Dark Reading

Shadow IT Spurs 1 in 3 Cyberattacks

Cerby platform emerges from stealth mode to let users automate security for applications outside of the standard IT purview.

Thrive Acquires DSM

DSM is now the third acquisition by Thrive in Florida in the past six months.

It's a Race to Secure the Software Supply Chain — Have You Already Stumbled?

If you haven't properly addressed the issue, you're already behind. But even if you've had a false start, it's never too late to get back up.

Threat Intelligence Services Are Universally Valued by IT Staff

Most of those surveyed are concerned about AI-based attacks and deepfakes but suggest that their organizations are ready.

Why We're Getting Vulnerability Management Wrong

Security is wasting time and resources patching low or no risk bugs. In this post, we examine why security practitioners need to rethink vulnerability management.

APT Groups Swarming on VMware Servers with Log4Shell

CISA tells organizations running VMware servers without Log4Shell mitigations to assume compromise.