CINXE.COM
Dark Reading | Security | Protect The Business
<!DOCTYPE html><html lang="en"><head><meta charSet="utf-8"/><meta name="viewport" content="width=device-width,initial-scale=1"/><meta name="robots" content="max-image-preview:large"/><title>Dark Reading | Security | Protect The Business</title><meta name="description" content="Dark Reading: Connecting The Cybersecurity Community."/><meta property="og:title" content="Dark Reading | Security | Protect The Business"/><meta property="og:description" content="Dark Reading: Connecting The Cybersecurity Community."/><meta property="og:url" content="https://www.darkreading.com"/><meta property="og:type" content="website"/><meta property="og:image" content="https://www.darkreading.com/build/_assets/darkreading-DSJITCUD.ico"/><link rel="canonical" href="https://www.darkreading.com"/><script type="application/ld+json">{"@context":"https://schema.org","@type":"NewsMediaOrganization","name":"Homepage","description":"Dark Reading: Connecting The Cybersecurity Community. ","url":"https://www.darkreading.com","logo":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blte9ead971f13c662e/65437029846d7c040a6e588d/Logo_-_Dark_Reading.svg","publisher":{"@type":["NewsMediaOrganization","Organization","OnlineBusiness"],"identifier":"https://www.darkreading.com","name":"Dark Reading","url":"https://www.darkreading.com","sameAs":["https://twitter.com/DarkReading","https://www.linkedin.com/company/dark-reading/","https://www.facebook.com/darkreadingcom/","https://www.youtube.com/@DarkReadingOfficialYT","https://news.google.com/publications/CAAqBwgKMKmknwswtq63Aw"],"foundingDate":"2006","description":"To challenge community members to think about security by providing strong, even unconventional points of view, backed by hard-nosed reporting, hands-on experience, and the professional knowledge that comes only with years of work in the information security industry.","logo":{"@type":"ImageObject","url":"https://www.darkreading.com/build/_assets/DarkReading-EAU2PZUE.svg","width":{"@type":"QuantitativeValue","value":1008},"height":{"@type":"QuantitativeValue","value":112}}}}</script><link rel="preload" href="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt3317719ff4b0bbee/6747152ee2b6b17ae587bdee/cardskimming_Kim_Kuperkova_shutterstock.jpg?width=700&auto=webp&quality=10&disable=upscale&blur=40" as="image"/><link rel="preload" href="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt2a398059c351b556/67475250f8c46b7f032fc959/russia_PHOTOCREO_Michal_Bednarek_shutterstock.jpg?width=300&auto=webp&quality=10&disable=upscale&blur=40" as="image"/><link rel="preload" href="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/bltd9544fe544dde688/674635c9fde1977e265db529/matrix_Kundra_shutterstock.jpg?width=300&auto=webp&quality=10&disable=upscale&blur=40" as="image"/><meta property="twitter:card" content="summary"/><script type="text/javascript">window.NREUM||(NREUM={});NREUM.init={distributed_tracing:{enabled:true},privacy:{cookies_enabled:true},ajax:{deny_list:["bam.eu01.nr-data.net"]}}; ;NREUM.loader_config={accountID:"3936348",trustKey:"3288925",agentID:"538600199",licenseKey:"NRJS-26ae6a3b09493bbcc87",applicationID:"538600199"}; ;NREUM.info={beacon:"bam.eu01.nr-data.net",errorBeacon:"bam.eu01.nr-data.net",licenseKey:"NRJS-26ae6a3b09493bbcc87",applicationID:"538600199",sa:1}; ;/*! For license information please see nr-loader-spa-1.274.0.min.js.LICENSE.txt */ (()=>{var e,t,r={8122:(e,t,r)=>{"use strict";r.d(t,{a:()=>i});var n=r(944);function i(e,t){try{if(!e||"object"!=typeof e)return(0,n.R)(3);if(!t||"object"!=typeof t)return(0,n.R)(4);const r=Object.create(Object.getPrototypeOf(t),Object.getOwnPropertyDescriptors(t)),o=0===Object.keys(r).length?e:r;for(let a in o)if(void 0!==e[a])try{if(null===e[a]){r[a]=null;continue}Array.isArray(e[a])&&Array.isArray(t[a])?r[a]=Array.from(new Set([...e[a],...t[a]])):"object"==typeof e[a]&&"object"==typeof t[a]?r[a]=i(e[a],t[a]):r[a]=e[a]}catch(e){(0,n.R)(1,e)}return r}catch(e){(0,n.R)(2,e)}}},2555:(e,t,r)=>{"use strict";r.d(t,{Vp:()=>c,fn:()=>s,x1:()=>u});var n=r(384),i=r(8122);const o={beacon:n.NT.beacon,errorBeacon:n.NT.errorBeacon,licenseKey:void 0,applicationID:void 0,sa:void 0,queueTime:void 0,applicationTime:void 0,ttGuid:void 0,user:void 0,account:void 0,product:void 0,extra:void 0,jsAttributes:{},userAttributes:void 0,atts:void 0,transactionName:void 0,tNamePlain:void 0},a={};function s(e){try{const t=c(e);return!!t.licenseKey&&!!t.errorBeacon&&!!t.applicationID}catch(e){return!1}}function c(e){if(!e)throw new Error("All info objects require an agent identifier!");if(!a[e])throw new Error("Info for ".concat(e," was never set"));return a[e]}function u(e,t){if(!e)throw new Error("All info objects require an agent identifier!");a[e]=(0,i.a)(t,o);const r=(0,n.nY)(e);r&&(r.info=a[e])}},9417:(e,t,r)=>{"use strict";r.d(t,{D0:()=>h,gD:()=>g,xN:()=>p});var n=r(993);const i=e=>{if(!e||"string"!=typeof e)return!1;try{document.createDocumentFragment().querySelector(e)}catch{return!1}return!0};var o=r(2614),a=r(944),s=r(384),c=r(8122);const u="[data-nr-mask]",d=()=>{const e={mask_selector:"*",block_selector:"[data-nr-block]",mask_input_options:{color:!1,date:!1,"datetime-local":!1,email:!1,month:!1,number:!1,range:!1,search:!1,tel:!1,text:!1,time:!1,url:!1,week:!1,textarea:!1,select:!1,password:!0}};return{ajax:{deny_list:void 0,block_internal:!0,enabled:!0,harvestTimeSeconds:10,autoStart:!0},distributed_tracing:{enabled:void 0,exclude_newrelic_header:void 0,cors_use_newrelic_header:void 0,cors_use_tracecontext_headers:void 0,allowed_origins:void 0},feature_flags:[],generic_events:{enabled:!0,harvestTimeSeconds:30,autoStart:!0},harvest:{tooManyRequestsDelay:60},jserrors:{enabled:!0,harvestTimeSeconds:10,autoStart:!0},logging:{enabled:!0,harvestTimeSeconds:10,autoStart:!0,level:n.p_.INFO},metrics:{enabled:!0,autoStart:!0},obfuscate:void 0,page_action:{enabled:!0},page_view_event:{enabled:!0,autoStart:!0},page_view_timing:{enabled:!0,harvestTimeSeconds:30,autoStart:!0},performance:{capture_marks:!1,capture_measures:!1},privacy:{cookies_enabled:!0},proxy:{assets:void 0,beacon:void 0},session:{expiresMs:o.wk,inactiveMs:o.BB},session_replay:{autoStart:!0,enabled:!1,harvestTimeSeconds:60,preload:!1,sampling_rate:10,error_sampling_rate:100,collect_fonts:!1,inline_images:!1,fix_stylesheets:!0,mask_all_inputs:!0,get mask_text_selector(){return e.mask_selector},set mask_text_selector(t){i(t)?e.mask_selector="".concat(t,",").concat(u):""===t||null===t?e.mask_selector=u:(0,a.R)(5,t)},get block_class(){return"nr-block"},get ignore_class(){return"nr-ignore"},get mask_text_class(){return"nr-mask"},get block_selector(){return e.block_selector},set block_selector(t){i(t)?e.block_selector+=",".concat(t):""!==t&&(0,a.R)(6,t)},get mask_input_options(){return e.mask_input_options},set mask_input_options(t){t&&"object"==typeof t?e.mask_input_options={...t,password:!0}:(0,a.R)(7,t)}},session_trace:{enabled:!0,harvestTimeSeconds:10,autoStart:!0},soft_navigations:{enabled:!0,harvestTimeSeconds:10,autoStart:!0},spa:{enabled:!0,harvestTimeSeconds:10,autoStart:!0},ssl:void 0,user_actions:{enabled:!0}}},l={},f="All configuration objects require an agent identifier!";function h(e){if(!e)throw new Error(f);if(!l[e])throw new Error("Configuration for ".concat(e," was never set"));return l[e]}function p(e,t){if(!e)throw new Error(f);l[e]=(0,c.a)(t,d());const r=(0,s.nY)(e);r&&(r.init=l[e])}function g(e,t){if(!e)throw new Error(f);var r=h(e);if(r){for(var n=t.split("."),i=0;i<n.length-1;i++)if("object"!=typeof(r=r[n[i]]))return;r=r[n[n.length-1]]}return r}},5603:(e,t,r)=>{"use strict";r.d(t,{a:()=>c,o:()=>s});var n=r(384),i=r(8122);const o={accountID:void 0,trustKey:void 0,agentID:void 0,licenseKey:void 0,applicationID:void 0,xpid:void 0},a={};function s(e){if(!e)throw new Error("All loader-config objects require an agent identifier!");if(!a[e])throw new Error("LoaderConfig for ".concat(e," was never set"));return a[e]}function c(e,t){if(!e)throw new Error("All loader-config objects require an agent identifier!");a[e]=(0,i.a)(t,o);const r=(0,n.nY)(e);r&&(r.loader_config=a[e])}},3371:(e,t,r)=>{"use strict";r.d(t,{V:()=>f,f:()=>l});var n=r(8122),i=r(384),o=r(6154),a=r(9324);let s=0;const c={buildEnv:a.F3,distMethod:a.Xs,version:a.xv,originTime:o.WN},u={customTransaction:void 0,disabled:!1,isolatedBacklog:!1,loaderType:void 0,maxBytes:3e4,onerror:void 0,ptid:void 0,releaseIds:{},appMetadata:{},session:void 0,denyList:void 0,timeKeeper:void 0,obfuscator:void 0},d={};function l(e){if(!e)throw new Error("All runtime objects require an agent identifier!");if(!d[e])throw new Error("Runtime for ".concat(e," was never set"));return d[e]}function f(e,t){if(!e)throw new Error("All runtime objects require an agent identifier!");d[e]={...(0,n.a)(t,u),...c},Object.hasOwnProperty.call(d[e],"harvestCount")||Object.defineProperty(d[e],"harvestCount",{get:()=>++s});const r=(0,i.nY)(e);r&&(r.runtime=d[e])}},9324:(e,t,r)=>{"use strict";r.d(t,{F3:()=>i,Xs:()=>o,Yq:()=>a,xv:()=>n});const n="1.274.0",i="PROD",o="CDN",a="^2.0.0-alpha.17"},6154:(e,t,r)=>{"use strict";r.d(t,{A4:()=>s,OF:()=>d,RI:()=>i,WN:()=>h,bv:()=>o,gm:()=>a,lR:()=>f,m:()=>u,mw:()=>c,sb:()=>l});var n=r(1863);const i="undefined"!=typeof window&&!!window.document,o="undefined"!=typeof WorkerGlobalScope&&("undefined"!=typeof self&&self instanceof WorkerGlobalScope&&self.navigator instanceof WorkerNavigator||"undefined"!=typeof globalThis&&globalThis instanceof WorkerGlobalScope&&globalThis.navigator instanceof WorkerNavigator),a=i?window:"undefined"!=typeof WorkerGlobalScope&&("undefined"!=typeof self&&self instanceof WorkerGlobalScope&&self||"undefined"!