Security
Headlines
HeadlinesLatestCVEs

Source

DARKReading

Uptycs: Observability Is Key to Cloud Security

Uptycs' Ganesh Pai joins Dark Reading's Terry Sweeney at Dark Reading News Desk during RSA Conference to talk about cloud security and observability.

DARKReading
#vulnerability#kubernetes
Automox Adds Automation to Patching, Vuln Management

Automox's Paul Zimski joins Dark Reading's Terry Sweeney at Dark Reading News Desk during RSA Conference to talk about automated patch management.

Why AIs Will Become Hackers

At a 2022 RSA Conference keynote, technologist Bruce Schneier asserted that artificial intelligence agents will start to hack human systems — and what that will mean for us.

ReliaQuest Bolsters Extended Detection With Threat Intelligence

ReliaQuest CTO Joe Partlow joins Dark Reading's Terry Sweeney at Dark Reading News Desk during RSA Conference to discuss extended detection response — and acquisition news.

How Poor Communication Opens the Door to Ransomware and Extortion

Organizations can no longer rely on traditional responses to ransomware.

Security & Productivity: The New Power Couple

Seemplicity's Ravid Circus joins Dark Reading's Terry Sweeney at Dark Reading News Desk during RSA Conference to talk up accelerating time-to-remediation and reducing risk.

Anjuna Security: Tapping ‘Confidential Computing’ to Secure Data, Users, and Organizations

Anjuna Security's Ayal Yogev joins Dark Reading's Terry Sweeney at Dark Reading News Desk during RSA Conference to discuss how confidential computing will improve cloud security.

DeepSurface Security: Risk-Based Prioritization Adds New Depth to Vulnerability Management

DeepSurface's Tim Morgan joins Dark Reading's Terry Sweeney at Dark Reading News Desk during RSA Conference to discuss how to fortify vulnerability management.

China-Sponsored Cyberattackers Target Networking Gear to Build Widespread Attack Infrastructure

Compromised routers, VPNs, and NAS devices from Cisco, Citrix, Pulse, Zyxel, and others are all being used as part of an extensive cyber espionage campaign.