News

As organizations continue to onboard new vendors, supply chain and other third-party risks will continue to climb. By continuously evaluating and updating your organization's third-party risk ...
Welcome to CISO Corner, Dark Reading's weekly digest of articles tailored specifically to security operations readers and security leaders. Every week, we'll offer articles gleaned from across our ...
Randolph Barr is a seasoned chief information security officer with more than two decades of experience in cybersecurity, IT, and risk management. He has led the development and expansion of security ...
Every year, more men and women enter cybersecurity, driven by the sector's explosive growth in response to increasingly sophisticated threats. In 2023, the global cybersecurity workforce hit 5.5 ...
Last month, an unknown customer appears to have shelled out around €8 million for a full-service zero-day remote control execution (RCE) exploit. Screenshots shared of the zero-day exploit bill of ...
Where's a good tailwind when you need it? Come up with a clever cybersecurity-related caption to describe the scene above, and our favorite will win a $25 Amazon gift card.
BLACK HAT USA 2023, LAS VEGAS -- Dark Reading News Desk was live for two days during Black Hat USA, at Mandalay Bay in Las Vegas. Dark Reading editor Becky Bracken hosted a bevy of Black Hat ...
How do CEOs, their executive teams, and their HR partners attract the best of the market? Here are a few ways. 1. Level and structure the role appropriately: If security — of enterprise data, customer ...
Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted ...
Traditional programming languages are frequently the weak link in software development, with memory safety vulnerabilities leading to significant incidents. Despite comprehensive code reviews and ...
Established in 2018, CISA has been a cornerstone of US government efforts to protect critical infrastructure and manage cyber-risks. Its achievements, such as the public Known Exploited ...
Historically, organizations have relied on static risk assessments and due diligence processes to evaluate their suppliers. This involves vetting vendors using questionnaires, compliance audits, and ...