News and information on IT security, helping information security pros manage the balance between data protection and user access.

Joined November 2008
Filter
Exclude
Time range
-
Near
Despite security risks, passwords remain our default authentication method, and often the sole authentication method, for enterprise systems and applications. Password managers, SSO, and MFA are trying to pick up the slack. Their benefits and drawbacks: informatech.co/3DYYKVb
0
3
1
5
When life inside the security operations center feels treacherous, here are some suggestions for getting out alive. What 'Squid Game' teaches us about cybersecurity: informatech.co/30HuEam
0
7
1
4
Name That Toon: Bone Dry informatech.co/3DXHdwy Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card
0
2
1
1
"Filling crucial roles in cybersecurity and addressing the talent shortage requires rethinking who qualifies as a "cybersecurity professional" and rewriting traditional job descriptions." More on hiring in #cybersecurity: informatech.co/3meDaG4
0
2
2
3
Microsoft's analysis of a recent phishing attack shows how cybercriminals are mixing and matching to efficiently develop their attack frameworks. Details on the 'TodayZoo' phishing kit: informatech.co/2ZkF27W
0
5
1
5
Cyber Threats, Cyber Vulnerabilities: Assessing Your Attack Surface | At this November 17 Dark Reading Virtual Event get an overview of the most common security vulnerabilities in enterprise systems, and how attackers exploit them. Get Your Pass Today>> events.darkreading.com/virtu…
0
4
1
0
Cyber Threats, Cyber Vulnerabilities: Assessing Your Attack Surface | At this November 17 Dark Reading Virtual Event get an overview of the most common security vulnerabilities in enterprise systems, and how attackers exploit them. Get Your Pass Today>> events.darkreading.com/virtu…
1
6
1
6
Name That Toon: Bone Dry informatech.co/3DXHdwy Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card
0
2
1
1
Name That Edge Toon: Mobile Monoliths: informatech.co/3mo5LI1 Feeling creative? Come up with a clever caption, and our panel of experts will reward the winner with a $25 Amazon gift card.
0
2
1
0
Macs are not immune to malicious attacks, but outside of some major nation-state efforts, bad actors continue to use adware as the method of choice to make money from infecting the macOS operating system, new research shows: informatech.co/3nju5Ly
0
4
1
2