=typeof globalThis&&globalThis instanceof WorkerGlobalScope&&globalThis),s="complete"===a?.document?.readyState,c=Boolean("hidden"===a?.document?.visibilityState),u=""+a?.location,d=/iPad|iPhone|iPod/.test(a.navigator?.userAgent),l=d&&"undefined"==typeof SharedWorker,f=(()=>{const e=a.navigator?.userAgent?.match(/Firefox[/\s](\d+\.\d+)/);return Array.isArray(e)&&e.length>=2?+e[1]:0})(),h=Date.now()-(0,n.t)()},7295:(e,t,r)=>{"use strict";r.d(t,{Xv:()=>a,gX:()=>i,iW:()=>o});var n=[];function i(e){if(!e||o(e))return!1;if(0===n.length)return!0;for(var t=0;t<n.length;t++){var r=n[t];if("*"===r.hostname)return!1;if(s(r.hostname,e.hostname)&&c(r.pathname,e.pathname))return!1}return!0}function o(e){return void 0===e.hostname}function a(e){if(n=[],e&&e.length)for(var t=0;t<e.length;t++){let r=e[t];if(!r)continue;0===r.indexOf("http://")?r=r.substring(7):0===r.indexOf("https://")&&(r=r.substring(8));const i=r.indexOf("/");let o,a;i>0?(o=r.substring(0,i),a=r.substring(i)):(o=r,a="");let[s]=o.split(":");n.push({hostname:s,pathname:a})}}function s(e,t){return!(e.length>t.length)&&t.indexOf(e)===t.length-e.length}function c(e,t){return 0===e.indexOf("/")&&(e=e.substring(1)),0===t.indexOf("/")&&(t=t.substring(1)),""===e||e===t}},1687:(e,t,r)=>{"use strict";r.d(t,{Ak:()=>c,Ze:()=>l,x3:()=>u});var n=r(7836),i=r(3606),o=r(860),a=r(2646);const s={};function c(e,t){const r={staged:!1,priority:o.P3[t]||0};d(e),s[e].get(t)||s[e].set(t,r)}function u(e,t){e&&s[e]&&(s[e].get(t)&&s[e].delete(t),h(e,t,!1),s[e].size&&f(e))}function d(e){if(!e)throw new Error("agentIdentifier required");s[e]||(s[e]=new Map)}function l(e="",t="feature",r=!1){if(d(e),!e||!s[e].get(t)||r)return h(e,t);s[e].get(t).staged=!0,f(e)}function f(e){const t=Array.from(s[e]);t.every((([e,t])=>t.staged))&&(t.sort(((e,t)=>e[1].priority-t[1].priority)),t.forEach((([t])=>{s[e].delete(t),h(e,t)})))}function h(e,t,r=!0){const o=e?n.ee.get(e):n.ee,s=i.i.handlers;if(!o.aborted&&o.backlog&&s){if(r){const e=o.backlog[t],r=s[t];if(r){for(let t=0;e&&t<e.length;++t)p(e[t],r);Object.entries(r).forEach((([e,t])=>{Object.values(t||{}).forEach((t=>{t[0]?.on&&t[0]?.context()instanceof a.y&&t[0].on(e,t[1])}))}))}}o.isolatedBacklog||delete s[t],o.backlog[t]=null,o.emit("drain-"+t,[])}}function p(e,t){var r=e[1];Object.values(t[r]||{}).forEach((t=>{var r=e[0];if(t[0]===r){var n=t[1],i=e[3],o=e[2];n.apply(i,o)}}))}},7836:(e,t,r)=>{"use strict";r.d(t,{P:()=>c,ee:()=>u});var n=r(384),i=r(8990),o=r(3371),a=r(2646),s=r(5607);const c="nr@context:".concat(s.W),u=function e(t,r){var n={},s={},d={},l=!1;try{l=16===r.length&&(0,o.f)(r).isolatedBacklog}catch(e){}var f={on:p,addEventListener:p,removeEventListener:function(e,t){var r=n[e];if(!r)return;for(var i=0;i<r.length;i++)r[i]===t&&r.splice(i,1)},emit:function(e,r,n,i,o){!1!==o&&(o=!0);if(u.aborted&&!i)return;t&&o&&t.emit(e,r,n);for(var a=h(n),c=g(e),d=c.length,l=0;l<d;l++)c[l].apply(a,r);var p=v()[s[e]];p&&p.push([f,e,r,a]);return a},get:m,listeners:g,context:h,buffer:function(e,t){const r=v();if(t=t||"feature",f.aborted)return;Object.entries(e||{}).forEach((([e,n])=>{s[n]=t,t in r||(r[t]=[])}))},abort:function(){f._aborted=!0,Object.keys(f.backlog).forEach((e=>{delete f.backlog[e]}))},isBuffering:function(e){return!!v()[s[e]]},debugId:r,backlog:l?{}:t&&"object"==typeof t.backlog?t.backlog:{},isolatedBacklog:l};return Object.defineProperty(f,"aborted",{get:()=>{let e=f._aborted||!1;return e||(t&&(e=t.aborted),e)}}),f;function h(e){return e&&e instanceof a.y?e:e?(0,i.I)(e,c,(()=>new a.y(c))):new a.y(c)}function p(e,t){n[e]=g(e).concat(t)}function g(e){return n[e]||[]}function m(t){return d[t]=d[t]||e(f,t)}function v(){return f.backlog}}(void 0,"globalEE"),d=(0,n.Zm)();d.ee||(d.ee=u)},2646:(e,t,r)=>{"use strict";r.d(t,{y:()=>n});class n{constructor(e){this.contextId=e}}},9908:(e,t,r)=>{"use strict";r.d(t,{d:()=>n,p:()=>i});var n=r(7836).ee.get("handle");function i(e,t,r,i,o){o?(o.buffer([e],i),o.emit(e,t,r)):(n.buffer([e],i),n.emit(e,t,r))}},3606:(e,t,r)=>{"use strict";r.d(t,{i:()=>o});var n=r(9908);o.on=a;var i=o.handlers={};function o(e,t,r,o){a(o||n.d,i,e,t,r)}function a(e,t,r,i,o){o||(o="feature"),e||(e=n.d);var a=t[o]=t[o]||{};(a[r]=a[r]||[]).push([e,i])}},3878:(e,t,r)=>{"use strict";function n(e,t){return{capture:e,passive:!1,signal:t}}function i(e,t,r=!1,i){window.addEventListener(e,t,n(r,i))}function o(e,t,r=!1,i){document.addEventListener(e,t,n(r,i))}r.d(t,{DD:()=>o,jT:()=>n,sp:()=>i})},5607:(e,t,r)=>{"use strict";r.d(t,{W:()=>n});const n=(0,r(9566).bz)()},9566:(e,t,r)=>{"use strict";r.d(t,{LA:()=>s,ZF:()=>c,bz:()=>a,el:()=>u});var n=r(6154);const i="xxxxxxxx-xxxx-4xxx-yxxx-xxxxxxxxxxxx";function o(e,t){return e?15&e[t]:16*Math.random()|0}function a(){const e=n.gm?.crypto||n.gm?.msCrypto;let t,r=0;return e&&e.getRandomValues&&(t=e.getRandomValues(new Uint8Array(30))),i.split("").map((e=>"x"===e?o(t,r++).toString(16):"y"===e?(3&o()|8).toString(16):e)).join("")}function s(e){const t=n.gm?.crypto||n.gm?.msCrypto;let r,i=0;t&&t.getRandomValues&&(r=t.getRandomValues(new Uint8Array(e)));const a=[];for(var s=0;s<e;s++)a.push(o(r,i++).toString(16));return a.join("")}function c(){return s(16)}function u(){return s(32)}},2614:(e,t,r)=>{"use strict";r.d(t,{BB:()=>a,H3:()=>n,g:()=>u,iL:()=>c,tS:()=>s,uh:()=>i,wk:()=>o});const n="NRBA",i="SESSION",o=144e5,a=18e5,s={STARTED:"session-started",PAUSE:"session-pause",RESET:"session-reset",RESUME:"session-resume",UPDATE:"session-update"},c={SAME_TAB:"same-tab",CROSS_TAB:"cross-tab"},u={OFF:0,FULL:1,ERROR:2}},1863:(e,t,r)=>{"use strict";function n(){return Math.floor(performance.now())}r.d(t,{t:()=>n})},7485:(e,t,r)=>{"use strict";r.d(t,{D:()=>i});var n=r(6154);function i(e){if(0===(e||"").indexOf("data:"))return{protocol:"data"};try{const t=new URL(e,location.href),r={port:t.port,hostname:t.hostname,pathname:t.pathname,search:t.search,protocol:t.protocol.slice(0,t.protocol.indexOf(":")),sameOrigin:t.protocol===n.gm?.location?.protocol&&t.host===n.gm?.location?.host};return r.port&&""!==r.port||("http:"===t.protocol&&(r.port="80"),"https:"===t.protocol&&(r.port="443")),r.pathname&&""!==r.pathname?r.pathname.startsWith("/")||(r.pathname="/".concat(r.pathname)):r.pathname="/",r}catch(e){return{}}}},944:(e,t,r)=>{"use strict";function n(e,t){"function"==typeof console.debug&&console.debug("New Relic Warning: https://github.com/newrelic/newrelic-browser-agent/blob/main/docs/warning-codes.md#".concat(e),t)}r.d(t,{R:()=>n})},5284:(e,t,r)=>{"use strict";r.d(t,{t:()=>c,B:()=>s});var n=r(7836),i=r(6154);const o="newrelic";const a=new Set,s={};function c(e,t){const r=n.ee.get(t);s[t]??={},e&&"object"==typeof e&&(a.has(t)||(r.emit("rumresp",[e]),s[t]=e,a.add(t),function(e={}){try{i.gm.dispatchEvent(new CustomEvent(o,{detail:e}))}catch(e){}}({loaded:!0})))}},8990:(e,t,r)=>{"use strict";r.d(t,{I:()=>i});var n=Object.prototype.hasOwnProperty;function i(e,t,r){if(n.call(e,t))return e[t];var i=r();if(Object.defineProperty&&Object.keys)try{return Object.defineProperty(e,t,{value:i,writable:!0,enumerable:!1}),i}catch(e){}return e[t]=i,i}},6389:(e,t,r)=>{"use strict";function n(e,t=500,r={}){const n=r?.leading||!1;let i;return(...r)=>{n&&void 0===i&&(e.apply(this,r),i=setTimeout((()=>{i=clearTimeout(i)}),t)),n||(clearTimeout(i),i=setTimeout((()=>{e.apply(this,r)}),t))}}function i(e){let t=!1;return(...r)=>{t||(t=!0,e.apply(this,r))}}r.d(t,{J:()=>i,s:()=>n})},3304:(e,t,r)=>{"use strict";r.d(t,{A:()=>o});var n=r(7836);const i=()=>{const e=new WeakSet;return(t,r)=>{if("object"==typeof r&&null!==r){if(e.has(r))return;e.add(r)}return r}};function o(e){try{return JSON.stringify(e,i())??""}catch(e){try{n.ee.emit("internal-error",[e])}catch(e){}return""}}},5289:(e,t,r)=>{"use strict";r.d(t,{GG:()=>o,sB:()=>a});var n=r(3878);function i(){return"undefined"==typeof document||"complete"===document.readyState}function o(e,t){if(i())return e();(0,n.sp)("load",e,t)}function a(e){if(i())return e();(0,n.DD)("DOMContentLoaded",e)}},384:(e,t,r)=>{"use strict";r.d(t,{NT:()=>o,US:()=>d,Zm:()=>a,bQ:()=>c,dV:()=>s,nY:()=>u,pV:()=>l});var n=r(6154),i=r(1863);const o={beacon:"bam.nr-data.net",errorBeacon:"bam.nr-data.net"};function a(){return n.gm.NREUM||(n.gm.NREUM={}),void 0===n.gm.newrelic&&(n.gm.newrelic=n.gm.NREUM),n.gm.NREUM}function s(){let e=a();return e.o||(e.o={ST:n.gm.setTimeout,SI:n.gm.setImmediate,CT:n.gm.clearTimeout,XHR:n.gm.XMLHttpRequest,REQ:n.gm.Request,EV:n.gm.Event,PR:n.gm.Promise,MO:n.gm.MutationObserver,FETCH:n.gm.fetch,WS:n.gm.WebSocket}),e}function c(e,t){let r=a();r.initializedAgents??={},t.initializedAt={ms:(0,i.t)(),date:new Date},r.initializedAgents[e]=t}function u(e){let t=a();return t.initializedAgents?.[e]}function d(e,t){a()[e]=t}function l(){return function(){let e=a();const t=e.info||{};e.info={beacon:o.beacon,errorBeacon:o.errorBeacon,...t}}(),function(){let e=a();const t=e.init||{};e.init={...t}}(),s(),function(){let e=a();const t=e.loader_config||{};e.loader_config={...t}}(),a()}},2843:(e,t,r)=>{"use strict";r.d(t,{u:()=>i});var n=r(3878);function i(e,t=!1,r,i){(0,n.DD)("visibilitychange",(function(){if(t)return void("hidden"===document.visibilityState&&e());e(document.visibilityState)}),r,i)}},8139:(e,t,r)=>{"use strict";r.d(t,{u:()=>f});var n=r(7836),i=r(3434),o=r(8990),a=r(6154);const s={},c=a.gm.XMLHttpRequest,u="addEventListener",d="removeEventListener",l="nr@wrapped:".concat(n.P);function f(e){var t=function(e){return(e||n.ee).get("events")}(e);if(s[t.debugId]++)return t;s[t.debugId]=1;var r=(0,i.YM)(t,!0);function f(e){r.inPlace(e,[u,d],"-",p)}function p(e,t){return e[1]}return"getPrototypeOf"in Object&&(a.RI&&h(document,f),h(a.gm,f),h(c.prototype,f)),t.on(u+"-start",(function(e,t){var n=e[1];if(null!