Mideast & Africa News
Cyberattack Gold: SBOMs Offer an Easy Census of Vulnerable Software
Cyberattack Gold: SBOMs Offer an Easy Census of Vulnerable Software
Attackers will likely use software bills-of-material (SBOMs) for searching for software potentially vulnerable to specific software flaws.
Latest Commentary
Managing Director for EMEA North, Qualys
Cybersecurity GRC Manager, Universal Logistics Holdings, Inc.
Vice President of Industrial Security, Waterfall Security Solutions
Chief Innovation Officer, Venafi
Deep Reading
See More Dark Reading ResearchThe semiconductor manufacturing giant's security team describes how hardware hackathons, such as Hack@DAC, have helped chip security by finding and sharing hardware vulnerabilities.
You can't thinking about inclusion in the workplace without first understanding what kinds of exclusive behaviors prevent people from advancing in their careers.
Dark Reading talks cloud security with John Kindervag, the godfather of zero trust.
Cybersecurity Features In-Depth: On security strategy, latest trends, and people to know. Brought to you by Mandiant.
Security Technology: Featuring news, news analysis, and commentary on the latest technology trends.
How the CISO of Kenvue, a consumer healthcare company spun out from Johnson & Johnson, combined tools and new ideas to build out the security program.
Caliptra 1.0 offers a blueprint for integrating security features directly into microprocessors.
Just like you should check the quality of the ingredients before you make a meal, it's critical to ensure the integrity of AI training data.
Likely China-linked adversary has blanketed the Internet with DNS mail requests over the past five years via open resolvers, furthering Great Firewall of China ambitions. But the exact nature of its activity is unclear.
The volume of malicious cyber activity against the Philippines quadrupled in the first quarter of 2024 compared to the same period in 2023.
Breaking cybersecurity news, news analysis, commentary, and other content from around the world.
Partner Perspectives
More Partner PerspectivesPress Releases
See allA Short Primer on Container Scanning
ESG E-Book: Taking a Holistic Approach to Securing Cloud-Native Application Development
The Future of Cloud Security: Attack Paths & Graph-based Technology
Making Sense of Your Security Data: The 6 Hardest Problems
Use the 2023 MITRE ATT&CK Evaluation Results for Turla to Inform EDR Buying Decisions
Black Hat USA - August 3-8 - Learn More
August 3, 2024Cybersecurity's Hottest New Technologies: What You Need To Know
March 21, 2024
Beyond Spam Filters and Firewalls: Preventing Business Email Compromises in the Modern Enterprise
April 30, 2024Key Findings from the State of AppSec Report 2024
May 7, 2024Is AI Identifying Threats to Your Network?
May 14, 2024Where and Why Threat Intelligence Makes Sense for Your Enterprise Security Strategy
May 15, 2024Safeguarding Political Campaigns: Defending Against Mass Phishing Attacks
May 16, 2024