INFORMATION SYSTEMS MADE SIMPLE
- The Cyber-Asset Management Playbook for Supply Chain Modernizationby Keith Neilson, Technical Evangelist, CloudSphere on July 6, 2022 at 2:00 pm
Organizations must balance the risk and reward of new cyber-asset management technologies.
- Roundtable: Amid Cyberattack Frenzy, How Can QNAP Customers Protect the Business?by Tara Seals, Managing Editor, News, Dark Reading on July 6, 2022 at 1:15 pm
Our roundtable of cybersecurity experts weighs in on what makes QNAP network-attached storage catnip for attackers, and what organizations can do about it.
- NIST Picks 4 Quantum-Resistant Cryptographic Algorithmsby Dark Reading Staff, Dark Reading on July 5, 2022 at 11:56 pm
The US Department of Commerce's National Institute of Standards and Technology has announced the first group of encryption tools that will become part of its post-quantum cryptographic standard.
- HackerOne Employee Fired for Stealing and Selling Bug Reports for Personal Gainby Jai Vijayan, Contributing Writer, Dark Reading on July 5, 2022 at 9:29 pm
Company says it is making changes to its security controls to prevent malicious insiders from doing the same thing in future; reassures bug hunters their bounties are safe.
- Supply Chain Attack Deploys Hundreds of Malicious NPM Modules to Steal Databy Dark Reading Staff, Dark Reading on July 5, 2022 at 8:40 pm
A widespread campaign uses more than 24 malicious NPM packages loaded with JavaScript obfuscators to steal form data from multiple sites and apps, analysts report.
- Why Browser Vulnerabilities Are a Serious Threat — and How to Minimize Your Riskby Michael Walters, President & Co-Founder, Action1 Corporation on July 5, 2022 at 5:00 pm
As a result of browser market consolidation, adversaries can focus on uncovering vulnerabilities in just two main browser engines.