Dark Reading
Scanning for Flaws, Scoring for Security
Is it fair to judge an organization's information security posture simply by looking at its Internet-facing assets for weaknesses commonly sought after and exploited by attackers, such as outdated software or accidentally ...
11/19/18: Dtex, Insider Threat, Privacy News Blog: Trump Signs CISA Legislation; Defending Against Culture; Surveillance: Freedom’s Killer
Happy Thanksgiving! The holiday may equate to a short work week in the US but there is certainly no shortage of news breaking about cybersecurity, privacy and the insider threat. The biggest ...
11/5/18: Dtex, Insider Threat, Privacy News: Insider Threat Matures; China Intel Officers Recruit Insiders; Sen. Wyden Disrupts Privacy, Again
The insider threat has come of age. Last week, The National Insider Threat Task Force (NITTF), operating under the joint leadership of the Attorney General and the Director of National Intelligence, announced ...
9/4/18 – Dtex, Insider Threat, Privacy News: Dtex Announces Record Year, Adds New CFO and NSA Veteran to Team, Human Error Drives UK Data Breach Increase
Increasing insider threat rates that include incidents caused by malicious actors and negligent humans drove demand for user behavior intelligence during our fiscal 2018 year, which lead to a record-setting 12 month ...
Monday, Aug. 6, Dtex in the News: The Pervasive Insider Threat, GDPR Creates Privileged User Security Problems, Vulnerable Humans Behind UnityPoint Data Breach
The Dtex 2018 Insider Threat Intelligence Report continues to lead industry discussions about how frequently the insider threat occurs in public and private sector organizations. Last week, CSO’s Christopher Burgess dove into ...
Monday, July 23: Dtex, Insider Threat, Privacy in the News: Top Ways Insiders Go Rogue, DOJ Shifts Focus to Election Security, HR Industry Eyes Importance of Privacy
It’s true that many of the most damaging data breaches are caused by trusted insiders who make mistakes and fall prey to attackers. There are also plenty of examples of malicious insiders ...
Malware & Fileless Malware: How It’s Created, How It Spreads, and What To Do About It [On-Demand Webinar]
In this Dark Reading webinar, experts in cybersecurity share their views on what’s going on with malware, and how it evolves to outsmart even your most elaborate defenses Hear about the growing ...
Monday, June 25: Dtex, Insider Threat in the News: Dtex CEO Christy Wyatt Speaks to Dark Reading about Tesla Insider Attack, NBC about Privacy and SCOTUS Cell Phone Decision; Tech’s Mega Players Meeting Wednesday to Talk Privacy and Regulation
The United States Supreme Court last week ruled in ‘Carpenter v. United States’ that the Fourth Amendment of the US Constitution requires law enforcement agencies to obtain a search warrant to access ...
Monday, June 4, Dtex in the News: Got Vulnerable People? Facebook has 2 Billion, Dtex Provides Dark Reading Advice on How to Protect Them
When thinking about the insider threat, it is easy to focus on Edward Snowden, Chelsea Manning, and lawsuits between companies like Uber and Waymo. This is because the term itself conjures images ...