Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

4 Steps to Cyber Resilience | Expert Insights from LevelBlue | Dark Reading Interview

In this exclusive Dark Reading News Desk interview, Theresa Lanowitz from LevelBlue shares four practical and powerful steps organizations can take to boost their cyber resilience. From fostering a proactive cybersecurity culture to elevating cyber discussions to the boardroom, this conversation is packed with actionable insights. Learn how to secure your software supply chain, leverage AI for defense, and stay ahead of emerging threats.

Vulnerability Data in Next Gen-SIEM with Falcon Exposure Management

Vulnerability data is often siloed and captured in static dashboards, disconnected from real-time investigation. But with Falcon Exposure Management streaming into NG-SIEM, that changes. This demo shows how teams can correlate live vulnerability events with endpoint behavior, network activity, and even cloud telemetry. Using a Firefox example, we trace active and historical exposure, revealing how ExPRT.AI, asset metadata, and cloud-aware context come together in Next Gen SIEM.

Reclaiming analyst time: Smarter investigations with AI in defence

How the MOD can reduce investigation fatigue and boost operational efficiency Security analysts at the UK Ministry of Defence (MOD) — and everywhere — face an overwhelming challenge: They can receive thousands of alerts daily, and distinguishing genuine threats from false positives in a timely fashion has become nearly impossible without technological intervention.

Fireblocks unlocks liquid ETH staking for 2,000+ institutions via Liquid Collective

As Ethereum ETFs gain traction, Fireblocks offers clients direct access to LsETH—combining ETH staking rewards with liquidity and compliance. Fireblocks has joined Liquid Collective as a Platform, adding support for Liquid Collective’s Liquid Staked ETH (LsETH). This integration enables institutions to stake ETH and access Ethereum network rewards while preserving liquidity and capital efficiency.

What Payment Page Scenarios Trigger PCI DSS 4.0 Requirements - and How Can CISOs Stay Compliant?

Because PCI DSS 4.0 shifts focus to client-side risk, payment pages — especially those using JavaScript, third-party scripts, or marketing tags — are under increased scrutiny. Even if your backend is secure, what happens in the browser can expose cardholder data or create audit failure risk.

The Security Posture Improvement Tactic You Need to Know

What’s the one security tactic your team isn’t using – but should be? If your risk register keeps growing, your analysts are stretched thin, and your attack surface feels like it’s multiplying daily, you’re not alone. The challenge isn’t knowing that your security posture needs improvement — it’s knowing how to do it efficiently, consistently, and without burning out your team.