Why CIOs Should Report to CISOs
If the CISO is responsible for the security of the organization, then that same person also should be responsible for…
If the CISO is responsible for the security of the organization, then that same person also should be responsible for…
Once the dust settles on Log4j, many IT teams will brush aside the need for the fundamental, not-exciting need for…
The Log4j flaw exists in a component that is not always easy to detect and is widely used beyond an…
Cloud-native platform automates prevention, detection, and response to cyberattacks.
Security professionals are burning out from handling too many tools and facing a growing number of threats, and more than…
The accounting firm PricewatersCoopers recently published lessons learned from the disruptive and costly ransomware attack in May 2021 on Ireland's…
The three must-haves in eXtended Detection and Response are: making data accessible, facilitating real-time threat detection, and providing remediation strategies.
More than 60 variants of the original exploit were introduced over the last day alone.
The Dark Reading editorial team, along with contributing writers and editors, share their favorite stories and memories of co-founder and…
The Dark Reading editorial team, along with contributing writers and editors, share their favorite stories and memories of co-founder and…