What Makes Great Threat Intelligence? – Dark Reading
Anyone can buy or collect data, but the goal must be to realize actionable insight relevant to the organization in question. – Read More
Anyone can buy or collect data, but the goal must be to realize actionable insight relevant to the organization in question. – Read More
The newly launched security startup provides an engineering relationship management platform that provides enterprises with visibility across code, infrastructure, and tools. – Read More
As crawlers and bots bog down websites in the era of AI, some researchers say that the solution for the Internet’s most vulnerable websites is already here. – Read More
Threat actors are piling on the zero-day vulnerabilities in SharePoint, including at least three Chinese nation-state cyber-espionage groups. – Read More
The operators of the popular and prolific malware wasted no time in regrouping after an FBI takedown in May, and they’re back to their old tricks. – Read More
How a new international standard is shaping the future of responsible AI development and deployment. – Read More
China officially rolled out a voluntary Internet identity system to protect citizens’ online identities and personal information, but critics worry about privacy and surveillance. – Read More
Microsoft Sentinel Data Lake aims to provide inexpensive storage for large volumes of telemetry, while threat intelligence will be included with Defender XDR at no extra cost. – Read More
The acquisition gives the British cybersecurity solutions provider more insights into encrypted network traffic and additional decryption capabilities. – Read More
Hackers and cybercrime groups are part of a virtual feeding frenzy, after Microsoft’s recent disclosure of new vulnerabilities in on-premises editions of SharePoint Server. – Read More
Dark Reading’s Kelly Jackson Higgins interviews Carmine Valente, Deputy CISO at Con Edison, about his role at the New York-based electric utility and the state of IT and OT security.…
The World Leaks group accessed and released data from the company’s Customer Solution Center, which is separated from customer and partner systems and stores primarily “synthetic” datasets used for demos…
To be truly resilient in the ever-growing threat landscape, organizations need to balance protection with preparation. – Read More
The cybersecurity rule has several requirements that must be met and will follow an extended timeline over the next two years. – Read More
Up to now, the prolific China-sponsored cyber-espionage group has been mostly absent from the region, but a sophisticated and highly targeted attack on an African IT company shows Beijing is…