skip to main content
Close Icon We use cookies to improve your website experience. To learn about our use of cookies and how you can manage your cookie settings, please see our Cookie Policy. By continuing to use the website, you consent to our use of cookies.
Explore more Hot Topics
Showing results for
  • All (1786)
  • Media (1750)
  • Events (14)
  • Training (9)
  • Research (6)
  • Brands (5)
  • Press Release (2)

WhiteHat Security Rebrands as NTT Application Security

  • 01 July 2021 | Dark Reading Staff | Dark Reading

The name change follows NTT Security Corporation's acquisition of WhiteHat in 2019. Read More

The name change follows NTT Security Corporation's acquisition of WhiteHat in 2019. Read More

Why security pros are frustrated with cloud security

  • 03 February 2022 | Donny Jackson | Urgent Communications

Companies are struggling to keep up with cloud security, with 55% of security professionals believing at least half their time is wasted, in part because security event data is of uneven quality, which leads to false positives, according to a new report. According to the report by cloud automation firm Lacework, based on a survey of […] Read More

Companies are struggling to keep up with cloud security, with 55% of security professionals believing at least half their time is wasted, in part because security event data is of uneven quality, which leads to false positives, according to a new report. According to the report by cloud automation firm Lacework, based on a survey of […] Read More

EFF, Security Experts Condemn Politicization of Election Security

  • 17 November 2020 | Dark Reading Staff | Dark Reading

Open letter, signed by high-profile security professionals and organizations, urges White House to "reverse course and support election security." Read More

Open letter, signed by high-profile security professionals and organizations, urges White House to "reverse course and support election security." Read More

IoT Security Firm to Acquire Medical Security Startup

  • 17 December 2021 | Callum Cyrus | IoT World Today

Claroty is set to acquire Medigate to grow its foothold in securing the Internet of Medical Things Read More

Claroty is set to acquire Medigate to grow its foothold in securing the Internet of Medical Things Read More

NanoLock Security and Waterfall Security Partner to Deliver OT Security for Industrial and Energy Applications

  • 29 November 2021 | Eric Olden, CEO, Strata Identity | Dark Reading

The solution combines NanoLock’s device-level, zero-trust protection with Waterfall’s hardware-enforced IT/OT perimeter protection to provide a powerful OT security solution that mitigates cyber events from both IT and OT networks. Read More

The solution combines NanoLock’s device-level, zero-trust protection with Waterfall’s hardware-enforced IT/OT perimeter protection to provide a powerful OT security solution that mitigates cyber events from both IT and OT networks. Read More

Security Architecture Assessment

  • 23 November 2021 | CBTS | InformationWeek

Read the whitepaper to learn how a security architecture assessment can identify gaps and roadmap a path to address them. Read More

Read the whitepaper to learn how a security architecture assessment can identify gaps and roadmap a path to address them. Read More

Security Digital Symposium

  • 15 April 2021 - 15 April 2021 | Event

  Read More

  Read More

Security Digital Symposium

  • 08 December 2021 - 08 December 2021 | Event

  Read More

  Read More

IoT Security Summit

  • 06 October 2020 - 08 October 2020 | Event

IoT Security Summit will cover the latest topics including edge for security, securing your device, security and the cloud & IT/OT security.

IoT Security Summit will cover the latest topics including edge for security, securing your device, security and the cloud & IT/OT security.

Cloudflare Expands Email Security and WAF, Announces API Security Service

  • 16 March 2022 | Maria Korolov | Data Center Knowledge

As the company continues to evolve from its CDN roots. Read More

As the company continues to evolve from its CDN roots. Read More

Rapid7 Acquires Kubernetes Security Provider Alcide to Increase Cloud Security

  • 01 February 2021 | Edward Gately | Channel Futures

This is Rapid7's second cloud security acquisition in the past nine months. Read More

This is Rapid7's second cloud security acquisition in the past nine months. Read More

Increase in Physical Security Incidents Adds to IT Security Pressures

  • 01 February 2021 | Jai Vijayan Contributing Writer | Dark Reading

A new study shows that many organizations have changed their physical security strategies to address new concerns since the COVID-19 outbreak. Read More

A new study shows that many organizations have changed their physical security strategies to address new concerns since the COVID-19 outbreak. Read More

When You Know Too Much: Protecting Security Data from Security People

  • 22 November 2019 | Kelly Sheridan Staff Editor, Dark Reading | Dark Reading

As security tools gather growing amounts of intelligence, experts explain how companies can protect this data from rogue insiders and other threats. Read More

As security tools gather growing amounts of intelligence, experts explain how companies can protect this data from rogue insiders and other threats. Read More

AdaptiveMobile Security reckons 5G network slicing contains a major security flaw

  • 26 March 2021 | Scott Bicheno | Telecoms.com

Research published by mobile security specialist AdaptiveMobile claims all the extra complexity created by network slicing leads to new vulnerabilities. Read More

Research published by mobile security specialist AdaptiveMobile claims all the extra complexity created by network slicing leads to new vulnerabilities. Read More

Why Security Awareness Training Should Be Backed by Security by Design

  • 25 November 2020 | Ericka Chickowski Contributing Writer | Dark Reading

Cybersecurity training needs an overhaul, though the training itself is only one small part of how security teams can influence user behavior. Read More

Cybersecurity training needs an overhaul, though the training itself is only one small part of how security teams can influence user behavior. Read More

Is It Better to Outsource Security or Handle Security In-House?

