Security
Headlines
HeadlinesLatestCVEs

Source

DARKReading

Zscaler Adds New AI/ML Capabilities for the Zscaler Zero Trust Exchange

Organizations can strengthen their network defense with a number of intelligent security innovations.

DARKReading
#mac#git#intel#ssl
Evolving Beyond the Password: Vanquishing the Password

Using WebAuthn, physical keys, and biometrics, organizations can adopt more advanced passwordless MFA and true passwordless systems. (Part 2 of 2)

The Risk of Multichannel Phishing Is on the Horizon

The cybersecurity community is buzzing with concerns of multichannel phishing attacks, particularly on smishing and business text compromise, as hackers turn to mobile to launch attacks.

GitHub's MFA Plans Should Spur Rest of Industry to Raise the Bar

We as industry leaders should be building on what individual platforms like GitHub are doing in two critical ways: demanding third parties improve security and creating more interoperable architectures.

80% of Firms Suffered Identity-Related Breaches in Last 12 Months

With almost every business experiencing growth in human and machine identities, firms have made securing those identities a priority.

Risk Disconnect in the Cloud

New Cloud Security Alliance (CSA) and Google Cloud study shows many enterprises struggle to measure and manage risk in their cloud workloads.

Linux Foundation Announces Open Programmable Infrastructure Project to Drive Open Standards for New Class of Cloud Native Infrastructure

Data Processing and Infrastructure Processing Units – DPU and IPU – are changing the way enterprises deploy and manage compute resources across their networks.

7 Ways to Avoid Worst-Case Cyber Scenarios

In the wake of devastating attacks, here are some of the best techniques and policies a company can implement to protect its data.

VPNs Persist Despite Zero-Trust Fervor

Most organizations still rely on virtual private networks for secure remote access.

China-Linked ToddyCat APT Pioneers Novel Spyware

ToddyCat's Samurai and Ninja tools are designed to give attackers persistent and deep access on compromised networks, security vendor says.