Category: Dark Reading

7 Ways to Thwart Malicious Insiders

This article has been indexed from Dark Reading Malicious insider incidents may be less frequent than inadvertent user missteps, but they can cost organizations big time. Read the original article: 7 Ways to Thwart Malicious Insiders

Cloudflare Ventures into Simplifying Email Security

This article has been indexed from Dark Reading The company adds complex email security technologies — including the alphabet soup of SPF, DKIM, and DMARC — as part of its service. Read the original article: Cloudflare Ventures into Simplifying Email…

Consumers Share Security Fears as Risky Behaviors Persist

This article has been indexed from Dark Reading While most US adults know they aren’t sufficiently protecting their data online, many find security time-consuming or don’t know the steps they should take. Read the original article: Consumers Share Security Fears…

TangleBot Campaign Underscores SMS Threat

This article has been indexed from Dark Reading The attack targets Android devices and starts with a malicious SMS message that aims to bring malware onto compromised devices. Read the original article: TangleBot Campaign Underscores SMS Threat

Endpoint Still a Prime Target for Attack

This article has been indexed from Dark Reading A vast majority of security professionals surveyed think any exploit will start with the endpoint. Read the original article: Endpoint Still a Prime Target for Attack

Our Eye Is on the SPARROW

This article has been indexed from Dark Reading How unauthorized users can exploit wireless infrastructures for covert communication. Read the original article: Our Eye Is on the SPARROW

SAIC Appoints Kevin Brown as Chief Information Security Officer

This article has been indexed from Dark Reading Industry leader with decades of information security experience manages SAIC’s security strategy and oversees critical cybersecurity operations. Read the original article: SAIC Appoints Kevin Brown as Chief Information Security Officer

Primer: Microsoft Active Directory Security for AD Admins

This article has been indexed from Dark Reading Nearly all AD environments are vulnerable to identity attack paths — a powerful, widespread, and difficult-to-detect attack technique. But we didn’t say impossible. Here’s how admins can stop them. Read the original…