Security
Headlines
HeadlinesLatestCVEs

Source

DARKReading

Name That Toon: Slam Dunk

Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card.

DARKReading
#amazon#auth
UAE Bolsters Cyber Future With US Treasury Partnership, Collaborations

A determination to be taken seriously as a cyber player sees the United Arab Emirates announce a series of collaborations.

What the Boardroom Is Missing: CISOs

From communicating why security should be a priority to advocating for accountability and greater focus on protecting data in the cloud, CISOs can make the case for keeping people and sensitive data secure.

Getting Smart With Cybersecurity: AI Can Help the Good Guys, Too

With the rapid advancement and adoption of artificial intelligence (AI) in cybersecurity, the benefits of speed and accuracy are becoming clearer every day.

Securing Modern Enterprises in a Borderless Landscape

CISOs offer recommendations to help secure identities, data, code, and cloud infrastructure and protect against evolving threats and vulnerabilities.

CISO Skills in a Changing Security Market: Are You Prepared?

The CISO role has evolved from a strictly technical position to one that increasingly requires business acumen. Here are some things you need to know.

10 Tips for Security Awareness Training That Hits the Target

Try these tricks for devising an education program that gets employees invested — and stays with them after the training is over.

What the Bionic Acquisition Can Bring to CrowdStrike

CrowdStrike is moving deeper into application security with its agreement to acquire Bionic, provider of ASPM technology that proactively scans software in production for vulnerabilities.

Safari Side-Channel Attack Enables Browser Theft

The "iLeakage" attack affects all recent iPhone, iPad, and MacBook models, allowing attackers to peruse your Gmail inbox, steal your Instagram password, or scrutinize your YouTube history.

Octo Tempest Group Threatens Physical Violence as Social Engineering Tactic

The financially motivated English-speaking threat actors use advanced social engineering techniques, SIM swapping, and even threats of violence to breach targets.