From securing MCPs and supply chain defenses to formal AI and quantum governance, experts share their wish lists for cyber ...
Agentic AI adoption & identity security risks, IGA expansion, SOC-identity team collaboration, & identity platform ...
What happens to the Internet of Things when the cloud goes down? Disruptions to sleep, school, and smart homes, just to name ...
The zero-day exploitations of Ivanti's MDM platform meant unprecedented pwning of 1000s of orgs by a Chinese APT — and ...
Concerns about an economic bubble bursting, along with doubts regarding return on investment, suggest the tide may be turning ...
Which cyber defenses actually work against current threats? An analysis of cyber-insurance claims data shows six technologies ...
AI-driven attacks, autonomous malware, AI-powered defenses, and the impact of consolidation on the threat landscape.
Dark Reading Confidential Episode 13: Developers are exposing their organizations' most sensitive information; our guests ...
With a new year upon us, software-security experts disagree on SBOM utility — in theory, SBOMs are great, but in practice, ...
2025 included a number of monumental threats, from global nation-state attacks to a critical vulnerability under widespread ...
A new Chinese-backed advanced persistent threat (APT) group, which researchers have dubbed LongNosedGoblin, has been waging a cyber-espionage campaign against the governments of Japan and others ...
Artificial intelligence has become an ally in cybersecurity by 2025, with 60% of organizations reporting using it in their IT infrastructures. AI can process massive volumes of data, correlate signals ...