  • 11 February 2020 | Brien Posey | Data Center Knowledge

The decision to outsource security or handle it all in-house hinges on resources and risk. Read More

The decision to outsource security or handle it all in-house hinges on resources and risk. Read More

Users Have Risky Security Habits, but Security Pros Aren't Much Better

  • 19 February 2020 | Kelly Sheridan Staff Editor, Dark Reading | Dark Reading

Researchers spot gaps in users' and IT practitioners' security habits, and between security tools and user preferences. Read More

Researchers spot gaps in users' and IT practitioners' security habits, and between security tools and user preferences. Read More

3 Mobile Security Problems That Most Security Teams Haven't Fixed Yet

  • 26 March 2020 | Michael J. Covington Vice President of Product Strategy at Wandera | Dark Reading

Mobility must be included in the security operations workflow so that company data is protected regardless of where remote workers are located. Read More

Mobility must be included in the security operations workflow so that company data is protected regardless of where remote workers are located. Read More

2022 Cloud Security Report

  • 15 April 2022 | Check Point Software Technologies | InformationWeek

Download this report and learn what your peers are saying about workloads and multi cloud. Read More

Download this report and learn what your peers are saying about workloads and multi cloud. Read More

Application Security Trend Report

  • 15 April 2022 | Check Point Software Technologies | InformationWeek

Receive an application security checklist and follow the latest trends in DevSecOps. Read More

Receive an application security checklist and follow the latest trends in DevSecOps. Read More

Building a Security Culture

  • 14 November 2019 | Veracode | InformationWeek

Learn the elements of a security culture, how to build one at your organization, and how to know it?s working. Read More

Learn the elements of a security culture, how to build one at your organization, and how to know it?s working. Read More

Redefining Network Security eBook

  • 26 May 2021 | Cisco | InformationWeek

Learn how the Cisco Secure Firewall + Workload integration enables the NetOps team to start running at DevOps speed. Read More

Learn how the Cisco Secure Firewall + Workload integration enables the NetOps team to start running at DevOps speed. Read More

The Cloud Security Partnership

  • 11 March 2022 | Joshua Berman, President, C2C Global | InformationWeek

Cloud security is a shared responsibility between the businesses leveraging the cloud and their cloud service providers. Here are tips on how to build and maintain robust security models. Read More

Cloud security is a shared responsibility between the businesses leveraging the cloud and their cloud service providers. Here are tips on how to build and maintain robust security models. Read More

Apple Issues Security Updates

  • 13 November 2020 | Dark Reading Staff | Dark Reading

Vulnerabilities found in three most recent versions of macOS. Read More

Vulnerabilities found in three most recent versions of macOS. Read More

An ICS Security Checklist

  • 21 January 2020 | Brian Buntz | IoT World Today

Because industrial control systems (ICS) security is complicated, it is vital to have comprehensive defenses. Read More

Because industrial control systems (ICS) security is complicated, it is vital to have comprehensive defenses. Read More

Guide To Microsoft Security

  • 12 October 2020 | Blumira | InformationWeek

To help organizations running Microsoft environments, this guide gives you practical, step-by-step Windows tips to significantly improve your visibility into malicious activity. Read More

To help organizations running Microsoft environments, this guide gives you practical, step-by-step Windows tips to significantly improve your visibility into malicious activity. Read More

Endpoint Security Buyers Guide

  • 18 October 2021 | Sophos | InformationWeek

This guide provides clarity by walking you through the key endpoint security technologies to ensure you have the right protection in place. Read More

This guide provides clarity by walking you through the key endpoint security technologies to ensure you have the right protection in place. Read More

Fusion Connect Intros Security Portfolio, Wants to Ease Burden on Security Teams

  • 21 July 2022 | Claudia Adrien | Channel Futures

“Heavier workloads, unfilled positions and security employee burnout are making things especially chaotic in cybersecurity.” Read More

“Heavier workloads, unfilled positions and security employee burnout are making things especially chaotic in cybersecurity.” Read More

IT Facing Major Security Issues, But Cloud Security May Be Most Immense

  • 12 February 2021 | Kelly Teal | Channel Futures

A number of reports point to security problems within client environments, but cloud could be the biggest. Read More

A number of reports point to security problems within client environments, but cloud could be the biggest. Read More

Charting the Road to Security Revenue: Growing Your Security Practice with WatchGuard

  • 23 April 2021 | matthewscr | Channel Futures

As midmarket businesses evolve their IT environment, suffering a breach should not be a rite of passage, yet 53% have experienced at least two security incidents in the last 24 months. Despite being smaller than their large enterprise counterparts, midmarket organizations typically retain a wealth of valuable data, but fewer resources with which to defend […] Read More

As midmarket businesses evolve their IT environment, suffering a breach should not be a rite of passage, yet 53% have experienced at least two security incidents in the last 24 months. Despite being smaller than their large enterprise counterparts, midmarket organizations typically retain a wealth of valuable data, but fewer resources with which to defend […] Read More

  of

no results found.