News

Established in 2018, CISA has been a cornerstone of US government efforts to protect critical infrastructure and manage cyber-risks. Its achievements, such as the public Known Exploited ...
Meet Your New Cybersecurity Auditor: Your Insurer As cyber insurance gets more expensive and competitive, security decision-makers have actionable opportunities to strengthen their cyber defenses.
Name That Toon: Near Miss Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card.
Welcome to CISO Corner, Dark Reading's weekly digest of articles tailored specifically to security operations readers and security leaders. Every week, we'll offer articles gleaned from across our ...
Online Security autonomously blocks malicious URLs, extensions, ad trackers, and pop-ups 24/7, protecting consumers from complex and rapidly evolving cyber threats online.
As a result, many solutions have been found wanting, with 44% of CISOs reporting they were unable to detect a data breach in the past year using their existing security tools. API is a classic ...
Great CISOs are in short supply, so choose wisely. Here are five ways to make sure you've made the right pick. Martha Heller, CEO, Heller Search October 29, 2024 4 MinRead Source: Borka Kiss via ...
Continuously evaluating and updating your third-party risk assessment can improve your security posture and ensure your company doesn't have the next headline-making incident.
Rohan Pinto is CTO of 1Kosmos. He previously architected security infrastructure for the Government of Ontario and the Health Information Access Layer for the Province of British Columbia, and is ...
Threats to Cloud Security from AI Bias We refer to AI bias as a hidden threat to cloud security because we often don't know that bias is present unless we specifically look for it — or until it ...
Remote Workforce Сloud Security Mobile Security Insider Threats Commentary Name That Toon: Incentives Name That Toon: IncentivesName That Toon: Incentives ...
In targeting executives at a COVID research firm, state-sponsored threat group ITG18 made some mistakes. Here's how IBM X-Force used that to their advantage.