News

Welcome to CISO Corner, Dark Reading's weekly digest of articles tailored specifically to security operations readers and security leaders. Every week, we'll offer articles gleaned from across our ...
As organizations continue to onboard new vendors, supply chain and other third-party risks will continue to climb. By continuously evaluating and updating your organization's third-party risk ...
Last month, an unknown customer appears to have shelled out around €8 million for a full-service zero-day remote control execution (RCE) exploit. Screenshots shared of the zero-day exploit bill of ...
Denzil Wessels is the founder and CEO of Dymium. He’s an established technology leader and an emerging pioneer who is focused on building new technologies and products that solve networking and ...
Randolph Barr is a seasoned chief information security officer with more than two decades of experience in cybersecurity, IT, and risk management. He has led the development and expansion of security ...
Every year, more men and women enter cybersecurity, driven by the sector's explosive growth in response to increasingly sophisticated threats. In 2023, the global cybersecurity workforce hit 5.5 ...
Established in 2018, CISA has been a cornerstone of US government efforts to protect critical infrastructure and manage cyber-risks. Its achievements, such as the public Known Exploited ...
Bias can create risks in AI systems used for cloud security. There are steps humans can take to mitigate this hidden threat, but first, it's helpful to understand what types of bias exist and where ...
Cybersecurity risk has increased exponentially due to the changing and complex cyber-threat landscape, particularly ransomware attacks. As a result, cyber-insurance premiums have surged by 50% just in ...
Where's a good tailwind when you need it? Come up with a clever cybersecurity-related caption to describe the scene above, and our favorite will win a $25 Amazon gift card.
Traditional programming languages are frequently the weak link in software development, with memory safety vulnerabilities leading to significant incidents. Despite comprehensive code reviews and ...
As the summer holiday season draws near, phishing scams with travel-themed lures have been gaining momentum, posing a significant challenge to individuals and organizations. A recent survey from ...