Dark Reading

Dark Reading: Connecting the Information and Security Community
  1. Cloud tagging, the process of labeling cloud assets by certain attributes or operational values, can unlock behavioral insights to optimize and automate cyber asset management at scale.
  2. Timing of the move has evoked at least some skepticism from security experts about the country's true motives.
  3. Companies look to multifactor authentication and identity and access management to block attacks, but hedge their bets with disaster recovery.
  4. An attack discovered on Dec. 4, 2021 forced the Maryland Department of Health to take some of its systems offline.
  5. The Log4j vulnerability is only the latest security flaw to have global impact, prompting the Biden administration and software developers to pledge to produce more secure software.
  6. The next five years will bring the widespread use of hyperautomation in patch management. Part 3 of 3.
  7. A series of attacks against small and medium-sized businesses has led to major cryptocurrency losses for the victims.
  8. Detecting infection traces from Pegasus and other APTs can be tricky, complicated by iOS and Android security features.
  9. The good news is that you can take steps to avoid advanced persistent threats. The bad news is that it might cost you iMessage. And FaceTime.
  10. Major cloud providers are vulnerable to exploitation because a single flaw can be turned into a global attack using trusted core services.

logo joomla Open Source CMS   logo Magento Open Source eCommerce     logo Paypal Credit Card Processinglogo Adobe Illustrator & Photoshoplogo Google Analytics & Adwords

Login Form