Everything you care about in one place

Follow feeds: blogs, news, RSS and more. An effortless way to read and digest content of your choice.

Get Feeder


Dark Reading:

Get the latest updates from Dark Reading: directly as they happen.

Follow now 375 followers

Latest posts

Last updated about 2 hours ago

How to Get Started With Zero Trust in a SaaS Environment

about 2 hours ago

Given current business conditions and the prevalence of SaaS technologies, now is...

Research Highlights Significant Evolution in Email Security

about 3 hours ago

Email security is in transition, from on-premises to the cloud, from inline...

What Is the Difference Between Security and Resilience?

3 days ago

Resilience shifts the focus toward eliminating the probable impact of the full...

Consumers Share Security Fears as Risky Behaviors Persist

3 days ago

While most US adults know they aren't sufficiently protecting their data online...

TangleBot Campaign Underscores SMS Threat

3 days ago

The attack targets Android devices and starts with a malicious SMS message...

Contrast Application Security Platform Scales to Support OWASP Risks

3 days ago

Contrast's platform detects and prevents against OWASP Top Ten risks from development...

Our Eye Is on the SPARROW

3 days ago

How unauthorized users can exploit wireless infrastructures for covert communication.

Endpoint Still a Prime Target for Attack

3 days ago

A vast majority of security professionals surveyed think any exploit will start...

Google Spots New Technique to Sneak Malware Past Detection Tools

4 days ago

The operator behind OpenSUpdater is using a new way to sneak adware...

Primer: Microsoft Active Directory Security for AD Admins

4 days ago

Nearly all AD environments are vulnerable to identity attack paths -- a...

FamousSparrow APT Group Flocks to Hotels, Governments, Businesses

4 days ago

The cyber espionage group has a custom backdoor and has added the...

SAIC Appoints Kevin Brown as Chief Information Security Officer

4 days ago

Industry leader with decades of information security experience manages SAIC’s security strategy...