News

Online Security autonomously blocks malicious URLs, extensions, ad trackers, and pop-ups 24/7, protecting consumers from complex and rapidly evolving cyber threats online.
Welcome to CISO Corner, Dark Reading's weekly digest of articles tailored specifically to security operations readers and security leaders. Every week, we'll offer articles gleaned from across our ...
As a result, many solutions have been found wanting, with 44% of CISOs reporting they were unable to detect a data breach in the past year using their existing security tools. API is a classic ...
Continuously evaluating and updating your third-party risk assessment can improve your security posture and ensure your company doesn't have the next headline-making incident.
Threats to Cloud Security from AI Bias We refer to AI bias as a hidden threat to cloud security because we often don't know that bias is present unless we specifically look for it — or until it ...
Great CISOs are in short supply, so choose wisely. Here are five ways to make sure you've made the right pick. Martha Heller, CEO, Heller Search October 29, 2024 4 MinRead Source: Borka Kiss via ...
In targeting executives at a COVID research firm, state-sponsored threat group ITG18 made some mistakes. Here's how IBM X-Force used that to their advantage.
Remote Workforce Сloud Security Mobile Security Insider Threats Commentary Name That Toon: Incentives Name That Toon: IncentivesName That Toon: Incentives ...
The Workforce Representation Gap Every year, more men and women enter cybersecurity, driven by the sector's explosive growth in response to increasingly sophisticated threats. In 2023, the global ...
A Call to Action The time has come for cybersecurity professionals to rethink their approach to supply chain security. Traditional vendor risk management practices are no longer sufficient in ...
Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card. John Klossner, Cartoonist July 16, 2024 1 MinRead Source: John Klossner ...
Vulnerabilities & Threats Cybersecurity Operations Commentary White House's Call for Memory Safety Brings Challenges, Changes & Costs White House's Call for Memory Safety Brings Challenges ...