Most cybersecurity vendors at risk due to internet-exposed IT assets.
Views expressed in this cybersecurity-cyber crime update are those of the reporters and correspondents.
Accessed on 06 March 2022, 1334 UTC.
Content supplied by “DarkReading.com.”
Please click link or scroll down to read your selections.
Nearly 65% of security operations center (SOC) analysts are likely to change jobs in the next year, survey shows.
Study shows more than 97% have exposed assets on AWS — among a wide range of other issues.
Threat actors have focused on two ends of the spectrum — quick, impactful attacks or stealthy intrusions — making strong prevention and faster response more important for enterprises.
Researchers say passwords with less than seven characters can be hacked “instantly.”
The Linux Foundation and Harvard University create lists of the top 500 most popular open source projects, highlighting critical software that needs to be secured.
The push to embrace Slack, Teams, and Zoom at work comes with new security risks for organizations.
A vulnerability in a Microsoft crypto library gives attackers a way to figure out what data is being encrypted in lockpicker-like fashion.
Software code pushed to online code repositories exposed twice as many secrets compared to last year, putting organizations’ security at risk.
DORA’s Global Reach and Why Enterprises Need to Prepare
The new EU regulation is a response to the rise of ransomware attacks and other new cyberthreats that have proliferated in the wake of the global pandemic.
How to Get One Step Ahead of Mobile Attacks
The advent of so-called “dropper” apps, which deliver and install malware that can also be later updated, is an emerging threat vector for mobile users.
3 Ways to Expand Gender Diversity in Cybersecurity
Why this is important: A business that surrounds itself with the same kind of people who work on the same projects will not generate new or original ideas.
Reduce Risk With Better Cyber Due Diligence
Done incorrectly, due diligence can result in slower integration of assets, which increases acquisition costs associated and could reduce expected gains.
Beyond the Hype: AI’s Future in Defensive Cybersecurity
Hybridizing signatures with artificial intelligence is making a significant difference in our ability to detect cyberattacks, including ransomware.
Connect with us
Register for a
Subscribe to the
Dark Reading Account
Dark Reading newsletter
- Gain full access to resources (events, white paper, webinars, reports, etc.)
- Single sign-on to all Informa products
Get daily Dark Reading top stories every morning straight into your inbox