Microsoft issued fixes for 77 unique vulnerabilities this Patch Tuesday, including two zero-day privilege escalation vulnerabilities seen exploited in the wild.
Getting your company smartphone or laptop stolen from your car isn't just a hassle; it can have large regulatory ramifications, too. Visibility is the answer.
A Raspberry Pi attached to the network at NASA JPL became the doorway for a massive intrusion and subsequent data loss. Here's how to keep the same thing from happening to your network.
Security analysts know they are a hot commodity in the enviable position of writing their own ticket. Here's how to keep them engaged, challenged, and happy.
Black Hat USA session will reveal how they reverse-engineered the proprietary cryptographic protocol to attack the popular programmable logic controller.
Like a Sunday magazine in a daily newspaper, Dark Reading's The Edge offers a variety of value-add content including features, threat data and in-depth perspectives.
The increasing digital connectivity of industrial networks opens them up to cyber threats, underscoring the importance of protecting not just IT systems, but also operational technology (OT) systems. In this Dark Reading webinar, find out what these risks are and ...
In this Dark Reading webinar, a top expert will discuss emerging methods for solving the authentication problem, and for building authentication strategies that go beyond the enterprise premises.
We want to know how you strike the balance between the benefits (cost, flexibility and speed) of the cloud with concerns like security and management. Do you have 10 minutes to spare so you can tell us? As a thank you, ...
Keep This Newsletter Out Of Your SPAM Folder Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.