Which cyber defenses actually work against current threats? An analysis of cyber-insurance claims data shows six technologies ...
With a new year upon us, software-security experts disagree on SBOM utility — in theory, SBOMs are great, but in practice, ...
2025 included a number of monumental threats, from global nation-state attacks to a critical vulnerability under widespread ...
Developers are leaning more heavily on AI for code generation, but in 2026, the development pipeline and security need to be ...
Patricia Voight, CISO at Webster Bank, shares her expertise on combating financial crimes and championing diversity in a ...
Take part in the new survey from Dark Reading and help uncover trends, challenges, and solutions shaping the future of ...
Acquiring Armis will help further ServiceNow's plans for autonomous cybersecurity and building a security stack to ...
In the React2Shell saga, nonworking and trivial proof-of-concept exploits led to a false sense of security. Can the onslaught ...
"Prince of Persia" has rewritten the rules of persistence with advanced operational security and cryptographic communication ...
With attacks on the critical firewall vulnerability, WatchGuard joins a list of edge device vendors whose products have been ...
Interpol said law enforcement across 19 countries made 574 arrests and recovered $3 million, against a backdrop of spiraling ...
In the attacks against the vendor's SMA1000 line, threat actors chained a new zero-day flaw with a critical vulnerability ...