Farewell, Dear Password? The Future of Identity and Authorization Many organizations are questioning whether eliminating passwords as an authentication tool would augment their overall security posture.
A Realistic Path Forward for Security Orchestration and Automation Security teams often look to technology to solve their security challenges. Yet sometimes investing in new products can create more issues.
Why Every Organization Needs an Incident Response Plan OK, perhaps that's self-evident, so how come it far too often still takes an incident to trigger planning?
Keep Your Eye on Digital Certificates X.509 certificates help secure the identity, privacy, and communication between two endpoints, but these digital certificates also have built-in expirations and must be managed.
A Security-First Approach to DevOps Aware of the risks inherent in software, businesses are recognizing the need for application security.
FROM THE DARK READING NEWS DESK
Capital One: What We Should Learn This Time Where Capital One went wrong, what the bank did right, and more key takeaways from the latest mega-breach.
Black Hat: A Summer Break from the Mundane and Controllable Enjoy the respite from the security tasks that await you back at home. Then prepare yourself for the uphill battles to come. Here's how.
US Utilities Hit with Phishing Attack An email phishing attack, thought to be from a nation-state actor, claims that engineers have failed licensing exams.