services With MDR Sentinel in Partnership With Microsoft May 17, 2022MDR Sentinel expands TorchLight’s leading managed detection and response (MDR) services with turnkey SIEM and SOAR capabilities from Microsoft; TorchLight also announces it attains elite Microsoft Gold Partner Status
- RF Technologies Releases Safe Place Staff Protection for Healthcare Settings May 16, 2022RFT is expanding the Safe Place hospital market security system to include staff protection.
- 50% of Orgs Rely on Email to Manage Security May 16, 2022Even with dedicated identity management tools at their disposal, many companies — smaller ones especially — are sticking with email and spreadsheets for handling permissions.Dark Reading Staff, Dark Reading
- iPhones Open to Attack Even When Off, Researchers Say May 16, 2022Wireless chips that run when the iPhone iOS is shut down can be exploited.Dark Reading Staff, Dark Reading
- Open Source Security Gets $150M Boost From Industry Heavy Hitters May 16, 2022Maintainers of open source software (OSS) will gain additional security tools for their own projects, while the developers who use OSS — and about 97% of software does — will gain more data on security.Robert Lemos, Contributing Writer
- You Can't Opt Out of Citizen Development May 16, 2022To see why low-code/no-code is inevitable, we need to first understand how it finds its way into the enterprise.Michael Bargury, CTO & Co-Founder, Zenity
- NSA Cyber Chief Vows 'No Backdoors' in Quantum Encryption Standards May 16, 2022New quantum encryption standards will stand up to spy-snooping, NSA cybersecurity director said.Dark Reading Staff, Dark Reading
- Name That Toon: Knives Out May 16, 2022Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card.John Klossner, Cartoonist
- Critical Zyxel Firewall Bug Under Active Attack After PoC Exploit Debut May 16, 2022Just one day after disclosure, cyberattackers are actively going after the command-injection/code-execution vulnerability in Zyxel's gear.Tara Seals, Managing Editor, News
- US Cyber Director: Forging a Cybersecurity Social Contract Is Not Optional May 16, 2022In a Black Hat Asia keynote fireside chat, US national cyber director Chris Inglis outlined his vision of an effective cybersecurity public-private partnership strategy.Becky Bracken, Editor, Dark Reading
- Me, My Digital Self, and I: Why Identity Is the Foundation of a Decentralized Future May 16, 2022A decentralized future is a grand ideal, but secure management of private keys is the prerequisite to ensure the integrity of decentralized applications and services.Richard Searle, Vice President of Confidential Computing, Fortanix
- How to Turn a Coke Can Into an Eavesdropping Device May 14, 2022Cyber-researchers are testing the bounds of optical attacks with a technique that allows attackers to recover voice audio from meetings if there are shiny, lightweight objects nearby.Robert Lemos, Contributing Writer
- US Agrees to International Electronic Cybercrime Evidence Swap May 13, 2022The Budapest Convention is a multinational coalition that agrees to share electronic evidence across international jurisdictions to track down cybercriminals.Dark Reading Staff, Dark Reading
- CISO Shares Top Strategies to Communicate Security's Value to the Biz May 13, 2022In a keynote address at Black Hat Asia in Singapore this week, CISO and former NASA security engineer George Do discussed his go-to model for measuring security effectiveness – and getting others in the organization to listen.Tara Seals, Managing Editor, News
- Black Hat Asia: Democracy's Survival Depends on Taming Technology May 13, 2022The conference opens with stark outlook on the future of global democracy — currently squeezed between Silicon Valley and China.Becky Bracken, Editor, Dark Reading
- Linux, OpenSSF Champion Plan to Improve Open Source Security May 13, 2022The White House and tech industry pledge $150 million over two years to boost open source resiliency and supply chain security.Dark Reading Staff, Dark Reading
- Log4Shell Exploit Threatens Enterprise Data Lakes, AI Poisoning May 13, 2022A brand-new attack vector lays open enterprise data lakes, threatening grave consequences for AI use cases like telesurgery or autonomous cars.Tara Seals, Managing Editor, News
- Data Transformation: 3 Sessions to Attend at RSA 2022 May 13, 2022Three RSA 2022 sessions take deep dives into the security considerations around data cloud transformation.Liat Hayun, Co-Founder and CEO, Eureka Security
- How to Avoid Falling Victim to PayOrGrief's Next Rebrand May 13, 2022The group that shut down the second largest city in Greece was not new but a relaunch of DoppelPaymer.Oakley Cox, Director of Analysis, Darktrace
- Transforming SQL Queries Bypasses WAF Security May 12, 2022A team of university researchers finds a machine learning-based approach to generating HTTP requests that slip past Web application firewalls.Robert Lemos, Contributing Writer