Conferences are where vendors and security researchers meet face to face to address problems and discuss solutions — in public. This article has been indexed from Dark Reading Read the original article: Security Conferences Keep Us Honest
Tag: Dark Reading
Companies Explore Ways to Safeguard Data in the Age of LLMs
Generative AI models are forcing companies to become creative in how they keep employees from giving away sensitive data. This article has been indexed from Dark Reading Read the original article: Companies Explore Ways to Safeguard Data in the Age…
How to Get Your Board on Board With Cybersecurity
CISOs can refine their soft skills to help get their cybersecurity best-practices message across. Steps include increasing staff incident-response training and staying current with the threat landscape. This article has been indexed from Dark Reading Read the original article: How…
Dragos Raises $74M in Latest Funding Round
The funds will be used to expand its global presence beyond Europe and the US. This article has been indexed from Dark Reading Read the original article: Dragos Raises $74M in Latest Funding Round
A Playbook for Bridging Africa’s Cybersecurity Skills Shortage
A pledge to solve the skills and talent shortage by the US government has seen one Nigerian company join the effort and aid Africa. This article has been indexed from Dark Reading Read the original article: A Playbook for Bridging…
Supporting Africa’s Cybersecurity Talent Makes the World Safer
The global infosec community needs to help African nations defend against growing threats. This article has been indexed from Dark Reading Read the original article: Supporting Africa’s Cybersecurity Talent Makes the World Safer
AI in Software Development: The Good, the Bad, and the Dangerous
Just like with using open source, organizations need to be diligent about testing AI components and understanding where and how it is used in their software. This article has been indexed from Dark Reading Read the original article: AI in…
Evaluating New Partners and Vendors From an Identity Security Perspective
Before working with new vendors, it’s important to understand the potential risks they may pose to your digital environments. This article has been indexed from Dark Reading Read the original article: Evaluating New Partners and Vendors From an Identity Security…
DoD: China’s ICS Cyber Onslaught Aimed at Gaining Kinetic Warfare Advantage
Escalating incursions into military base infrastructure, telecom networks, utilities, and more signal that Beijing is laying the groundwork for mass disruption. This article has been indexed from Dark Reading Read the original article: DoD: China’s ICS Cyber Onslaught Aimed at…
Microsoft Flushes Out ‘Ncurses’ Gremlins
The maintainers of the widely used library recently patched multiple memory corruption vulnerabilities that attackers could have abused to, ahem, curse targets with malicious code and escalate privileges. This article has been indexed from Dark Reading Read the original article:…