Tag: Dark Reading:

SentinelOne Files S-1 for IPO

This article has been indexed from Dark Reading: The security company looks to raise up to $100 million in its IPO, its filing reveals. Read the original article: SentinelOne Files S-1 for IPO

Data Breaches Drive Higher Loan Interest Rates

This article has been indexed from Dark Reading: Businesses that suffer a security breach may not see their stock price tumble, but they may pay higher rates for loans and be forced to provide collateral, researchers report. Read the original…

Organizations Shift Further Left in App Development

This article has been indexed from Dark Reading: Most IT and security professionals surveyed think security is a critical enough reason to pause app development. Read the original article: Organizations Shift Further Left in App Development

Welcome to the New Workplace

This article has been indexed from Dark Reading: The pandemic has changed the landscape in which security pros work. Here are five ways how. Read the original article: Welcome to the New Workplace

The Perfect Storm for PAM to Grow In

This article has been indexed from Dark Reading: With more staff working remotely, privileged access management (or PAM) has never been more important. Market forecasts, drivers, and trends are explored. Read the original article: The Perfect Storm for PAM to…

REvil Behind JBS Ransomware Attack: FBI

This article has been indexed from Dark Reading: Officials attribute the attack to REvil/Sodinokibi and say they are working to bring the threat actors to justice. Read the original article: REvil Behind JBS Ransomware Attack: FBI

The True Cost of a Ransomware Attack

This article has been indexed from Dark Reading: Companies need to prepare for the costs of an attack now, before they get attacked. Here’s a checklist to help. Read the original article: The True Cost of a Ransomware Attack

Encryption Helps Companies Avoid Breach Notifications

This article has been indexed from Dark Reading: With nearly twice as many firms suffering a breach compared with the previous year, limiting the damage becomes more important, a survey finds. Read the original article: Encryption Helps Companies Avoid Breach…

Microsoft Buys ReFirm Labs to Drive IoT Security Efforts

This article has been indexed from Dark Reading: The acquisition will bring ReFirm’s firmware analysis capabilities alongside Microsoft’s Azure Defender for IoT to boost device security. Read the original article: Microsoft Buys ReFirm Labs to Drive IoT Security Efforts

A View from Inside a Deception

This article has been indexed from Dark Reading: Pen-testing today’s threat deception technology is not for the faint-hearted. Do modern deception tools truly frustrate adversaries, and are they ready for the enterprise SOC? Read the original article: A View from…

Is Your Adversary James Bond or Mr. Bean?

This article has been indexed from Dark Reading: Especially with nation-state attacks, its critical to assess whether you’re up against jet fighter strength or a bumbler who tries to pick locks. Read the original article: Is Your Adversary James Bond…

Processor Morphs Its Architecture to Make Hacking Really Hard

This article has been indexed from Dark Reading: Researchers create a processor that uses encryption to modify its memory architecture during runtime, making it very difficult for hackers to exploit memory-based vulnerabilities. Read the original article: Processor Morphs Its Architecture…

New Barebones Ransomware Strain Surfaces

This article has been indexed from Dark Reading: The authors of Epsilon Red have offloaded many tasks that are usually integrated into the ransomware — such as Volume Shadow Copy deletion — to PowerShell scripts. Read the original article: New…

Meat Producer JBS USA Hit By Ransomware Attack

This article has been indexed from Dark Reading: The company says recovery from the attack may delay transactions with customers and suppliers. Read the original article: Meat Producer JBS USA Hit By Ransomware Attack

Name That Edge Toon: In Tow

This article has been indexed from Dark Reading: Feeling creative? Submit your caption in the comments, and our panel of experts will reward the winner with a $25 Amazon gift card. Read the original article: Name That Edge Toon: In…

CISO Confidence Is Rising, but Issues Remain

This article has been indexed from Dark Reading: New research reveals how global CISOs dealt with COVID-19 and their plans for 2022-2023. Read the original article: CISO Confidence Is Rising, but Issues Remain

3 SASE Misconceptions to Consider

This article has been indexed from Dark Reading: SASE is all the rage, promising things IT leaders have long dreamed about, but a purist approach may create consequences. Read the original article: 3 SASE Misconceptions to Consider

Chart: Cloud Concerns

This article has been indexed from Dark Reading: As more organizations make their way to the cloud, their eyes are wide open to the associated cybersecurity risks that tag along for the ride. Read the original article: Chart: Cloud Concerns

Plug-ins for Code Editors Pose Developer-Security Threat

This article has been indexed from Dark Reading: There are two critical vulnerabilities in plug-ins for the popular Visual Studio Code editor, now patched, but security firm Snyk warns that popular plug-ins could put development environments in jeopardy. Read the…

‘Have I Been Pwned’ Code Base Now Open Source

This article has been indexed from Dark Reading: Founder Troy Hunt also announces the platform will receive compromised passwords the FBI finds in its investigations. Read the original article: ‘Have I Been Pwned’ Code Base Now Open Source