==n&&("function"==typeof n||"object"==typeof n)){var i=(0,o.I)(n,l,(function(){var e={object:function(){if("function"!=typeof n.handleEvent)return;return n.handleEvent.apply(n,arguments)},function:n}[typeof n];return e?r(e,"fn-",null,e.name||"anonymous"):n}));this.wrapped=e[1]=i}})),t.on(d+"-start",(function(e){e[1]=this.wrapped||e[1]})),t}function h(e,t,...r){let n=e;for(;"object"==typeof n&&!Object.prototype.hasOwnProperty.call(n,u);)n=Object.getPrototypeOf(n);n&&t(n,...r)}},3434:(e,t,r)=>{"use strict";r.d(t,{Jt:()=>o,YM:()=>c});var n=r(7836),i=r(5607);const o="nr@original:".concat(i.W);var a=Object.prototype.hasOwnProperty,s=!1;function c(e,t){return e||(e=n.ee),r.inPlace=function(e,t,n,i,o){n||(n="");const a="-"===n.charAt(0);for(let s=0;s<t.length;s++){const c=t[s],u=e[c];d(u)||(e[c]=r(u,a?c+n:n,i,c,o))}},r.flag=o,r;function r(t,r,n,s,c){return d(t)?t:(r||(r=""),nrWrapper[o]=t,function(e,t,r){if(Object.defineProperty&&Object.keys)try{return Object.keys(e).forEach((function(r){Object.defineProperty(t,r,{get:function(){return e[r]},set:function(t){return e[r]=t,t}})})),t}catch(e){u([e],r)}for(var n in e)a.call(e,n)&&(t[n]=e[n])}(t,nrWrapper,e),nrWrapper);function nrWrapper(){var o,a,d,l;try{a=this,o=[...arguments],d="function"==typeof n?n(o,a):n||{}}catch(t){u([t,"",[o,a,s],d],e)}i(r+"start",[o,a,s],d,c);try{return l=t.apply(a,o)}catch(e){throw i(r+"err",[o,a,e],d,c),e}finally{i(r+"end",[o,a,l],d,c)}}}function i(r,n,i,o){if(!s||t){var a=s;s=!0;try{e.emit(r,n,i,t,o)}catch(t){u([t,r,n,i],e)}s=a}}}function u(e,t){t||(t=n.ee);try{t.emit("internal-error",e)}catch(e){}}function d(e){return!(e&&"function"==typeof e&&e.apply&&!e[o])}},9300:(e,t,r)=>{"use strict";r.d(t,{T:()=>n});const n=r(860).K7.ajax},3333:(e,t,r)=>{"use strict";r.d(t,{TZ:()=>n,Zp:()=>i,mq:()=>s,nf:()=>a,qN:()=>o});const n=r(860).K7.genericEvents,i=["auxclick","click","copy","keydown","paste","scrollend"],o=["focus","blur"],a=4,s=1e3},6774:(e,t,r)=>{"use strict";r.d(t,{T:()=>n});const n=r(860).K7.jserrors},993:(e,t,r)=>{"use strict";r.d(t,{ET:()=>o,TZ:()=>a,p_:()=>i});var n=r(860);const i={ERROR:"ERROR",WARN:"WARN",INFO:"INFO",DEBUG:"DEBUG",TRACE:"TRACE"},o="log",a=n.K7.logging},3785:(e,t,r)=>{"use strict";r.d(t,{R:()=>c,b:()=>u});var n=r(9908),i=r(1863),o=r(860),a=r(3969),s=r(993);function c(e,t,r={},c=s.p_.INFO){(0,n.p)(a.xV,["API/logging/".concat(c.toLowerCase(),"/called")],void 0,o.K7.metrics,e),(0,n.p)(s.ET,[(0,i.t)(),t,r,c],void 0,o.K7.logging,e)}function u(e){return"string"==typeof e&&Object.values(s.p_).some((t=>t===e.toUpperCase().trim()))}},3969:(e,t,r)=>{"use strict";r.d(t,{TZ:()=>n,XG:()=>s,rs:()=>i,xV:()=>a,z_:()=>o});const n=r(860).K7.metrics,i="sm",o="cm",a="storeSupportabilityMetrics",s="storeEventMetrics"},6630:(e,t,r)=>{"use strict";r.d(t,{T:()=>n});const n=r(860).K7.pageViewEvent},782:(e,t,r)=>{"use strict";r.d(t,{T:()=>n});const n=r(860).K7.pageViewTiming},6344:(e,t,r)=>{"use strict";r.d(t,{BB:()=>d,G4:()=>o,Qb:()=>l,TZ:()=>i,Ug:()=>a,_s:()=>s,bc:()=>u,yP:()=>c});var n=r(2614);const i=r(860).K7.sessionReplay,o={RECORD:"recordReplay",PAUSE:"pauseReplay",REPLAY_RUNNING:"replayRunning",ERROR_DURING_REPLAY:"errorDuringReplay"},a=.12,s={DomContentLoaded:0,Load:1,FullSnapshot:2,IncrementalSnapshot:3,Meta:4,Custom:5},c={[n.g.ERROR]:15e3,[n.g.FULL]:3e5,[n.g.OFF]:0},u={RESET:{message:"Session was reset",sm:"Reset"},IMPORT:{message:"Recorder failed to import",sm:"Import"},TOO_MANY:{message:"429: Too Many Requests",sm:"Too-Many"},TOO_BIG:{message:"Payload was too large",sm:"Too-Big"},CROSS_TAB:{message:"Session Entity was set to OFF on another tab",sm:"Cross-Tab"},ENTITLEMENTS:{message:"Session Replay is not allowed and will not be started",sm:"Entitlement"}},d=5e3,l={API:"api"}},5270:(e,t,r)=>{"use strict";r.d(t,{Aw:()=>c,CT:()=>u,SR:()=>s});var n=r(384),i=r(9417),o=r(7767),a=r(6154);function s(e){return!!(0,n.dV)().o.MO&&(0,o.V)(e)&&!0===(0,i.gD)(e,"session_trace.enabled")}function c(e){return!0===(0,i.gD)(e,"session_replay.preload")&&s(e)}function u(e,t){const r=t.correctAbsoluteTimestamp(e);return{originalTimestamp:e,correctedTimestamp:r,timestampDiff:e-r,originTime:a.WN,correctedOriginTime:t.correctedOriginTime,originTimeDiff:Math.floor(a.WN-t.correctedOriginTime)}}},3738:(e,t,r)=>{"use strict";r.d(t,{He:()=>i,Kp:()=>s,Lc:()=>u,Rz:()=>d,TZ:()=>n,bD:()=>o,d3:()=>a,jx:()=>l,uP:()=>c});const n=r(860).K7.sessionTrace,i="bstResource",o="resource",a="-start",s="-end",c="fn"+a,u="fn"+s,d="pushState",l=1e3},3962:(e,t,r)=>{"use strict";r.d(t,{AM:()=>o,O2:()=>s,Qu:()=>c,TZ:()=>a,ih:()=>u,tC:()=>i});var n=r(860);const i=["click","keydown","submit"],o="api",a=n.K7.softNav,s={INITIAL_PAGE_LOAD:"",ROUTE_CHANGE:1,UNSPECIFIED:2},c={INTERACTION:1,AJAX:2,CUSTOM_END:3,CUSTOM_TRACER:4},u={IP:"in progress",FIN:"finished",CAN:"cancelled"}},7378:(e,t,r)=>{"use strict";r.d(t,{$p:()=>x,BR:()=>b,Kp:()=>R,L3:()=>y,Lc:()=>c,NC:()=>o,SG:()=>d,TZ:()=>i,U6:()=>p,UT:()=>m,d3:()=>w,dT:()=>f,e5:()=>A,gx:()=>v,l9:()=>l,oW:()=>h,op:()=>g,rw:()=>u,tH:()=>E,uP:()=>s,wW:()=>T,xq:()=>a});var n=r(384);const i=r(860).K7.spa,o=["click","submit","keypress","keydown","keyup","change"],a=999,s="fn-start",c="fn-end",u="cb-start",d="api-ixn-",l="remaining",f="interaction",h="spaNode",p="jsonpNode",g="fetch-start",m="fetch-done",v="fetch-body-",b="jsonp-end",y=(0,n.dV)().o.ST,w="-start",R="-end",x="-body",T="cb"+R,A="jsTime",E="fetch"},4234:(e,t,r)=>{"use strict";r.d(t,{W:()=>o});var n=r(7836),i=r(1687);class o{constructor(e,t){this.agentIdentifier=e,this.ee=n.ee.get(e),this.featureName=t,this.blocked=!1}deregisterDrain(){(0,i.x3)(this.agentIdentifier,this.featureName)}}},7767:(e,t,r)=>{"use strict";r.d(t,{V:()=>o});var n=r(9417),i=r(6154);const o=e=>i.RI&&!0===(0,n.gD)(e,"privacy.cookies_enabled")},425:(e,t,r)=>{"use strict";r.d(t,{j:()=>j});var n=r(860),i=r(2555),o=r(3371),a=r(9908),s=r(7836),c=r(1687),u=r(5289),d=r(6154),l=r(944),f=r(3969),h=r(384),p=r(6344);const g=["setErrorHandler","finished","addToTrace","addRelease","addPageAction","setCurrentRouteName","setPageViewName","setCustomAttribute","interaction","noticeError","setUserId","setApplicationVersion","start",p.G4.RECORD,p.G4.PAUSE,"log","wrapLogger"],m=["setErrorHandler","finished","addToTrace","addRelease"];var v=r(1863),b=r(2614),y=r(993),w=r(3785),R=r(2646),x=r(3434);function T(e,t,r,n){if("object"!=typeof t||!t||"string"!=typeof r||!r||"function"!=typeof t[r])return(0,l.R)(29);const i=function(e){return(e||s.ee).get("logger")}(e),o=(0,x.YM)(i),a=new R.y(s.P);return a.level=n.level,a.customAttributes=n.customAttributes,o.inPlace(t,[r],"wrap-logger-",a),i}function A(){const e=(0,h.pV)();g.forEach((t=>{e[t]=(...r)=>function(t,...r){let n=[];return Object.values(e.initializedAgents).forEach((e=>{e&&e.api?e.exposed&&e.api[t]&&n.push(e.api[t](...r)):(0,l.R)(38,t)})),n.length>1?n:n[0]}(t,...r)}))}const E={};var S=r(9417),N=r(5603),O=r(5284);const _=e=>{const t=e.startsWith("http");e+="/",r.p=t?e:"https://"+e};let I=!1;function j(e,t={},g,R){let{init:x,info:j,loader_config:P,runtime:C={},exposed:k=!0}=t;C.loaderType=g;const L=(0,h.pV)();j||(x=L.init,j=L.info,P=L.loader_config),(0,S.xN)(e.agentIdentifier,x||{}),(0,N.a)(e.agentIdentifier,P||{}),j.jsAttributes??={},d.bv&&(j.jsAttributes.isWorker=!0),(0,i.x1)(e.agentIdentifier,j);const H=(0,S.D0)(e.agentIdentifier),D=[j.beacon,j.errorBeacon];I||(H.proxy.assets&&(_(H.proxy.assets),D.push(H.proxy.assets)),H.proxy.beacon&&D.push(H.proxy.beacon),A(),(0,h.US)("activatedFeatures",O.B),e.runSoftNavOverSpa&&=!0===H.soft_navigations.enabled&&H.feature_flags.includes("soft_nav")),C.denyList=[...H.ajax.deny_list||[],...H.ajax.block_internal?D:[]],C.ptid=e.agentIdentifier,(0,o.V)(e.agentIdentifier,C),e.ee=s.ee.get(e.agentIdentifier),void 0===e.api&&(e.api=function(e,t,h=!1){t||(0,c.Ak)(e,"api");const g={};var R=s.ee.get(e),x=R.get("tracer");E[e]=b.g.OFF,R.on(p.G4.REPLAY_RUNNING,(t=>{E[e]=t}));var A="api-",S=A+"ixn-";function N(t,r,n,o){const a=(0,i.Vp)(e);return null===r?delete a.jsAttributes[t]:(0,i.x1)(e,{...a,jsAttributes:{...a.jsAttributes,[t]:r}}),I(A,n,!0,o||null===r?"session":void 0)(t,r)}function O(){}g.log=function(e,{customAttributes:t={},level:r=y.p_.INFO}={}){(0,a.p)(f.xV,["API/log/called"],void 0,n.K7.metrics,R),(0,w.R)(R,e,t,r)},g.wrapLogger=(e,t,{customAttributes:r={},level:i=y.p_.INFO}={})=>{(0,a.p)(f.xV,["API/wrapLogger/called"],void 0,n.K7.metrics,R),T(R,e,t,{customAttributes:r,level:i})},m.forEach((e=>{g[e]=I(A,e,!0,"api")})),g.addPageAction=I(A,"addPageAction",!0,n.K7.genericEvents),g.setPageViewName=function(t,r){if("string"==typeof t)return"/"!==t.charAt(0)&&(t="/"+t),(0,o.f)(e).customTransaction=(r||"http://custom.transaction")+t,I(A,"setPageViewName",!0)()},g.setCustomAttribute=function(e,t,r=!1){if("string"==typeof e){if(["string","number","boolean"].includes(typeof t)||null===t)return N(e,t,"setCustomAttribute",r);(0,l.R)(40,typeof t)}else(0,l.R)(39,typeof e)},g.setUserId=function(e){if("string"==typeof e||null===e)return N("enduser.id",e,"setUserId",!0);(0,l.R)(41,typeof e)},g.setApplicationVersion=function(e){if("string"==typeof e||null===e)return N("application.version",e,"setApplicationVersion",!1);(0,l.R)(42,typeof e)},g.start=()=>{try{(0,a.p)(f.xV,["API/start/called"],void 0,n.K7.metrics,R),R.emit("manual-start-all")}catch(e){(0,l.R)(23,e)}},g[p.G4.RECORD]=function(){(0,a.p)(f.xV,["API/recordReplay/called"],void 0,n.K7.metrics,R),(0,a.p)(p.G4.RECORD,[],void 0,n.K7.sessionReplay,R)},g[p.G4.PAUSE]=function(){(0,a.p)(f.xV,["API/pauseReplay/called"],void 0,n.K7.metrics,R),(0,a.p)(p.G4.PAUSE,[],void 0,n.K7.sessionReplay,R)},g.interaction=function(e){return(new O).get("object"==typeof e?e:{})};const _=O.prototype={createTracer:function(e,t){var r={},i=this,o="function"==typeof t;return(0,a.p)(f.xV,["API/createTracer/called"],void 0,n.K7.metrics,R),h||(0,a.p)(S+"tracer",[(0,v.t)(),e,r],i,n.K7.spa,R),function(){if(x.emit((o?"":"no-")+"fn-start",[(0,v.t)(),i,o],r),o)try{return t.apply(this,arguments)}catch(e){const t="string"==typeof e?new Error(e):e;throw x.emit("fn-err",[arguments,this,t],r),t}finally{x.emit("fn-end",[(0,v.t)()],r)}}}};function I(e,t,r,i){return function(){return(0,a.p)(f.xV,["API/"+t+"/called"],void 0,n.K7.metrics,R),i&&(0,a.p)(e+t,[(0,v.t)(),...arguments],r?null:this,i,R),r?void 0:this}}function j(){r.e(478).then(r.bind(r,8778)).then((({setAPI:t})=>{t(e),(0,c.Ze)(e,"api")})).catch((e=>{(0,l.R)(27,e),R.abort()}))}return["actionText","setName","setAttribute","save","ignore","onEnd","getContext","end","get"].forEach((e=>{_[e]=I(S,e,void 0,h?n.K7.softNav:n.K7.spa)})),g.setCurrentRouteName=h?I(S,"routeName",void 0,n.K7.softNav):I(A,"routeName",!0,n.K7.spa),g.noticeError=function(t,r){"string"==typeof t&&(t=new Error(t)),(0,a.p)(f.xV,["API/noticeError/called"],void 0,n.K7.metrics,R),(0,a.p)("err",[t,(0,v.t)(),!1,r,!!E[e]],void 0,n.K7.jserrors,R)},d.RI?