Dark Reading

Dark Reading: Connecting the Information and Security Community
  1. Staff shortages and an increasingly challenging job are turning up the heat on security pros, Dark Reading readers say.
  2. The list includes the most frequent and critical weaknesses that can lead to serious software vulnerabilities.
  3. Here are five tips about what not to do when assessing the cyber-risk introduced by a third-party supplier.
  4. Civil suit argues the former CIA employee and NSA contractor violated his nondisclosure agreements with the two intel agencies.
  5. It's a joint responsibility to keep data safe in the cloud. Here's what cloud customers must do to keep their end of the bargain.
  6. Common prices criminals pay one other for products and services that fuel the cybercriminal ecosystem.
  7. Webcams could be potentially accessed and manipulated by anyone with an Internet connection, researchers say.
  8. US companies are poorly prepared for even the most rudimentary privacy regulations, a new report says.
  9. Fraudsters continue to attempt to fool certificate authorities into issuing valid digital certificates for legitimate organizations by impersonating an authoritative user. The reward? The ability to sign code with a legitimate signature.

logo joomla Open Source CMS   logo Magento Open Source eCommerce     logo Paypal Credit Card Processinglogo Adobe Illustrator & Photoshoplogo Google Analytics & Adwords

Login Form