Security
Headlines
HeadlinesLatestCVEs

Source

DARKReading

Name That Edge Toon: Parting Thoughts

Feeling creative? Come up with a clever caption, and our panel of experts will reward the winner with a $25 Amazon gift card.

DARKReading
#vulnerability#vulnerability#web#amazon
Understanding the Human Communications Attack Surface

Companies should recognize that collaboration platforms aren't isolated, secure channels where traditional threats don't exist.

Enterprises Allocating More IT Dollars on Cybersecurity

Enterprises are allocating more IT dollars towards implementing a multilayered approach to securing data and applications against new threats, data shows.

Snyk Agrees to Acquire CloudSkiff, Creators of driftctl

New capabilities allow Snyk Infrastructure as Code customers to more effectively detect infrastructure drift.

APTs, Teleworking, and Advanced VPN Exploits: The Perfect Storm

A Mandiant researcher shares the details of an investigation into the misuse of Pulse Secure VPN devices by suspected state-sponsored threat actors.

Russian National Accused of Role in Trickbot Is Extradited to US

Court documents say Vladimir Dunaev is alleged to have been a malware developer for the Trickbot Group.

Cybercriminals Take Aim at Connected Car Infrastructure

While car makers are paying more attention to cybersecurity, the evolution of automobiles into "software platforms on wheels" and the quick adoption of new features has put connected cars in the crosshairs.

What Exactly Is Secure Access Service Edge (SASE)?

Any company that supports a hybrid workforce should at least be familiar with this relatively new security approach.

A Treehouse of Security Horrors

True-life horrors from conversations with software engineers and developers. D'oh!

Finding the Right Approach to Cloud Security Posture Management (CSPM)

Cloud security is maturing — it has to. New strategies are surfacing to respond to new problems. Dr. Mike Lloyd, RedSeal's CTO, reviews one of the latest: CSPM.