(0,u.GG)((()=>j()),!0):j(),g}(e.agentIdentifier,R,e.runSoftNavOverSpa)),void 0===e.exposed&&(e.exposed=k),I=!0}},8374:(e,t,r)=>{r.nc=(()=>{try{return document?.currentScript?.nonce}catch(e){}return""})()},860:(e,t,r)=>{"use strict";r.d(t,{$J:()=>o,K7:()=>n,P3:()=>i});const n={ajax:"ajax",genericEvents:"generic_events",jserrors:"jserrors",logging:"logging",metrics:"metrics",pageAction:"page_action",pageViewEvent:"page_view_event",pageViewTiming:"page_view_timing",sessionReplay:"session_replay",sessionTrace:"session_trace",softNav:"soft_navigations",spa:"spa"},i={[n.pageViewEvent]:1,[n.pageViewTiming]:2,[n.metrics]:3,[n.jserrors]:4,[n.spa]:5,[n.ajax]:6,[n.sessionTrace]:7,[n.softNav]:8,[n.sessionReplay]:9,[n.logging]:10,[n.genericEvents]:11},o={[n.pageViewTiming]:"events",[n.ajax]:"events",[n.spa]:"events",[n.softNav]:"events",[n.metrics]:"jserrors",[n.jserrors]:"jserrors",[n.sessionTrace]:"browser/blobs",[n.sessionReplay]:"browser/blobs",[n.logging]:"browser/logs",[n.genericEvents]:"ins"}}},n={};function i(e){var t=n[e];if(void 0!==t)return t.exports;var o=n[e]={exports:{}};return r[e](o,o.exports,i),o.exports}i.m=r,i.d=(e,t)=>{for(var r in t)i.o(t,r)&&!i.o(e,r)&&Object.defineProperty(e,r,{enumerable:!0,get:t[r]})},i.f={},i.e=e=>Promise.all(Object.keys(i.f).reduce(((t,r)=>(i.f[r](e,t),t)),[])),i.u=e=>({212:"nr-spa-compressor",249:"nr-spa-recorder",478:"nr-spa"}[e]+"-1.274.0.min.js"),i.o=(e,t)=>Object.prototype.hasOwnProperty.call(e,t),e={},t="NRBA-1.274.0.PROD:",i.l=(r,n,o,a)=>{if(e[r])e[r].push(n);else{var s,c;if(void 0!==o)for(var u=document.getElementsByTagName("script"),d=0;d<u.length;d++){var l=u[d];if(l.getAttribute("src")==r||l.getAttribute("data-webpack")==t+o){s=l;break}}if(!s){c=!0;var f={478:"sha512-1vUqEfJPB8Pihje9mv5CfYgkitO1FWcS+UQb84DbXqP8oYctRv4/lzl/MzNLPlRhcY1WVDBGL20I8vm6s2VV7g==",249:"sha512-Y/BeZAh6VSTmUtUNmS5XdyKxL92s30Fyyj8xVW76HSPxcKItL4+x2+kGMZc8pMJnUpZDz1L4eftZQAJh3D8NnA==",212:"sha512-Gn2tQ3qog5Yhrx/gRutkSTYPp+7nkKFt4/mIXg99LxcNpMDAYJZDBYmAACdoHNM86+iq1F3cBcQotFNzjIX8bw=="};(s=document.createElement("script")).charset="utf-8",s.timeout=120,i.nc&&s.setAttribute("nonce",i.nc),s.setAttribute("data-webpack",t+o),s.src=r,0!==s.src.indexOf(window.location.origin+"/")&&(s.crossOrigin="anonymous"),f[a]&&(s.integrity=f[a])}e[r]=[n];var h=(t,n)=>{s.onerror=s.onload=null,clearTimeout(p);var i=e[r];if(delete e[r],s.parentNode&&s.parentNode.removeChild(s),i&&i.forEach((e=>e(n))),t)return t(n)},p=setTimeout(h.bind(null,void 0,{type:"timeout",target:s}),12e4);s.onerror=h.bind(null,s.onerror),s.onload=h.bind(null,s.onload),c&&document.head.appendChild(s)}},i.r=e=>{"undefined"!=typeof Symbol&&Symbol.toStringTag&&Object.defineProperty(e,Symbol.toStringTag,{value:"Module"}),Object.defineProperty(e,"__esModule",{value:!0})},i.p="https://js-agent.newrelic.com/",(()=>{var e={38:0,788:0};i.f.j=(t,r)=>{var n=i.o(e,t)?e[t]:void 0;if(0!==n)if(n)r.push(n[2]);else{var o=new Promise(((r,i)=>n=e[t]=[r,i]));r.push(n[2]=o);var a=i.p+i.u(t),s=new Error;i.l(a,(r=>{if(i.o(e,t)&&(0!==(n=e[t])&&(e[t]=void 0),n)){var o=r&&("load"===r.type?"missing":r.type),a=r&&r.target&&r.target.src;s.message="Loading chunk "+t+" failed.\n("+o+": "+a+")",s.name="ChunkLoadError",s.type=o,s.request=a,n[1](s)}}),"chunk-"+t,t)}};var t=(t,r)=>{var n,o,[a,s,c]=r,u=0;if(a.some((t=>0!==e[t]))){for(n in s)i.o(s,n)&&(i.m[n]=s[n]);if(c)c(i)}for(t&&t(r);u<a.length;u++)o=a[u],i.o(e,o)&&e[o]&&e[o][0](),e[o]=0},r=self["webpackChunk:NRBA-1.274.0.PROD"]=self["webpackChunk:NRBA-1.274.0.PROD"]||[];r.forEach(t.bind(null,0)),r.push=t.bind(null,r.push.bind(r))})(),(()=>{"use strict";i(8374);var e=i(944),t=i(6344),r=i(9566);class n{agentIdentifier;constructor(e=(0,r.LA)(16)){this.agentIdentifier=e}#e(t,...r){if("function"==typeof this.api?.[t])return this.api[t](...r);(0,e.R)(35,t)}addPageAction(e,t){return this.#e("addPageAction",e,t)}setPageViewName(e,t){return this.#e("setPageViewName",e,t)}setCustomAttribute(e,t,r){return this.#e("setCustomAttribute",e,t,r)}noticeError(e,t){return this.#e("noticeError",e,t)}setUserId(e){return this.#e("setUserId",e)}setApplicationVersion(e){return this.#e("setApplicationVersion",e)}setErrorHandler(e){return this.#e("setErrorHandler",e)}addRelease(e,t){return this.#e("addRelease",e,t)}log(e,t){return this.#e("log",e,t)}}class o extends n{#e(t,...r){if("function"==typeof this.api?.[t])return this.api[t](...r);(0,e.R)(35,t)}start(){return this.#e("start")}finished(e){return this.#e("finished",e)}recordReplay(){return this.#e(t.G4.RECORD)}pauseReplay(){return this.#e(t.G4.PAUSE)}addToTrace(e){return this.#e("addToTrace",e)}setCurrentRouteName(e){return this.#e("setCurrentRouteName",e)}interaction(){return this.#e("interaction")}wrapLogger(e,t,r){return this.#e("wrapLogger",e,t,r)}}var a=i(860),s=i(9417);const c=Object.values(a.K7);function u(e){const t={};return c.forEach((r=>{t[r]=function(e,t){return!0===(0,s.gD)(t,"".concat(e,".enabled"))}(r,e)})),t}var d=i(425);var l=i(1687),f=i(4234),h=i(5289),p=i(6154),g=i(5270),m=i(7767),v=i(6389);class b extends f.W{constructor(e,t,r=!0){super(e.agentIdentifier,t),this.auto=r,this.abortHandler=void 0,this.featAggregate=void 0,this.onAggregateImported=void 0,!1===e.init[this.featureName].autoStart&&(this.auto=!1),this.auto?(0,l.Ak)(e.agentIdentifier,t):this.ee.on("manual-start-all",(0,v.J)((()=>{(0,l.Ak)(e.agentIdentifier,this.featureName),this.auto=!0,this.importAggregator(e)})))}importAggregator(t,r={}){if(this.featAggregate||!this.auto)return;let n;this.onAggregateImported=new Promise((e=>{n=e}));const o=async()=>{let o;try{if((0,m.V)(this.agentIdentifier)){const{setupAgentSession:e}=await i.e(478).then(i.bind(i,6526));o=e(t)}}catch(t){(0,e.R)(20,t),this.ee.emit("internal-error",[t]),this.featureName===a.K7.sessionReplay&&this.abortHandler?.()}try{if(t.sharedAggregator)await t.sharedAggregator;else{t.sharedAggregator=i.e(478).then(i.bind(i,9337));const{EventAggregator:e}=await t.sharedAggregator;t.sharedAggregator=new e}if(!this.#t(this.featureName,o))return(0,l.Ze)(this.agentIdentifier,this.featureName),void n(!1);const{lazyFeatureLoader:e}=await i.e(478).then(i.bind(i,6103)),{Aggregate:a}=await e(this.featureName,"aggregate");this.featAggregate=new a(t,r),n(!0)}catch(t){(0,e.R)(34,t),this.abortHandler?.(),(0,l.Ze)(this.agentIdentifier,this.featureName,!0),n(!1),this.ee&&this.ee.abort()}};p.RI?(0,h.GG)((()=>o()),!0):o()}#t(e,t){switch(e){case a.K7.sessionReplay:return(0,g.SR)(this.agentIdentifier)&&!!t;case a.K7.sessionTrace:return!!t;default:return!0}}}var y=i(6630);class w extends b{static featureName=y.T;constructor(e,t=!0){super(e,y.T,t),this.importAggregator(e)}}var R=i(384);var x=i(9908),T=i(2843),A=i(3878),E=i(782),S=i(1863);class N extends b{static featureName=E.T;constructor(e,t=!0){super(e,E.T,t),p.RI&&((0,T.u)((()=>(0,x.p)("docHidden",[(0,S.t)()],void 0,E.T,this.ee)),!0),(0,A.sp)("pagehide",(()=>(0,x.p)("winPagehide",[(0,S.t)()],void 0,E.T,this.ee))),this.importAggregator(e))}}var O=i(3969);class _ extends b{static featureName=O.TZ;constructor(e,t=!0){super(e,O.TZ,t),this.importAggregator(e)}}var I=i(6774),j=i(3304);class P{constructor(e,t,r,n,i){this.name="UncaughtError",this.message="string"==typeof e?e:(0,j.A)(e),this.sourceURL=t,this.line=r,this.column=n,this.__newrelic=i}}function C(e){return H(e)?e:new P(void 0!==e?.message?e.message:e,e?.filename||e?.sourceURL,e?.lineno||e?.line,e?.colno||e?.col,e?.__newrelic)}function k(e){const t="Unhandled Promise Rejection";if(!e?.reason)return;if(H(e.reason))try{return e.reason.message=t+": "+e.reason.message,C(e.reason)}catch(t){return C(e.reason)}const r=C(e.reason);return r.message=t+": "+r?.message,r}function L(e){if(e.error instanceof SyntaxError&&!/:\d+$/.test(e.error.stack?.trim())){const t=new P(e.message,e.filename,e.lineno,e.colno,e.error.__newrelic);return t.name=SyntaxError.name,t}return H(e.error)?e.error:C(e)}function H(e){return e instanceof Error&&!!e.stack}class D extends b{static featureName=I.T;#r=!1;constructor(e,r=!0){super(e,I.T,r);try{this.removeOnAbort=new AbortController}catch(e){}this.ee.on("internal-error",(e=>{this.abortHandler&&(0,x.p)("ierr",[C(e),(0,S.t)(),!0,{},this.#r],void 0,this.featureName,this.ee)})),this.ee.on(t.G4.REPLAY_RUNNING,(e=>{this.#r=e})),p.gm.addEventListener("unhandledrejection",(e=>{this.abortHandler&&(0,x.p)("err",[k(e),(0,S.t)(),!1,{unhandledPromiseRejection:1},this.#r],void 0,this.featureName,this.ee)}),(0,A.jT)(!1,this.removeOnAbort?.signal)),p.gm.addEventListener("error",(e=>{this.abortHandler&&(0,x.p)("err",[L(e),(0,S.t)(),!1,{},this.#r],void 0,this.featureName,this.ee)}),(0,A.jT)(!1,this.removeOnAbort?.signal)),this.abortHandler=this.