Security
Headlines
HeadlinesLatestCVEs

Source

DARKReading

How Do We Secure Our Cities From Attack?

Physical access matters in keeping people and buildings safe. Points to consider when establishing a physical security protocol are ways to lock down an area to keep people safe, approaches to communicate clear safety directions, and access control.

DARKReading
#vulnerability#git#intel
Now Is the Time to Plan for Post-Quantum Cryptography

Panelists from an RSA Conference keynote agreed that organizations need to begin work on PQC migration, if they haven't already.

An Emerging Threat: Attacking 5G Via Network Slices

A successful attack against 5G networks could disrupt critical infrastructure, manipulate sensor data, or even cause physical harm to humans.

Mandia: Keep 'Shields Up' to Survive the Current Escalation of Cyberattacks

As Mandiant CEO Kevin Mandia's company prepares to become part of Google, the incident response company continues to investigate many of the most critical cyber incidents.

Multilevel Extortion: DeadBolt Ransomware Targets Internet-Facing NAS Devices

The innovative ransomware targets NAS devices, has a multitiered payment and extortion scheme as well as a flexible configuration, and takes a heavily automated approach.

How the C-Suite Puts Shoulders Into Zero Trust in 2022

A full 77% of tech executives say they'll increase spending in zero-trust architecture in the coming year.

RSAC Opens With Message of Transformation

Cybersecurity needs to shift its thinking ahead of the next disruption, RSA's CEO said during the opening 2022 conference keynote.

Enterprise Security Around the Dinner Table

Enterprise cybersecurity awareness training has evolved to include informal lessons for employees' family members, and it has many benefits.

7 NFT Scams That Could Be Targeting Your Brand

Brands should be vigilant to ensure sites and listings promoting NFTs for sale are legitimate and not being used as an instrument by fraudsters to swindle customers.

Harnessing AI to Proactively Thwart Threats

By using artificial intelligence to predict how an attacker would carry out their attack, we can deploy defenses and preemptively shut down vulnerable entry points.