AuthorEricka Chickowski Contributing Writer, Dark Reading

Online Sandboxing: A Stash for Exfiltrated Data?

SafeBreach researchers extend leaky sandbox research to show how services like VirusTotal and Hybrid Analysis could be used to steal data from air-gapped systems.

What CISOs Should Know About Quantum Computing

As quantum computing approaches real-world viability, it also poses a huge threat to today's encryption measures.

ICS Under Fire in 2017

New Dragos report finds rising number of public vulnerability advisories around ICS with not enough reasonable guidance around how to deal with these flaws.

7 Key Stats that Size Up the Cybercrime Deluge

Updated data on zero-days, IoT threats, cryptomining, and economic costs should keep eyebrows raised in 2018.

Encrypted Attacks Continue to Dog Perimeter Defenses

Attacks using SSL to obfuscate malicious traffic finding fertile ground for growth.

IoT Botnets by the Numbers

IoT devices are a botherder's dream attack-vector.

You Break It, They Buy It: Economics, Motivations Behind Bug Bounty Hunting

Some bug hunters make 16 times the median salary of software engineers in their home countries.

RIG EK Remains Top of Heap, Turns to Cryptomining

Popular exploit kit turns its sights to drive-by cryptomining in what security researchers believe will be a trend to follow in 2018.

20 Cybersecurity Vendors Getting Venture Capital Love

VCs splashed a record $4B in funding in the cybersecurity pool - here are some highlights among the early- to middle-stage startups who snagged big deals last year.

CISO Holiday Miracle Wish List

If CISOs could make a wish to solve a problem, these would be among the top choices.