#n,this.importAggregator(e)}#n(){this.removeOnAbort?.abort(),this.abortHandler=void 0}}var M=i(8990);let K=1;const U="nr@id";function V(e){const t=typeof e;return!e||"object"!==t&&"function"!==t?-1:e===p.gm?0:(0,M.I)(e,U,(function(){return K++}))}function G(e){if("string"==typeof e&&e.length)return e.length;if("object"==typeof e){if("undefined"!=typeof ArrayBuffer&&e instanceof ArrayBuffer&&e.byteLength)return e.byteLength;if("undefined"!=typeof Blob&&e instanceof Blob&&e.size)return e.size;if(!("undefined"!=typeof FormData&&e instanceof FormData))try{return(0,j.A)(e).length}catch(e){return}}}var F=i(8139),B=i(7836),W=i(3434);const z={},q=["open","send"];function Z(t){var r=t||B.ee;const n=function(e){return(e||B.ee).get("xhr")}(r);if(z[n.debugId]++)return n;z[n.debugId]=1,(0,F.u)(r);var i=(0,W.YM)(n),o=p.gm.XMLHttpRequest,a=p.gm.MutationObserver,s=p.gm.Promise,c=p.gm.setInterval,u="readystatechange",d=["onload","onerror","onabort","onloadstart","onloadend","onprogress","ontimeout"],l=[],f=p.gm.XMLHttpRequest=function(t){const r=new o(t),a=n.context(r);try{n.emit("new-xhr",[r],a),r.addEventListener(u,(s=a,function(){var e=this;e.readyState>3&&!s.resolved&&(s.resolved=!0,n.emit("xhr-resolved",[],e)),i.inPlace(e,d,"fn-",y)}),(0,A.jT)(!1))}catch(t){(0,e.R)(15,t);try{n.emit("internal-error",[t])}catch(e){}}var s;return r};function h(e,t){i.inPlace(t,["onreadystatechange"],"fn-",y)}if(function(e,t){for(var r in e)t[r]=e[r]}(o,f),f.prototype=o.prototype,i.inPlace(f.prototype,q,"-xhr-",y),n.on("send-xhr-start",(function(e,t){h(e,t),function(e){l.push(e),a&&(g?g.then(b):c?c(b):(m=-m,v.data=m))}(t)})),n.on("open-xhr-start",h),a){var g=s&&s.resolve();if(!c&&!s){var m=1,v=document.createTextNode(m);new a(b).observe(v,{characterData:!0})}}else r.on("fn-end",(function(e){e[0]&&e[0].type===u||b()}));function b(){for(var e=0;e<l.length;e++)h(0,l[e]);l.length&&(l=[])}function y(e,t){return t}return n}var Y="fetch-",X=Y+"body-",J=["arrayBuffer","blob","json","text","formData"],Q=p.gm.Request,ee=p.gm.Response,te="prototype";const re={};function ne(e){const t=function(e){return(e||B.ee).get("fetch")}(e);if(!(Q&&ee&&p.gm.fetch))return t;if(re[t.debugId]++)return t;function r(e,r,n){var i=e[r];"function"==typeof i&&(e[r]=function(){var e,r=[...arguments],o={};t.emit(n+"before-start",[r],o),o[B.P]&&o[B.P].dt&&(e=o[B.P].dt);var a=i.apply(this,r);return t.emit(n+"start",[r,e],a),a.then((function(e){return t.emit(n+"end",[null,e],a),e}),(function(e){throw t.emit(n+"end",[e],a),e}))})}return re[t.debugId]=1,J.forEach((e=>{r(Q[te],e,X),r(ee[te],e,X)})),r(p.gm,"fetch",Y),t.on(Y+"end",(function(e,r){var n=this;if(r){var i=r.headers.get("content-length");null!==i&&(n.rxSize=i),t.emit(Y+"done",[null,r],n)}else t.emit(Y+"done",[e],n)})),t}var ie=i(7485),oe=i(5603);class ae{constructor(e){this.agentIdentifier=e}generateTracePayload(e){if(!this.shouldGenerateTrace(e))return null;var t=(0,oe.o)(this.agentIdentifier);if(!t)return null;var n=(t.accountID||"").toString()||null,i=(t.agentID||"").toString()||null,o=(t.trustKey||"").toString()||null;if(!n||!i)return null;var a=(0,r.ZF)(),s=(0,r.el)(),c=Date.now(),u={spanId:a,traceId:s,timestamp:c};return(e.sameOrigin||this.isAllowedOrigin(e)&&this.useTraceContextHeadersForCors())&&(u.traceContextParentHeader=this.generateTraceContextParentHeader(a,s),u.traceContextStateHeader=this.generateTraceContextStateHeader(a,c,n,i,o)),(e.sameOrigin&&!this.excludeNewrelicHeader()||!e.sameOrigin&&this.isAllowedOrigin(e)&&this.useNewrelicHeaderForCors())&&(u.newrelicHeader=this.generateTraceHeader(a,s,c,n,i,o)),u}generateTraceContextParentHeader(e,t){return"00-"+t+"-"+e+"-01"}generateTraceContextStateHeader(e,t,r,n,i){return i+"@nr=0-1-"+r+"-"+n+"-"+e+"----"+t}generateTraceHeader(e,t,r,n,i,o){if(!("function"==typeof p.gm?.btoa))return null;var a={v:[0,1],d:{ty:"Browser",ac:n,ap:i,id:e,tr:t,ti:r}};return o&&n!==o&&(a.d.tk=o),btoa((0,j.A)(a))}shouldGenerateTrace(e){return this.isDtEnabled()&&this.isAllowedOrigin(e)}isAllowedOrigin(e){var t=!1,r={};if((0,s.gD)(this.agentIdentifier,"distributed_tracing")&&(r=(0,s.D0)(this.agentIdentifier).distributed_tracing),e.sameOrigin)t=!0;else if(r.allowed_origins instanceof Array)for(var n=0;n<r.allowed_origins.length;n++){var i=(0,ie.D)(r.allowed_origins[n]);if(e.hostname===i.hostname&&e.protocol===i.protocol&&e.port===i.port){t=!0;break}}return t}isDtEnabled(){var e=(0,s.gD)(this.agentIdentifier,"distributed_tracing");return!!e&&!!e.enabled}excludeNewrelicHeader(){var e=(0,s.gD)(this.agentIdentifier,"distributed_tracing");return!!e&&!!e.exclude_newrelic_header}useNewrelicHeaderForCors(){var e=(0,s.gD)(this.agentIdentifier,"distributed_tracing");return!!e&&!1!==e.cors_use_newrelic_header}useTraceContextHeadersForCors(){var e=(0,s.gD)(this.agentIdentifier,"distributed_tracing");return!!e&&!!e.cors_use_tracecontext_headers}}var se=i(9300),ce=i(7295),ue=["load","error","abort","timeout"],de=ue.length,le=(0,R.dV)().o.REQ,fe=(0,R.dV)().o.XHR;class he extends b{static featureName=se.T;constructor(e,t=!0){super(e,se.T,t),this.dt=new ae(e.agentIdentifier),this.handler=(e,t,r,n)=>(0,x.p)(e,t,r,n,this.ee);try{const e={xmlhttprequest:"xhr",fetch:"fetch",beacon:"beacon"};p.gm?.performance?.getEntriesByType("resource").forEach((t=>{if(t.initiatorType in e&&0!==t.responseStatus){const r={status:t.responseStatus},n={rxSize:t.transferSize,duration:Math.floor(t.duration),cbTime:0};pe(r,t.name),this.handler("xhr",[r,n,t.startTime,t.responseEnd,e[t.initiatorType]],void 0,a.K7.ajax)}}))}catch(e){}ne(this.ee),Z(this.ee),function(e,t,r,n){function i(e){var t=this;t.totalCbs=0,t.called=0,t.cbTime=0,t.end=R,t.ended=!1,t.xhrGuids={},t.lastSize=null,t.loadCaptureCalled=!1,t.params=this.params||{},t.metrics=this.metrics||{},e.addEventListener("load",(function(r){T(t,e)}),(0,A.jT)(!1)),p.lR||e.addEventListener("progress",(function(e){t.lastSize=e.loaded}),(0,A.jT)(!1))}function o(e){this.params={method:e[0]},pe(this,e[1]),this.metrics={}}function s(t,r){e.loader_config.xpid&&this.sameOrigin&&r.setRequestHeader("X-NewRelic-ID",e.loader_config.xpid);var i=n.generateTracePayload(this.parsedOrigin);if(i){var o=!1;i.newrelicHeader&&(r.setRequestHeader("newrelic",i.newrelicHeader),o=!0),i.traceContextParentHeader&&(r.setRequestHeader("traceparent",i.traceContextParentHeader),i.traceContextStateHeader&&r.setRequestHeader("tracestate",i.traceContextStateHeader),o=!0),o&&(this.dt=i)}}function c(e,r){var n=this.metrics,i=e[0],o=this;if(n&&i){var a=G(i);a&&(n.txSize=a)}this.startTime=(0,S.t)(),this.body=i,this.listener=function(e){try{"abort"!==e.type||o.loadCaptureCalled||(o.params.aborted=!0),("load"!==e.type||o.called===o.totalCbs&&(o.onloadCalled||"function"!=typeof r.onload)&&"function"==typeof o.end)&&o.end(r)}catch(e){try{t.emit("internal-error",[e])}catch(e){}}};for(var s=0;s<de;s++)r.addEventListener(ue[s],this.listener,(0,A.jT)(!1))}function u(e,t,r){this.cbTime+=e,t?this.onloadCalled=!0:this.called+=1,this.called!==this.totalCbs||!this.onloadCalled&&"function"==typeof r.onload||"function"!=typeof this.end||this.end(r)}function d(e,t){var r=""+V(e)+!!t;this.xhrGuids&&!this.xhrGuids[r]&&(this.xhrGuids[r]=!0,this.totalCbs+=1)}function l(e,t){var r=""+V(e)+!!t;this.xhrGuids&&this.xhrGuids[r]&&(delete this.xhrGuids[r],this.totalCbs-=1)}function f(){this.endTime=(0,S.t)()}function h(e,r){r instanceof fe&&"load"===e[0]&&t.emit("xhr-load-added",[e[1],e[2]],r)}function g(e,r){r instanceof fe&&"load"===e[0]&&t.emit("xhr-load-removed",[e[1],e[2]],r)}function m(e,t,r){t instanceof fe&&("onload"===r&&(this.onload=!0),("load"===(e[0]&&e[0].type)||this.onload)&&(this.xhrCbStart=(0,S.t)()))}function v(e,r){this.xhrCbStart&&t.emit("xhr-cb-time",[(0,S.t)()-this.xhrCbStart,this.onload,r],r)}function b(e){var t,r=e[1]||{};if("string"==typeof e[0]?0===(t=e[0]).length&&p.RI&&(t=""+p.gm.location.href):e[0]&&e[0].url?t=e[0].url:p.gm?.URL&&e[0]&&e[0]instanceof URL?t=e[0].href:"function"==typeof e[0].toString&&(t=e[0].toString()),"string"==typeof t&&0!==t.length){t&&(this.parsedOrigin=(0,ie.D)(t),this.sameOrigin=this.parsedOrigin.sameOrigin);var i=n.generateTracePayload(this.parsedOrigin);if(i&&(i.newrelicHeader||i.traceContextParentHeader))if(e[0]&&e[0].headers)s(e[0].headers,i)&&(this.dt=i);else{var o={};for(var a in r)o[a]=r[a];o.headers=new Headers(r.headers||{}),s(o.headers,i)&&(this.dt=i),e.length>1?e[1]=o:e.push(o)}}function s(e,t){var r=!1;return t.newrelicHeader&&(e.set("newrelic",t.newrelicHeader),r=!0),t.traceContextParentHeader&&(e.set("traceparent",t.traceContextParentHeader),t.traceContextStateHeader&&e.set("tracestate",t.traceContextStateHeader),r=!0),r}}function y(e,t){this.params={},this.metrics={},this.startTime=(0,S.t)(),this.dt=t,e.length>=1&&(this.target=e[0]),e.length>=2&&(this.opts=e[1]);var r,n=this.opts||{},i=this.target;"string"==typeof i?r=i:"object"==typeof i&&i instanceof le?r=i.url:p.gm?.URL&&"object"==typeof i&&i instanceof URL&&(r=i.href),pe(this,r);var o=(""+(i&&i instanceof le&&i.method||n.method||"GET")).toUpperCase();this.params.method=o,this.body=n.body,this.txSize=G(n.body)||0}function w(e,t){if(this.endTime=(0,S.t)(),this.params||(this.params={}),(0,ce.iW)(this.params))return;let n;this.params.status=t?t.status:0,"string"==typeof this.rxSize&&this.rxSize.length>0&&(n=+this.rxSize);const i={txSize:this.txSize,rxSize:n,duration:(0,S.t)()-this.startTime};r("xhr",[this.params,i,this.startTime,this.endTime,"fetch"],this,a.K7.ajax)}function R(e){const t=this.params,n=this.metrics;if(!this.ended){this.ended=!0;for(let t=0;t<de;t++)e.removeEventListener(ue[t],this.listener,!1);t.aborted||(0,ce.iW)(t)||(n.duration=(0,S.t)()-this.startTime,this.loadCazptureCalled||4!