AuthorEricka Chickowski Contributing Writer, Dark Reading

2019 Attacker Playbook

Security pundits predict the ways that cybercriminals, nation-state actors, and other attackers will refine their tactics, techniques, and procedures in the coming year.

6 CISO Resolutions for 2019

The ultimate to-do list for ambitious security leaders.

Beware the Malware-Laden Brexit News

New Fancy Bear attack campaign lures victims with phony Brexit-themed document to deliver Zekapab payload.

2018 Hacker Kids Gift Guide

Fun gift choices that foster design thinking and coding skills in kids both young and old.

Security Teams Struggle with Container Security Strategy

Fewer than 30% of firms have more than a basic container security plan in place.

7 Cool New Security Tools to be Revealed at Black Hat Europe

Black Hat Europe's Arsenal lineup will include demonstrations of tools addressing everything from unsecured cloud buckets to unknown IoT devices.

Speed Up AppSec Improvement With an Adversary-Driven Approach

Stop overwhelming developers and start using real-world attack behavior to prioritize application vulnerability fixes.

2018 State of Cyber Workforce

Let's start with this eye-opener: The cybersecurity profession is facing a shortfall of 3 million workers worldwide.

6 Reasons Why Employees Violate Security Policies

Get into their heads to find out why they're flouting your corporate cybersecurity rules.

12 AppSec Activities Enterprises Can’t Afford to Skip

The latest Building Security in Maturity Model (BSIMM9) report offers a statistically backed, bare-minimum benchmark for software security initiatives.