By Chris Denbigh-White, Chief Security Officer, Next Preventing the loss of sensitive information can be difficult for organizations. Enterprises often…
By Natasha Gupta, Senior Security Solutions Manager, Synopsys Software Integrity Group As organizations embrace digital transformation efforts to speed up…
CISO Corner: DoD Regs, Neurodiverse Talent & Tel Aviv’s Light Rail
Also in this issue: How the SEC's reporting rules are being weaponized, quishing attacks plaguing execs, and tabletop exercises making…
Addressing Bias in Insider Risk Monitoring
By Chris Denbigh-White, Chief Security Officer, Next Preventing the loss of sensitive information can be difficult for organizations. Enterprises often…
CISO Corner: Gen Z Challenges, CISO Liability & Cathay Pacific Case Study
Dark Reading's roundup of strategic cyber-operations insights for chief information security officers.
Shifting Left Means Shifting Smart: Managing Software Risk With ASPM
By Natasha Gupta, Senior Security Solutions Manager, Synopsys Software Integrity Group As organizations embrace digital transformation efforts to speed up…
Ruthless Prioritization Is a Myth: Aim For Risk-Less Prioritization Instead
By Craig Burland, CISO, Inversion6 In a world driven by technology, innovation and rapid change, companies often find themselves touting…
What the Government Can Learn from the Private Sector in Pursuit of Zero Trust
By Kevin Kirkwood, Deputy CISO, LogRhythm It has now been over two years since President Biden issued the Executive Order…
It’s Time to Tear Down the Barriers Preventing Effective Threat Intelligence
By Denny LeCompte, CEO, Portnox Today, organizations are confronted with a deluge of cyber threats, ranging from sophisticated AI-powered ransomware…
How to Create a Threat Hunting Program for Your Business
By Zac Amos, Features Editor, ReHack When it comes to online security, danger lurks around every corner. A threat hunter’s…
Expect to Fail: How Organizations Can Benefit from a Breach
By Tyler Farrar, CISO, Exabeam The Chief Information Security Officer (CISO) is one of the most prominent and well-paid positions…
Keeping SaaS Data Under Wraps
A case study on how a $10B global media firm significantly improved SaaS security posture Media firms in the business…