==e.readyState?null==t.status&&(t.status=0):T(this,e),n.cbTime=this.cbTime,r("xhr",[t,n,this.startTime,this.endTime,"xhr"],this,a.K7.ajax))}}function T(e,r){e.params.status=r.status;var n=function(e,t){var r=e.responseType;return"json"===r&&null!==t?t:"arraybuffer"===r||"blob"===r||"json"===r?G(e.response):"text"===r||""===r||void 0===r?G(e.responseText):void 0}(r,e.lastSize);if(n&&(e.metrics.rxSize=n),e.sameOrigin){var i=r.getResponseHeader("X-NewRelic-App-Data");i&&((0,x.p)(O.rs,["Ajax/CrossApplicationTracing/Header/Seen"],void 0,a.K7.metrics,t),e.params.cat=i.split(", ").pop())}e.loadCaptureCalled=!0}t.on("new-xhr",i),t.on("open-xhr-start",o),t.on("open-xhr-end",s),t.on("send-xhr-start",c),t.on("xhr-cb-time",u),t.on("xhr-load-added",d),t.on("xhr-load-removed",l),t.on("xhr-resolved",f),t.on("addEventListener-end",h),t.on("removeEventListener-end",g),t.on("fn-end",v),t.on("fetch-before-start",b),t.on("fetch-start",y),t.on("fn-start",m),t.on("fetch-done",w)}(e,this.ee,this.handler,this.dt),this.importAggregator(e)}}function pe(e,t){var r=(0,ie.D)(t),n=e.params||e;n.hostname=r.hostname,n.port=r.port,n.protocol=r.protocol,n.host=r.hostname+":"+r.port,n.pathname=r.pathname,e.parsedOrigin=r,e.sameOrigin=r.sameOrigin}const ge={},me=["pushState","replaceState"];function ve(e){const t=function(e){return(e||B.ee).get("history")}(e);return!p.RI||ge[t.debugId]++||(ge[t.debugId]=1,(0,W.YM)(t).inPlace(window.history,me,"-")),t}var be=i(3738);const{He:ye,bD:we,d3:Re,Kp:xe,TZ:Te,Lc:Ae,uP:Ee,Rz:Se}=be;class Ne extends b{static featureName=Te;constructor(e,t=!0){super(e,Te,t);if(!(0,m.V)(this.agentIdentifier))return void this.deregisterDrain();const r=this.ee;let n;ve(r),this.eventsEE=(0,F.u)(r),this.eventsEE.on(Ee,(function(e,t){this.bstStart=(0,S.t)()})),this.eventsEE.on(Ae,(function(e,t){(0,x.p)("bst",[e[0],t,this.bstStart,(0,S.t)()],void 0,a.K7.sessionTrace,r)})),r.on(Se+Re,(function(e){this.time=(0,S.t)(),this.startPath=location.pathname+location.hash})),r.on(Se+xe,(function(e){(0,x.p)("bstHist",[location.pathname+location.hash,this.startPath,this.time],void 0,a.K7.sessionTrace,r)}));try{n=new PerformanceObserver((e=>{const t=e.getEntries();(0,x.p)(ye,[t],void 0,a.K7.sessionTrace,r)})),n.observe({type:we,buffered:!0})}catch(e){}this.importAggregator(e,{resourceObserver:n})}}var Oe=i(2614);class _e extends b{static featureName=t.TZ;#i;#o;constructor(e,r=!0){let n;super(e,t.TZ,r),this.replayRunning=!1,this.#o=e;try{n=JSON.parse(localStorage.getItem("".concat(Oe.H3,"_").concat(Oe.uh)))}catch(e){}(0,g.SR)(e.agentIdentifier)&&this.ee.on(t.G4.RECORD,(()=>this.#a())),this.#s(n)?(this.#i=n?.sessionReplayMode,this.#c()):this.importAggregator(e),this.ee.on("err",(e=>{this.replayRunning&&(this.errorNoticed=!0,(0,x.p)(t.G4.ERROR_DURING_REPLAY,[e],void 0,this.featureName,this.ee))})),this.ee.on(t.G4.REPLAY_RUNNING,(e=>{this.replayRunning=e}))}#s(e){return e&&(e.sessionReplayMode===Oe.g.FULL||e.sessionReplayMode===Oe.g.ERROR)||(0,g.Aw)(this.agentIdentifier)}#u=!1;async#c(e){if(!this.#u){this.#u=!0;try{const{Recorder:t}=await Promise.all([i.e(478),i.e(249)]).then(i.bind(i,8589));this.recorder??=new t({mode:this.#i,agentIdentifier:this.agentIdentifier,trigger:e,ee:this.ee}),this.recorder.startRecording(),this.abortHandler=this.recorder.stopRecording}catch(e){}this.importAggregator(this.#o,{recorder:this.recorder,errorNoticed:this.errorNoticed})}}#a(){this.featAggregate?this.featAggregate.mode!==Oe.g.FULL&&this.featAggregate.initializeRecording(Oe.g.FULL,!0):(this.#i=Oe.g.FULL,this.#c(t.Qb.API),this.recorder&&this.recorder.parent.mode!==Oe.g.FULL&&(this.recorder.parent.mode=Oe.g.FULL,this.recorder.stopRecording(),this.recorder.startRecording(),this.abortHandler=this.recorder.stopRecording))}}var Ie=i(3962);class je extends b{static featureName=Ie.TZ;constructor(e,t=!0){if(super(e,Ie.TZ,t),!p.RI||!(0,R.dV)().o.MO)return;const r=ve(this.ee);Ie.tC.forEach((e=>{(0,A.sp)(e,(e=>{a(e)}),!0)}));const n=()=>(0,x.p)("newURL",[(0,S.t)(),""+window.location],void 0,this.featureName,this.ee);r.on("pushState-end",n),r.on("replaceState-end",n);try{this.removeOnAbort=new AbortController}catch(e){}(0,A.sp)("popstate",(e=>(0,x.p)("newURL",[e.timeStamp,""+window.location],void 0,this.featureName,this.ee)),!0,this.removeOnAbort?.signal);let i=!1;const o=new((0,R.dV)().o.MO)(((e,t)=>{i||(i=!0,requestAnimationFrame((()=>{(0,x.p)("newDom",[(0,S.t)()],void 0,this.featureName,this.ee),i=!1})))})),a=(0,v.s)((e=>{(0,x.p)("newUIEvent",[e],void 0,this.featureName,this.ee),o.observe(document.body,{attributes:!0,childList:!0,subtree:!0,characterData:!0})}),100,{leading:!0});this.abortHandler=function(){this.removeOnAbort?.abort(),o.disconnect(),this.abortHandler=void 0},this.importAggregator(e,{domObserver:o})}}var Pe=i(7378);const Ce={},ke=["appendChild","insertBefore","replaceChild"];function Le(e){const t=function(e){return(e||B.ee).get("jsonp")}(e);if(!p.RI||Ce[t.debugId])return t;Ce[t.debugId]=!0;var r=(0,W.YM)(t),n=/[?&](?:callback|cb)=([^&#]+)/,i=/(.*)\.([^.]+)/,o=/^(\w+)(\.|$)(.*)$/;function a(e,t){if(!e)return t;const r=e.match(o),n=r[1];return a(r[3],t[n])}return r.inPlace(Node.prototype,ke,"dom-"),t.on("dom-start",(function(e){!function(e){if(!e||"string"!=typeof e.nodeName||"script"!==e.nodeName.toLowerCase())return;if("function"!=typeof e.addEventListener)return;var o=(s=e.src,c=s.match(n),c?c[1]:null);var s,c;if(!o)return;var u=function(e){var t=e.match(i);if(t&&t.length>=3)return{key:t[2],parent:a(t[1],window)};return{key:e,parent:window}}(o);if("function"!=typeof u.parent[u.key])return;var d={};function l(){t.emit("jsonp-end",[],d),e.removeEventListener("load",l,(0,A.jT)(!1)),e.removeEventListener("error",f,(0,A.jT)(!1))}function f(){t.emit("jsonp-error",[],d),t.emit("jsonp-end",[],d),e.removeEventListener("load",l,(0,A.jT)(!1)),e.removeEventListener("error",f,(0,A.jT)(!1))}r.inPlace(u.parent,[u.key],"cb-",d),e.addEventListener("load",l,(0,A.jT)(!1)),e.addEventListener("error",f,(0,A.jT)(!1)),t.emit("new-jsonp",[e.src],d)}(e[0])})),t}const He={};function De(e){const t=function(e){return(e||B.ee).get("promise")}(e);if(He[t.debugId])return t;He[t.debugId]=!0;var r=t.context,n=(0,W.YM)(t),i=p.gm.Promise;return i&&function(){function e(r){var o=t.context(),a=n(r,"executor-",o,null,!1);const s=Reflect.construct(i,[a],e);return t.context(s).getCtx=function(){return o},s}p.gm.Promise=e,Object.defineProperty(e,"name",{value:"Promise"}),e.toString=function(){return i.toString()},Object.setPrototypeOf(e,i),["all","race"].forEach((function(r){const n=i[r];e[r]=function(e){let i=!1;[...e||[]].forEach((e=>{this.resolve(e).then(a("all"===r),a(!1))}));const o=n.apply(this,arguments);return o;function a(e){return function(){t.emit("propagate",[null,!i],o,!1,!1),i=i||!e}}}})),["resolve","reject"].forEach((function(r){const n=i[r];e[r]=function(e){const r=n.apply(this,arguments);return e!==r&&t.emit("propagate",[e,!0],r,!1,!1),r}})),e.prototype=i.prototype;const o=i.prototype.then;i.prototype.then=function(...e){var i=this,a=r(i);a.promise=i,e[0]=n(e[0],"cb-",a,null,!1),e[1]=n(e[1],"cb-",a,null,!1);const s=o.apply(this,e);return a.nextPromise=s,t.emit("propagate",[i,!0],s,!1,!1),s},i.prototype.then[W.Jt]=o,t.on("executor-start",(function(e){e[0]=n(e[0],"resolve-",this,null,!1),e[1]=n(e[1],"resolve-",this,null,!1)})),t.on("executor-err",(function(e,t,r){e[1](r)})),t.on("cb-end",(function(e,r,n){t.emit("propagate",[n,!0],this.nextPromise,!1,!1)})),t.on("propagate",(function(e,r,n){this.getCtx&&!r||(this.getCtx=function(){if(e instanceof Promise)var r=t.context(e);return r&&r.getCtx?r.getCtx():this})}))}(),t}const Me={},Ke="setTimeout",Ue="setInterval",Ve="clearTimeout",Ge="-start",Fe=[Ke,"setImmediate",Ue,Ve,"clearImmediate"];function Be(e){const t=function(e){return(e||B.ee).get("timer")}(e);if(Me[t.debugId]++)return t;Me[t.debugId]=1;var r=(0,W.YM)(t);return r.inPlace(p.gm,Fe.slice(0,2),Ke+"-"),r.inPlace(p.gm,Fe.slice(2,3),Ue+"-"),r.inPlace(p.gm,Fe.slice(3),Ve+"-"),t.on(Ue+Ge,(function(e,t,n){e[0]=r(e[0],"fn-",null,n)})),t.on(Ke+Ge,(function(e,t,n){this.method=n,this.timerDuration=isNaN(e[1])?0:+e[1],e[0]=r(e[0],"fn-",this,n)})),t}const We={};function ze(e){const t=function(e){return(e||B.ee).get("mutation")}(e);if(!p.RI||We[t.debugId])return t;We[t.debugId]=!0;var r=(0,W.YM)(t),n=p.gm.MutationObserver;return n&&(window.MutationObserver=function(e){return this instanceof n?new n(r(e,"fn-")):n.apply(this,arguments)},MutationObserver.prototype=n.prototype),t}const{TZ:qe,d3:Ze,Kp:Ye,$p:Xe,wW:Je,e5:Qe,tH:$e,uP:et,rw:tt,Lc:rt}=Pe;class nt extends b{static featureName=qe;constructor(e,t=!0){if(super(e,qe,t),!p.RI)return;try{this.removeOnAbort=new AbortController}catch(e){}let r,n=0;const i=this.ee.get("tracer"),o=Le(this.ee),a=De(this.ee),s=Be(this.ee),c=Z(this.ee),u=this.ee.get("events"),d=ne(this.ee),l=ve(this.ee),f=ze(this.ee);function h(e,t){l.emit("newURL",[""+window.location,t])}function g(){n++,r=window.location.hash,this[et]=(0,S.t)()}function m(){n--,window.location.hash!==r&&h(0,!0);var e=(0,S.t)();this[Qe]=~~this[Qe]+e-this[et],this[rt]=e}function v(e,t){e.on(t,(function(){this[t]=(0,S.t)()}))}this.ee.on(et,g),a.on(tt,g),o.on(tt,g),this.ee.on(rt,m),a.on(Je,m),o.on(Je,m),this.ee.on("fn-err",((...t)=>{t[2]?.__newrelic?.