AuthorCurtis Franklin Jr. Senior Editor at Dark Reading

Four New Vulnerabilities in Phoenix Contact Industrial Switches

A series of newly disclosed vulnerabilities could allow an attacker to gain control of industrial switches.

Artificial Intelligence & the Security Market

A glimpse into how two new products for intrusion detection and entity resolution are using AI to help humans do their jobs.

7 Places Where Privacy and Security Collide

Privacy and security can experience tension at a number of points in the enterprise. Here are seven - plus some possibilities for easing the strain.

Mylobot Malware Brings New Sophistication to Botnets

The malware pulls together a variety of techniques to gain a foothold and remain undiscovered.

Mylobot Malware Brings New Sophistication to Botnets

The malware pulls together a variety of techniques to gain a foothold and remain undiscovered.

Cisco CPO: Privacy Is Not About Secrecy or Compliance

Michelle Dennedy sat down with Dark Reading at the recent Cisco Live to set the record straight about privacy, regulation, encryption, and more.

Cisco Talos Summit: Network Defenders Not Serious Enough About Attacks

Security is weak, and most companies are clueless, according to Immunity researcher Lurene Grenier, who kicked off the Cisco Talos Threat Research Summit on Sunday.

SAP CSO: Security Requires Context

Security depends on the apps and networks it protects. SAP CSO Justin Somiani discusses three scenarios.

DevSecOps Gains Enterprise Traction

Enterprise adoption of DevSecOps has surged in the past year, according to a study conducted at this year's RSA Conference.

7 Variants (So Far) of Mirai

Mirai is an example of the newest trend in rapidly evolving, constantly improving malware. These seven variants show how threat actors are making bad malware worse.