Chinese state hackers have used vulnerable Ivanti edge devices to gain three months' worth of "deep" access to one of MITRE Corp.'s unclassified networks.MITRE,...
COMMENTARYCybersecurity leaders constantly are on the hunt for tools and strategies to navigate the complex landscape of digital threats. But despite consistently being held...
PRESS RELEASENEW YORK , Feb. 21, 2024 /PRNewswire/ -- Beyond Identity, the leading provider of passwordless, phishing-resistant MFA, today announced the release of its new Device360 solution for continuous...
Welcome to CISO Corner, Dark Reading's weekly digest of articles tailored specifically to security operations readers and security leaders. Every week, we'll offer articles...
In 2024, protecting customer data is crucial for ecommerce businesses. However, recent large-scale data breaches, such as Casio’s breach, which hit their customers in 149 countries, have highlighted the need for better...
Following the Securities and Exchange Commission's X account, formerly known as Twitter, compromise on Jan. 9, two Senators have issued a statement calling the...
Upon review, Google's cybersecurity operation at Mandiant has determined it temporarily lost control of its X account to cryptocurrency drainer malware operators on Jan....
Zero trust is a high-level strategy that assumes that individuals, devices, and services attempting to access company resources, both externally and internally, can't automatically...
The increasing number of Internet of Things (IoT) devices makes everyday life easier and more convenient. However, they can also pose many security risks....
In the current threat landscape, the relationship between cyber-insurance providers and potential (or even current) policyholders is often strained, at best. Organizations may perceive...
The eternal cat-and-mouse game pitting IT security improvements against evolving attacker exploits is usually framed as an arms race of rising software sophistication. Security...
Intellectual property theft is a major concern for all businesses, but especially organizations in the defense-industrial base because their IP is vital to national...