[e.agentIdentifier]||(0,x.p)("function-err",[...t],void 0,this.featureName,this.ee)})),this.ee.buffer([et,rt,"xhr-resolved"],this.featureName),u.buffer([et],this.featureName),s.buffer(["setTimeout"+Ye,"clearTimeout"+Ze,et],this.featureName),c.buffer([et,"new-xhr","send-xhr"+Ze],this.featureName),d.buffer([$e+Ze,$e+"-done",$e+Xe+Ze,$e+Xe+Ye],this.featureName),l.buffer(["newURL"],this.featureName),f.buffer([et],this.featureName),a.buffer(["propagate",tt,Je,"executor-err","resolve"+Ze],this.featureName),i.buffer([et,"no-"+et],this.featureName),o.buffer(["new-jsonp","cb-start","jsonp-error","jsonp-end"],this.featureName),v(d,$e+Ze),v(d,$e+"-done"),v(o,"new-jsonp"),v(o,"jsonp-end"),v(o,"cb-start"),l.on("pushState-end",h),l.on("replaceState-end",h),window.addEventListener("hashchange",h,(0,A.jT)(!0,this.removeOnAbort?.signal)),window.addEventListener("load",h,(0,A.jT)(!0,this.removeOnAbort?.signal)),window.addEventListener("popstate",(function(){h(0,n>1)}),(0,A.jT)(!0,this.removeOnAbort?.signal)),this.abortHandler=this.#n,this.importAggregator(e)}#n(){this.removeOnAbort?.abort(),this.abortHandler=void 0}}var it=i(3333);class ot extends b{static featureName=it.TZ;constructor(e,t=!0){super(e,it.TZ,t);const r=[e.init.page_action.enabled,e.init.performance.capture_marks,e.init.performance.capture_measures,e.init.user_actions.enabled];p.RI&&e.init.user_actions.enabled&&(it.Zp.forEach((e=>(0,A.sp)(e,(e=>(0,x.p)("ua",[e],void 0,this.featureName,this.ee)),!0))),it.qN.forEach((e=>(0,A.sp)(e,(e=>(0,x.p)("ua",[e],void 0,this.featureName,this.ee)))))),r.some((e=>e))?this.importAggregator(e):this.deregisterDrain()}}var at=i(993),st=i(3785);class ct extends b{static featureName=at.TZ;constructor(e,t=!0){super(e,at.TZ,t);const r=this.ee;this.ee.on("wrap-logger-end",(function([e]){const{level:t,customAttributes:n}=this;(0,st.R)(r,e,n,t)})),this.importAggregator(e)}}new class extends o{constructor(t,r){super(r),p.gm?(this.features={},(0,R.bQ)(this.agentIdentifier,this),this.desiredFeatures=new Set(t.features||[]),this.desiredFeatures.add(w),this.runSoftNavOverSpa=[...this.desiredFeatures].some((e=>e.featureName===a.K7.softNav)),(0,d.j)(this,t,t.loaderType||"agent"),this.run()):(0,e.R)(21)}get config(){return{info:this.info,init:this.init,loader_config:this.loader_config,runtime:this.runtime}}run(){try{const t=u(this.agentIdentifier),r=[...this.desiredFeatures];r.sort(((e,t)=>a.P3[e.featureName]-a.P3[t.featureName])),r.forEach((r=>{if(!t[r.featureName]&&r.featureName!==a.K7.pageViewEvent)return;if(this.runSoftNavOverSpa&&r.featureName===a.K7.spa)return;if(!this.runSoftNavOverSpa&&r.featureName===a.K7.softNav)return;const n=function(e){switch(e){case a.K7.ajax:return[a.K7.jserrors];case a.K7.sessionTrace:return[a.K7.ajax,a.K7.pageViewEvent];case a.K7.sessionReplay:return[a.K7.sessionTrace];case a.K7.pageViewTiming:return[a.K7.pageViewEvent];default:return[]}}(r.featureName).filter((e=>!(e in this.features)));n.length>0&&(0,e.R)(36,{targetFeature:r.featureName,missingDependencies:n}),this.features[r.featureName]=new r(this)}))}catch(t){(0,e.R)(22,t);for(const e in this.features)this.features[e].abortHandler?.();const r=(0,R.Zm)();delete r.initializedAgents[this.agentIdentifier]?.api,delete r.initializedAgents[this.agentIdentifier]?.features,delete this.sharedAggregator;return r.ee.get(this.agentIdentifier).abort(),!1}}}({features:[he,w,N,Ne,_e,_,D,ot,ct,je,nt],loaderType:"spa"})})()})(); </script><link rel="preconnect" href="https://cdn.cookielaw.org"/><link rel="preconnect" href="https://fonts.gstatic.com" crossorigin="anonymous"/><link rel="preconnect" href="https://fonts.googleapis.com" crossorigin="anonymous"/><link rel="preconnect" href="https://www.googletagmanager.com"/><link rel="stylesheet" href="/build/_assets/styles.generated-IVZR5GKI.css"/><link rel="stylesheet" href="/build/_assets/brand.generated-EWTQS5FG.css"/><link rel="stylesheet" href="https://fonts.googleapis.com/css2?family=Inter:wght@100;200;300;400;500;600;700;800;900&display=swap"/><link rel="stylesheet" href="https://fonts.googleapis.com/css2?family=Inter:wght@100;200;300;400;500;600;700;800;900&display=swap"/><link rel="icon" type="image/x-icon" href="/build/_assets/darkreading-DSJITCUD.ico"/><noscript><style type="text/css">.gptHideContent { opacity: 1!important; }</style></noscript><script type="text/javascript" src="https://cdn.cookielaw.org/consent/4b083961-e2ac-4755-8801-f7c83a5fb187/OtAutoBlock.js"></script><script type="text/javascript" src="https://cdn.cookielaw.org/scripttemplates/otSDKStub.js" data-domain-script="4b083961-e2ac-4755-8801-f7c83a5fb187"></script><script> function OptanonWrapper() { const isClosed = OneTrust.IsAlertBoxClosed() const allowPersonalised = /,C0004,/.test(OnetrustActiveGroups) console.log('cookieBannerConsentChanged emit', isClosed, allowPersonalised) const event = new CustomEvent('cookieBannerConsentChanged', { detail: { allowPersonalised, isClosed } }) window.dispatchEvent(event) }</script><script async="" src="//static.adsafeprotected.com/iasPET.1.js"></script><script async="" src="https://securepubads.g.doubleclick.net/tag/js/gpt.js" type="text/javascript"></script></head><body class="brand-darkreading gptHideContent"><noscript></noscript><div id="bigsky_v"></div><div id="fb-root"></div><div id="welcome_v"></div><main data-theme="theme1" class="Provider"><div data-testid="ad_blocker" class="ads ad adsbox doubleclick ad-placement carbon-ads" style="height:1px;width:1px;position:absolute;left:-999em;top:-999em"></div><div><div data-template="layout" class="Layout"><nav data-module="navigation" aria-label="navigation" class="Navigation"><div data-testid="header" class="Navigation-HeaderWrapper"><div class="FullScreenBackground Navigation-HeaderBackground"></div><div class="Navigation-Header"><div class="InformaBar" data-component="informa-bar"><div class="InformaBar-ContentSection InformaBar-ContentSection_hidden" data-testid="informa-bar-content-section"><div class="InformaBar-LeftSection" data-testid="informa-bar-left-section"><div>Dark Reading is part of the Informa Tech Division of Informa PLC</div><div><a class="InformaBar-SubMenuItem" data-testid="informa-bar-sub-menu-item" href="https://www.informa.com/" title="Informa PLC" target="_blank" rel="noreferrer">Informa PLC</a><span class="InformaBar-Delimiter">|</span><a class="InformaBar-SubMenuItem" data-testid="informa-bar-sub-menu-item" href="https://www.informa.com/about-us/" title="ABOUT US" target="_blank" rel="noreferrer">ABOUT US</a><span class="InformaBar-Delimiter">|</span><a class="InformaBar-SubMenuItem" data-testid="informa-bar-sub-menu-item" href="https://www.informa.com/investors/" title="INVESTOR RELATIONS" target="_blank" rel="noreferrer">INVESTOR RELATIONS</a><span class="InformaBar-Delimiter">|</span><a class="InformaBar-SubMenuItem" data-testid="informa-bar-sub-menu-item" href="https://www.informa.com/talent/" title="TALENT" target="_blank" rel="noreferrer">TALENT</a></div></div><div class="InformaBar-RightSection" data-testid="informa-bar-right-section">This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales and Scotlan. Number 8860726.</div></div><div class="InformaBar-LogoSection" data-testid="informa-bar-logo-section" role="button" tabindex="0" aria-label="Open Informa bar"><div class="InformaBar-LogoWrapper"><img class="InformaBar-Logo" src="/build/_assets/informaLogoWhite-RZAE7EJI.png" alt="Logo Informa"/></div><span class="InformaBar-IconWrapper InformaBar-IconWrapper_closed"><svg viewBox="0 0 320 512" aria-hidden="true" focusable="false" role="img" xml:space="preserve" xmlns="http://www.w3.org/2000/svg" xmlns:xlink="http://www.w3.org/1999/xlink" fill="currentColor" height="100%"><path fill="#ffffff" d="M288.662 352H31.338c-17.818 0-26.741-21.543-14.142-34.142l128.662-128.662c7.81-7.81 20.474-7.81 28.284 0l128.662 128.662c12.6 12.599 3.676 34.142-14.142 34.142z"></path></svg></span></div></div></div></div><div class="Navigation-SecondaryMenuWrapper"><div class="FullScreenBackground Navigation-SecondaryMenuBackground"></div><div class="Navigation-SecondaryMenu"><nav data-testid="SecondaryMenu" class="SecondaryMenu"><a class="SecondaryMenu-Link" data-discover="true" href="/program/black-hat">Black Hat News</a><a class="SecondaryMenu-Link" data-discover="true" href="/program/omdia-cybersecurity">Omdia Cybersecurity</a><a class="SecondaryMenu-Link" target="_blank" href="https://reg.darkreading.com/media-kit?kcode=drsitehd">Advertise</a></nav></div></div><div style="padding-top:0px"></div><div id="navigation-header" class="Navigation-NavBase"><div data-testid="navBase" class="NavBase"><div class="NavBase-Content"><div class="FullScreenBackground NavBase-SecondaryMenuBackground"></div><div class="NavBase-HeaderWrapper"><div class="NavBase-IconsWrapper"><button data-testid="navBase-megaMenuButton" class="NavBase-MegaMenuButton" aria-label="Open Mega menu"><span data-component="icon" data-name="Bars" class="NavBase-MegaMenuIcon NavBase-MegaMenuIcon_iconVariant_small NavBase-MegaMenuIcon_iconType_bars" style="mask-image:url(/build/_assets/Bars-F4G2A5NO.svg);-webkit-mask-image:url(/build/_assets/Bars-F4G2A5NO.svg);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain"></span></button><button data-testid="SearchButtonDesktop" class="NavBase-SearchButtonDesktop" aria-label="Open Search"><span data-component="icon" data-name="Search" class="NavBase-SearchIcon NavBase-SearchIcon_iconVariant_large NavBase-SearchIcon_iconType_search" style="mask-image:url(/build/_assets/Search-T2ANYVG5.svg);-webkit-mask-image:url(/build/_assets/Search-T2ANYVG5.svg);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain"></span></button><button data-testid="SearchButtonTablet" class="NavBase-SearchButtonTablet" aria-label="Open Search in MegaMenu"><span data-component="icon" data-name="Search" class="NavBase-SearchIcon NavBase-SearchIcon_iconVariant_small NavBase-SearchIcon_iconType_search" style="mask-image:url(/build/_assets/Search-T2ANYVG5.svg);-webkit-mask-image:url(/build/_assets/Search-T2ANYVG5.svg);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain"></span></button></div><div class="NavBase-LogoWrapper"><button