News

What IsWhat Makes Great Threat Intelligence? Anyone can buy or collect data, but the goal must be to realize actionable insight relevant to the organization in question.
To truly become indispensable in the boardroom, CISOs need to meet the dual demands of defending against sophisticated adversaries while leading resilience strategies.
ReasonLabs Launches Free Online Security Tool to Power Secure Web Experience for Millions of Global Users Online Security autonomously blocks malicious URLs, extensions, ad trackers, and pop-ups ...
CISA Cuts: A Dangerous Gamble in a Dangerous World The Cybersecurity and Infrastructure Security Agency's role in risk management needs to expand, not shrink.
CISO Corner: Gen Z Challenges, CISO Liability & Cathay Pacific Case Study Dark Reading's roundup of strategic cyber-operations insights for chief information security officers.
Included at no added cost, BeachheadSecure now provides accountwide management of Microsoft Defender AV, Firewall, and Controlled Folders for the most complete PC and device security available.
How do CEOs, their executive teams, and their HR partners attract the best of the market? Here are a few ways. 1. Level and structure the role appropriately: If security — of enterprise data ...
Name That Toon: Near Miss Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card.
Is Bias in AI Algorithms a Threat to Cloud Security? Using AI for threat detection and response is essential — but it can't replace human intelligence, expertise, and intuition.
Continuously evaluating and updating your third-party risk assessment can improve your security posture and ensure your company doesn't have the next headline-making incident.
BLACK HAT USA 2023, LAS VEGAS -- Dark Reading News Desk was live for two days during Black Hat USA, at Mandalay Bay in Las Vegas. Dark Reading editor Becky Bracken hosted a bevy of Black Hat ...
With the proliferation of interconnected third-party applications, new strategies are needed to close the security gap.