Dark Reading

Dark Reading: Connecting the Information and Security Community
  1. Wireless security protocols have improved, but product vendors continue to make implementation errors that allow a variety of attacks.
  2. New research suggests isolation among cloud customer accounts may not be a given -- and the researchers behind the findings issue a call to action for cloud security.
  3. Organizations that don't implement end-to-end HTTP/2 are vulnerable to attacks that redirect users to malicious sites and other threats, security researcher reveals at Black Hat USA.
  4. "We can't do this alone," the new CISA director told attendees in a keynote at Black Hat USA today.
  5. Mandiant experts discuss the novel techniques used to evade detection, automate data theft, and achieve persistent access.
  6. Attacks require executing code on a system but foil Apple's approach to protecting private data and systems files.
  7. Researchers at Black Hat USA explain issues around defending "Golden Secrets" and present an approach to solving the problem.
  8. Security leaders are challenged to fill application security and cloud computing jobs in particular, survey data shows.
  9. In his keynote address at Black Hat USA on Wednesday, Matt Tait, chief operating officer at Corellium, called for software platform vendors and security researchers to do their part to thwart the fallout of software supply chain compromises.
  10. At the inaugural Omdia Analyst Summit, experts discuss where the past year has created gaps in traditional security strategy and how organizations can fill them.

logo joomla Open Source CMS   logo Magento Open Source eCommerce     logo Paypal Credit Card Processinglogo Adobe Illustrator & Photoshoplogo Google Analytics & Adwords

Login Form