Security
Headlines
HeadlinesLatestCVEs

Source

DARKReading

Top 5 Skills Modern SOC Teams Need to Succeed

From basic coding to threat hunting, here are five skills modern SOC teams need to successfully navigate the future of high-scale detection and response.

DARKReading
Companies Face Issues as Let's Encrypt Root Certificate Expires

Experts warn devices will be affected after major HTTPS certificate provider Let's Encrypt saw its root certificate expire this week.

Why Windows Print Spooler Remains a Big Attack Target

Despite countless vulnerabilities and exploits, the legacy Windows printing process service continues to be an attack surface in constant need of repair and maintenance, security experts say.

CISA and Girls Who Code Partner to Create Career Pathways for Young Women

Through this partnership, CISA and Girls Who Code will establish collaborative opportunities to provide awareness, training, and pathways into cybersecurity careers for girls, women, and those who identify as nonbinary.

It's Time to Rethink Identity and Authentication

The concept of identity has been around for decades, yet authentication has not caught up to its advanced threats until now. Here are four ways to begin thinking differently about identity and authentication.

Enterprises Planning SecOps Technology Deployments

With the easing of pandemic-related restrictions, enterprise defenders report they are investigating security operations technology to manage new risks that emerged over the past year.

More Than 90% of Q2 Malware Was Hidden in Encrypted Traffic

Analysis of threat trends from last quarter reveals attackers ramped up their use of fileless malware, and zero-day malware accounted for almost two-thirds of all detections.

Akamai Acquires Guardicore in $600M Deal

In other acquisition news today, Arctic Wolf announced it will acquire Habitu8, a managed security awareness platform, for an undisclosed amount.

10 Recent Examples of How Insider Threats Can Cause Big Breaches and Damage

Theft of intellectual property, sabotage, exposure of sensitive data and more were caused by malicious behavior and negligence at these organizations