Russian intelligence officials hired renowned cybercriminals to do their bidding in massive hacks that compromised Yahoo, Gmail, and other email accounts of millions of people in the US, Russia, elsewhere.
In today's distributed environment, cloud and communication service providers can play a key role in providing organizations with a scalable and secure platform for the connection of everything to everything. Here's how.
Cybercriminals are turning to Facebook Twitter and other platforms to launch attacks via employee behavior that could be putting your business at risk.
Dramatic changes in the use of open source software over the past decade demands major changes in security testing regimens today. Here's what you need to know and do about it.
In the years since data scientist was declared the sexiest job, the role itself has evolved. As happens with any job, hiring managers have been adjusting their expectations for data science candidates, and executives are defining the role of the ...
Ransomware operators will always announce their presence, but not until after they've finished locking you out of your systems. There are, however, ways that you might be able to catch them in the act, if you know what to look ...
The information security landscape is a constantly shifting risk environment. Today's IT security department must manage both internal and external threats' ranging from malware to mobile device vulnerabilities, to cloud security and ransomware. Download the Dark Reading 2016 Strategic Security Survey ...
Keep This Newsletter Out Of Your SPAM Folder Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.