Let’s Stop Blaming Employees for Our Data Breaches

This article has been indexed from Dark Reading: Assuming employees want to steal trade secrets pits them against your security teams, creates stress and reduces productivity. Read the original article: Let’s Stop Blaming Employees for Our Data Breaches

Google Discovers New Rowhammer Attack Technique

This article has been indexed from Dark Reading: Researchers publish the details of a new Rowhammer vulnerability called “Half-Double” that exploits increasingly smaller DRAM chips. Read the original article: Google Discovers New Rowhammer Attack Technique

Zscaler Buys Deception Technology Startup

This article has been indexed from Dark Reading: ZScaler’s CEO says Smokescreen Technologies’ capabilities will be integrated with Zscaler’s ZIA and ZPA products. Read the original article: Zscaler Buys Deception Technology Startup

Bug Bounties and the Cobra Effect

This article has been indexed from Dark Reading: Are bug bounty programs allowing software companies to skirt their responsibility to make better, more secure products from the get-go? Read the original article: Bug Bounties and the Cobra Effect

Russia Profiting from Massive Hydra Cybercrime Marketplace

This article has been indexed from Dark Reading: An analysis of Bitcoin transactions from the Hydra marketplace show that the operators are locking sellers into Russian exchanges, likely fueling profits for local actors. Read the original article: Russia Profiting from…

Cloud Compromise Costs Organizations $6.2M Per Year

This article has been indexed from Dark Reading: Organizations reported an average of 19 cloud-based compromises in the past year, but most don’t evaluate the security of SaaS apps before deployment. Read the original article: Cloud Compromise Costs Organizations $6.2M…

MacOS Zero-Day Let Attackers Bypass Privacy Preferences

This article has been indexed from Dark Reading: Apple has released security patches for vulnerabilities in macOS and tvOS that reports indicate have been exploited in the wild. Read the original article: MacOS Zero-Day Let Attackers Bypass Privacy Preferences

The Makings of a Better Cybersecurity Hire

This article has been indexed from Dark Reading: Experience counts, but as one CISO has learned, don’t overlook a creative, motivated candidate just because their background doesn’t match the job description. Read the original article: The Makings of a Better…

The Adversary Within: Preventing Disaster From Insider Threats

This article has been indexed from Dark Reading: Insiders are in a position of trust, and their elevated permissions provide opportunities to cause serious harm to critical business applications and processes. Read the original article: The Adversary Within: Preventing Disaster…

Businesses Boost Security Budgets. Where Will the Money Go?

This article has been indexed from Dark Reading: Most organizations plan to spend more on security, leaders say in a report that explores their toughest challenges, post-breach costs, and spending priorities. Read the original article: Businesses Boost Security Budgets. Where…

SecTor

This article has been indexed from Dark Reading: This post doesn’t have text content, please click on the link below to view the original article. Read the original article: SecTor

Air India Confirms Data of 4.5M Travelers Compromised

This article has been indexed from Dark Reading: Affected data includes names, birthdates, contact information, passport details, and credit card data, the airline reports. Read the original article: Air India Confirms Data of 4.5M Travelers Compromised

Cartoon Caption Winner: Magic May

This article has been indexed from Dark Reading: And the winner of The Edge’s May cartoon caption contest is … Read the original article: Cartoon Caption Winner: Magic May

As Threat Hunting Matures, Malware Labs Emerge

This article has been indexed from Dark Reading: By leveraging their analysis outputs, security pros can update detection rules engines and establish a stronger security posture in the process. Read the original article: As Threat Hunting Matures, Malware Labs Emerge

Data in Danger Amid New IT Challenges

This article has been indexed from Dark Reading: Survey finds new threats due to the pandemic make managing enterprise cyber-risk even more challenging. Read the original article: Data in Danger Amid New IT Challenges

The Changing Face of Cybersecurity Awareness

This article has been indexed from Dark Reading: In the two decades since cybersecurity awareness programs emerged, they’ve been transformed from a good idea to a business imperative. Read the original article: The Changing Face of Cybersecurity Awareness

The Edge Poll: Moving On

This article has been indexed from Dark Reading: During the stresses of the pandemic, did you ever consider quitting security? Read the original article: The Edge Poll: Moving On

Dev-Sec Disconnect Undermines Secure Coding Efforts

This article has been indexed from Dark Reading: Rather than continue to complain about each other, developers and security pros need to work together and celebrate their successes. Read the original article: Dev-Sec Disconnect Undermines Secure Coding Efforts

Latest Security News From RSAC 2021

This article has been indexed from Dark Reading: Check out Dark Reading’s updated, exclusive coverage of the news and security themes that are dominating RSA Conference 2021. Read the original article: Latest Security News From RSAC 2021

Colonial Pipeline CEO Confirms Ransom Payment

This article has been indexed from Dark Reading: CEO Joseph Blount says the $4.4 million payment was a necessary decision amid high-stakes infrastructure disruption. Read the original article: Colonial Pipeline CEO Confirms Ransom Payment