AuthorEricka Chickowski Contributing Writer, Dark Reading

Most Websites and Web Apps No Match for Attack Barrage

The average website is attacked 50 times per day, with small businesses especially vulnerable.

7 Ways Cybercriminals Are Scamming a Fortune from Cryptocurrencies

Cryptocurrencies, how do hackers love thee? Let us count the ways.

The State of IT and Cybersecurity

IT and security are often viewed as different disciplines - and different departments. Find out what survey data shows by reading this report today!

The Breach Disclosure Double Standard

Cybersecurity pros expect to be notified immediately when they're breached, but most don't do the same - and some even cover up breaches.

The Breach Disclosure Double Standard

Cybersecurity pros expect to be notified immediately when they're breached, but most don't do the same - and some even cover up breaches.

Git Fixes Serious Code Repository Vulnerability

GitHub, Visual Studio Team Services, and other code repositories patching to prevent attackers from targeting developer systems.

Git Fixes Serious Code Repository Vulnerability

GitHub, Visual Studio Team Services, and other code repositories patching to prevent attackers from targeting developer systems.

10 Free DevOps-Friendly Security Tools Developers Will Love

Start building an affordable DevSecOps automation toolchain with these free application security tools.

What Should Post-Quantum Cryptography Look Like?

Researchers are tackling the difficult problem of transitioning toward a new mode of cryptographic protections that won't break under the pressure of quantum computing power.

What Should Post-Quantum Cryptography Look Like?

Researchers are tackling the difficult problem of transitioning toward a new mode of cryptographic protections that won't break under the pressure of quantum computing power.