News

How do CEOs, their executive teams, and their HR partners attract the best of the market? Here are a few ways. 1. Level and structure the role appropriately: If security — of enterprise data ...
Welcome to CISO Corner, Dark Reading's weekly digest of articles tailored specifically to security operations readers and security leaders. Every week, we'll offer articles gleaned from across our ...
Conclusion As organizations continue to onboard new vendors, supply chain and other third-party risks will continue to climb. By continuously evaluating and updating your organization's third ...
TechTarget and Informa Tech’s Digital Business Combine. Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million ...
Every year, more men and women enter cybersecurity, driven by the sector's explosive growth in response to increasingly sophisticated threats. In 2023, the global cybersecurity workforce hit 5.5 ...
Every person in this scene is just so joyful that we can't help by wonder, what are they so happy about? Send us a cybersecurity-related caption to describe the above scene and our favorite entry ...
Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.
BLACK HAT USA 2023, LAS VEGAS -- Dark Reading News Desk was live for two days during Black Hat USA, at Mandalay Bay in Las Vegas. Dark Reading editor Becky Bracken hosted a bevy of Black Hat ...
What motivates you? What will change how you do security? Send us a cybersecurity-related caption to describe the above scene and our favorite entry will win its wordsmith a $25 gift card.
Glenn Ignazio is the COO of Dymium and a retired Air Force Special Operations commander and national security expert. He is best known for his experience translating complex technology into ...
Historically, organizations have relied on static risk assessments and due diligence processes to evaluate their suppliers. This involves vetting vendors using questionnaires, compliance audits ...
That's the sound of buckets of money. Where is it coming from? Where is it going? Send us a cybersecurity-related caption to describe the above scene and our favorite entry will win its wordsmith ...