Dark Reading

How Cyberattacks Work

5 days 12 hours ago
Cyberattacks are run like military attacks, in four main phases: reconnaissance, attack, exfiltration, and maintaining position. Understanding this makes fighting back easier.
Ray Espinoza Director of Security at Cobalt.io

Telos Goes Public

6 days 3 hours ago
Nearly a month after McAfee made its second appearance on the public market, the Virginia-based provider of security services to government and commercial organizations makes its own debut.
Jai Vijayan Contributing Writer

ISP Security: Do We Expect Too Much?

6 days 4 hours ago
With so many people now connecting to business networks from home routers, ISP security takes on heightened importance. But is the security provided by ISPs good enough to be the only security SMBs and remote employees need?
Pam Baker Contributing Writer

New Proposed DNS Security Features Released

6 days 11 hours ago
Verisign's R&D team has developed new ways to authenticate and optimize DNS traffic on the client side of the domain-name resolution process.
Kelly Jackson Higgins Executive Editor at Dark Reading

Unpatched Browsers Abound, Study Shows

6 days 13 hours ago
Google Chrome users don't always take time to relaunch browser updates, and some legacy applications don't support new versions of Chrome, Menlo Security says.
Steve Zurier Contributing Writer
16 minutes 31 seconds ago
Dark Reading
Dark Reading: Connecting the Information and Security Community
Subscribe to Dark Reading feed