Category: Dark Reading

How CISOs Can Craft Better Narratives for the Board

Communicating cyber-risk upward to C-suite and board takes simplification and better understanding of the audience. This article has been indexed from Dark Reading Read the original article: How CISOs Can Craft Better Narratives for the Board

Name That Toon: Lucky Charm

Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card. This article has been indexed from Dark Reading Read the original article: Name That Toon: Lucky Charm

Top 5 Data Security RSAC 2023 Sessions to Attend

A little preconference reconnoitering of upcoming seminars, keynotes, and track sessions makes plotting your days easier. Here’s one attendee’s list. This article has been indexed from Dark Reading Read the original article: Top 5 Data Security RSAC 2023 Sessions to…

Software-Dependency Data Delivers Security to Developers

Google has opened up its software-dependency database, adding to the security data available to developers and tool makers. Now developers need to use it. This article has been indexed from Dark Reading Read the original article: Software-Dependency Data Delivers Security…

Security Is a Revenue Booster, Not a Cost Center

Focusing on what customers and partners need from a company can help CISOs show the real financial benefits of improving cybersecurity. This article has been indexed from Dark Reading Read the original article: Security Is a Revenue Booster, Not a…

What the Recent Collapse of SVB Means for Privacy

Businesses must be diligent in their actions, cultivate awareness with employees, and implement strict standards around external communications in the wake of Silicon Valley Bank’s collapse. This article has been indexed from Dark Reading Read the original article: What the…

Why the US Needs Quantum-Safe Cryptography Deployed Now

Quantum computers might be a decade away, but guess how long it will take to switch systems over to post-quantum cryptography? This article has been indexed from Dark Reading Read the original article: Why the US Needs Quantum-Safe Cryptography Deployed…

The Internet Reform Trilemma

An “open” Internet faces challenges from autocratic governance models. Policymakers should instead think about creating an Internet that’s equitable, inclusive, and secure. This article has been indexed from Dark Reading Read the original article: The Internet Reform Trilemma

Opera Adds Free VPN to Opera for iOS

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Dark Reading Read the original article: Opera Adds Free VPN to Opera for iOS

CrowdStrike Expands Falcon to Include IoT

CrowdStrike Falcon Insight for IoT covers Internet of Things, Industrial IoT, Operations Technology, as well as medical devices. This article has been indexed from Dark Reading Read the original article: CrowdStrike Expands Falcon to Include IoT

Where Are the Women? Making Cybersecurity More Inclusive

Stepped-up recruiting efforts along with better work-life balance policies and mentoring and recruitment programs will help balance the scales. This article has been indexed from Dark Reading Read the original article: Where Are the Women? Making Cybersecurity More Inclusive

How Password Managers Can Get Hacked

Password managers aren’t foolproof, but they do help mitigate risks from weak credentials and password reuse. Following best practices can contribute to a company’s defenses. This article has been indexed from Dark Reading Read the original article: How Password Managers…

How and Why to Put Multicloud to Work

Complex multicloud environments present organizations with security challenges, but also opportunities for efficiency. This article has been indexed from Dark Reading Read the original article: How and Why to Put Multicloud to Work

Printers Pose Persistent Yet Overlooked Threat

Vulnerabilities in the device firmware and drivers underscore how printers cannot be set-and-forget technology and need to be managed. This article has been indexed from Dark Reading Read the original article: Printers Pose Persistent Yet Overlooked Threat

TikTok, Other Mobile Apps Violate Privacy Regulations

App developers are ignoring laws and guidelines regulating data protection measures aimed at minors, putting their monetization plans in jeopardy and risking user trust. This article has been indexed from Dark Reading Read the original article: TikTok, Other Mobile Apps…

Fight AI With AI

By developing new tools to defend against adversarial AI, companies can help ensure that AI is developed and used in a responsible and safe manner. This article has been indexed from Dark Reading Read the original article: Fight AI With…

Twitter ‘Shadow Ban’ Bug Gets Official CVE

A flaw in Twitter code allows bot abuse to trick the algorithm into suppressing certain accounts. This article has been indexed from Dark Reading Read the original article: Twitter ‘Shadow Ban’ Bug Gets Official CVE

Styx Marketplace Provides Hub for Financial Cybercrime

An emerging, illicit marketplace proves that financial cybercrime is still on the rise, with a need for countries to collectively put safeguards in place. This article has been indexed from Dark Reading Read the original article: Styx Marketplace Provides Hub…

QNAP Zero-Days Leave 80K Devices Vulnerable to Cyberattack

Multiple QNAP operating systems are affected, including QTS, QuTS hero, QuTScloud, and QVP Pro appliances, and some don’t yet have patches available. This article has been indexed from Dark Reading Read the original article: QNAP Zero-Days Leave 80K Devices Vulnerable…

3 Fronts in the Battle for Digital Identity

As both digital protection strategies and digital attacks become more sophisticated, organizations that know the terrain have a better chance of navigating it. This article has been indexed from Dark Reading Read the original article: 3 Fronts in the Battle…

New GRC Platform TrustRegister Links Risk to Revenue Impact

The new TrustRegister application allows companies to proactively surface risks and remediation plans via programmatic risk assessments. This article has been indexed from Dark Reading Read the original article: New GRC Platform TrustRegister Links Risk to Revenue Impact

eFile Tax Return Software Found Serving Up Malware

In the height of tax-return season, a popular tax prep software service leaves a malicious JavaScript file online for weeks. This article has been indexed from Dark Reading Read the original article: eFile Tax Return Software Found Serving Up Malware

What RASP Should Have Been

When runtime application self-protection is held to a higher standard, it can secure thousands of applications and prevent burnout in security teams. This article has been indexed from Dark Reading Read the original article: What RASP Should Have Been

How Strategic Investors Can Help Cybersecurity Startups

Cybersecurity startups face pressure during this economic uncertainty, but strategic investors can help them succeed in providing tech that defends against cyberattacks. This article has been indexed from Dark Reading Read the original article: How Strategic Investors Can Help Cybersecurity…

Designing Tabletop Exercises That Actually Thwart Attacks

Have you ever wondered how they design blue team exercises? One ransomware and cyber extortion simulation demonstrates the best practices. This article has been indexed from Dark Reading Read the original article: Designing Tabletop Exercises That Actually Thwart Attacks

Data Breach Strikes Western Digital

The company behind digital storage brand SanDisk says its systems were compromised on March 26. This article has been indexed from Dark Reading Read the original article: Data Breach Strikes Western Digital

Name That Edge Toon: Tower of Babble

Come up with a clever caption, and our panel of experts will reward the winner with a $25 Amazon gift card. This article has been indexed from Dark Reading Read the original article: Name That Edge Toon: Tower of Babble

How Good Is Your Advanced Threat Management?

Whether protecting a financial institution or a hospital, everyone needs an effective strategy for fending off slippery threats like those that hide in memory. This article has been indexed from Dark Reading Read the original article: How Good Is Your…

Elastic Expands Cloud Security Capabilities for AWS

Launching CSPM, container workload security, and cloud vulnerability management to modernize cloud security operations. This article has been indexed from Dark Reading Read the original article: Elastic Expands Cloud Security Capabilities for AWS

How to Solve IoT’s Identity Problem

Network protocols can be used to identify operating systems and discern other device information. This article has been indexed from Dark Reading Read the original article: How to Solve IoT’s Identity Problem