data-testid="navBase-LogoMegaMenuButton" class="NavBase-LogoMegaMenuButton" aria-label="Open Mega menu"><span data-component="icon" data-name="Bars" class="NavBase-LogoMegaMenuIcon NavBase-LogoMegaMenuIcon_iconVariant_small NavBase-LogoMegaMenuIcon_iconType_bars" style="mask-image:url(/build/_assets/Bars-F4G2A5NO.svg);-webkit-mask-image:url(/build/_assets/Bars-F4G2A5NO.svg);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain"></span></button><a class="NavBase-Logo" data-discover="true" href="/"><img data-testid="logo-image" data-component="image" class="NavBase-LogoImage" data-src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blte9ead971f13c662e/65437029846d7c040a6e588d/Logo_-_Dark_Reading.svg?width=476&auto=webp&quality=80&disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blte9ead971f13c662e/65437029846d7c040a6e588d/Logo_-_Dark_Reading.svg?width=476&auto=webp&quality=80&disable=upscale" loading="lazy" alt="Dark Reading Logo" title="Dark Reading Logo"/></a></div><div class="NavBase-RegisterWrapper"><div data-module="newsletter-signup-promo"><div class="NewsletterSignupPromo-Button NewsletterSignupPromo-Button_small NewsletterSignupButton"><a data-component="button" data-testid="headerSmallNewsletterButton" class="Button Button_size_small Button_variant_primaryFilled" href="https://dr-resources.darkreading.com/free/w_defa3135/prgm.cgi" target="_blank" rel="nofollow" data-name="subscribe-nav" data-action-type="sign-up"><span data-component="icon" data-name="Email" class="Button-Icon Button-Icon_position_left" style="mask-image:url(/build/_assets/Email-47H7P533.svg);-webkit-mask-image:url(/build/_assets/Email-47H7P533.svg);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain"></span><span class="Button-ContentWrapper">Newsletter Sign-Up</span></a></div><div class="NewsletterSignupPromo-Button NewsletterSignupPromo-Button_medium NewsletterSignupButton"><div data-component="social-share" class="SocialShare SocialShare_variant_layout Layout-SocialShare"><a target="_blank" rel="noreferrer" aria-label="Twitter" class="Layout-SocialLink" href="https://twitter.com/DarkReading"><span class="SocialShare-IconWrapper SocialShare-IconWrapper_variant_layout"><span data-component="icon" data-name="Twitter" class="SocialShare-Icon SocialShare-Icon_variant_layout SocialShare-Icon_type_twitter" style="mask-image:url(/build/_assets/Twitter-WD5AOEQ7.svg);-webkit-mask-image:url(/build/_assets/Twitter-WD5AOEQ7.svg);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain"></span></span></a><a target="_blank" rel="noreferrer" aria-label="Linkedin" class="Layout-SocialLink" href="https://www.linkedin.com/company/dark-reading/"><span class="SocialShare-IconWrapper SocialShare-IconWrapper_variant_layout"><span data-component="icon" data-name="Linkedin" class="SocialShare-Icon SocialShare-Icon_variant_layout SocialShare-Icon_type_linkedin" style="mask-image:url(/build/_assets/Linkedin-VQUF3EEQ.svg);-webkit-mask-image:url(/build/_assets/Linkedin-VQUF3EEQ.svg);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain"></span></span></a><a target="_blank" rel="noreferrer" aria-label="Facebook" class="Layout-SocialLink" href="https://www.facebook.com/darkreadingcom/"><span class="SocialShare-IconWrapper SocialShare-IconWrapper_variant_layout"><span data-component="icon" data-name="Facebook" class="SocialShare-Icon SocialShare-Icon_variant_layout SocialShare-Icon_type_facebook" style="mask-image:url(/build/_assets/Facebook-CJB5G2HY.svg);-webkit-mask-image:url(/build/_assets/Facebook-CJB5G2HY.svg);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain"></span></span></a><a target="_blank" rel="noreferrer" aria-label="Youtube" class="Layout-SocialLink" href="https://www.youtube.com/@DarkReadingOfficialYT"><span class="SocialShare-IconWrapper SocialShare-IconWrapper_variant_layout"><span data-component="icon" data-name="Youtube" class="SocialShare-Icon SocialShare-Icon_variant_layout SocialShare-Icon_type_youtube" style="mask-image:url(/build/_assets/Youtube-S4PSC4UA.svg);-webkit-mask-image:url(/build/_assets/Youtube-S4PSC4UA.svg);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain"></span></span></a><a target="_blank" rel="noreferrer" aria-label="RSS" class="Layout-SocialLink" href="https://www.darkreading.com/rss.xml"><span class="SocialShare-IconWrapper SocialShare-IconWrapper_variant_layout"><span data-component="icon" data-name="RSS" class="SocialShare-Icon SocialShare-Icon_variant_layout SocialShare-Icon_type_rss" style="mask-image:url(/build/_assets/RSS-3XFHIVCK.svg);-webkit-mask-image:url(/build/_assets/RSS-3XFHIVCK.svg);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain"></span></span></a><a target="_blank" rel="noreferrer" aria-label="GoogleNews" class="Layout-SocialLink" href="https://news.google.com/publications/CAAqBwgKMKmknwswtq63Aw?ceid=US:en&oc=3&hl=en-US&gl=US"><span class="SocialShare-IconWrapper SocialShare-IconWrapper_variant_layout"><span data-component="icon" data-name="GoogleNews" class="SocialShare-Icon SocialShare-Icon_variant_layout SocialShare-Icon_type_googleNews" style="mask-image:url(/build/_assets/GoogleNews-6O72APW7.svg);-webkit-mask-image:url(/build/_assets/GoogleNews-6O72APW7.svg);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain"></span></span></a></div><a data-component="button" data-testid="headerMediumNewsletterButton" class="Button Button_size_medium Button_variant_primaryFilled" href="https://dr-resources.darkreading.com/free/w_defa3135/prgm.cgi" target="_blank" rel="nofollow" data-name="subscribe-nav" data-action-type="sign-up"><span data-component="icon" data-name="Email" class="Button-Icon Button-Icon_position_left" style="mask-image:url(/build/_assets/Email-47H7P533.svg);-webkit-mask-image:url(/build/_assets/Email-47H7P533.svg);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain"></span><span class="Button-ContentWrapper">Newsletter Sign-Up</span></a></div></div><button data-testid="RegisterSearchButton" class="NavBase-RegisterSearchButton" aria-label="Open Search in MegaMenu"><span data-component="icon" data-name="Search" class="NavBase-SearchIcon NavBase-SearchIcon_iconVariant_large NavBase-SearchIcon_iconType_search" style="mask-image:url(/build/_assets/Search-T2ANYVG5.svg);-webkit-mask-image:url(/build/_assets/Search-T2ANYVG5.svg);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain"></span></button></div></div><div class="NavBase-SearchWrapper"><div class="FullScreenBackground NavBase-SearchBackground"></div><button data-testid="SearchCloseButton" class="NavBase-SearchCloseButton" aria-label="Close Search"><span data-component="icon" data-name="Close" class="NavBase-SearchIcon NavBase-SearchIcon_iconVariant_medium NavBase-SearchIcon_iconType_close" style="mask-image:url(/build/_assets/Close-KKOYAUD6.svg);-webkit-mask-image:url(/build/_assets/Close-KKOYAUD6.svg);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain"></span></button></div></div></div><div class="Navigation-MainMenu"><div data-testid="mainMenu"><div class="FullScreenBackground MainMenu-BackgroundSubmenu"></div><div class="FullScreenBackground MainMenu-BackgroundMenuItem"></div><div class="MainMenu-Content"><div class="MainMenu-MegaMenuButtonWrapper"><button data-testid="mainMenu-MegaMenuButton" aria-label="Open MegaMenu" class="MainMenu-MegaMenuButton"><span data-component="icon" data-name="Bars" class="MainMenu-MegaMenuIcon" style="mask-image:url(/build/_assets/Bars-F4G2A5NO.svg);-webkit-mask-image:url(/build/_assets/Bars-F4G2A5NO.svg);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain"></span></button></div><div class="MainMenu-ItemsWrapper" role="menu"><div class="MainMenu-MenuItemWrapper"><div class="MainMenu-MenuItem" role="menuitem" tabindex="0" data-testid="openSubMenu" aria-label="Open Sub menu of Cybersecurity Topics"><span class="MainMenu-MainTitle">Cybersecurity Topics<span data-component="icon" data-name="ChevronDown" class="MainMenu-SubMenuIcon" style="mask-image:url(/build/_assets/ChevronDown-PF4EH6J6.svg);-webkit-mask-image:url(/build/_assets/ChevronDown-PF4EH6J6.svg);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain"></span></span></div><div class="MainMenu-SubMenuWrapper"><div class="MainMenu-SubMenuContent"><div data-module="sub-menu" class="SubMenu MainMenu-SubMenu" role="presentation"><div class="SubMenu-Container"><div class="SubMenu-RelatedTopicsWrapper"><h4 class="SubMenu-RelatedTopics">Related Topics</h4><div class="SubMenu-CasualLinkWrapper" data-testid="related"><ul class="SubMenu-CasualLinkList"><li class="SubMenu-CasualLinkItem"><a class="SubMenu-ItemLink" data-testid="sub-menu-item-link" data-discover="true" href="/application-security">Application Security</a></li><li class="SubMenu-CasualLinkItem"><a class="SubMenu-ItemLink" data-testid="sub-menu-item-link" data-discover="true" href="/cybersecurity-operations/cybersecurity-careers">Cybersecurity Careers</a></li><li class="SubMenu-CasualLinkItem"><a class="SubMenu-ItemLink" data-testid="sub-menu-item-link" data-discover="true" href="/cloud-security">Cloud Security</a></li><li class="SubMenu-CasualLinkItem"><a class="SubMenu-ItemLink" data-testid="sub-menu-item-link" data-discover="true" href="/cyber-risk">Cyber Risk</a></li><li class="SubMenu-CasualLinkItem"><a class="SubMenu-ItemLink" data-testid="sub-menu-item-link" data-discover="true" href="/cyberattacks-data-breaches">Cyberattacks & Data Breaches</a></li><li class="SubMenu-CasualLinkItem"><a class="SubMenu-ItemLink" data-testid="sub-menu-item-link" data-discover="true" href="/cybersecurity-analytics">Cybersecurity Analytics</a></li><li class="SubMenu-CasualLinkItem"><a class="SubMenu-ItemLink" data-testid="sub-menu-item-link" data-discover="true" href="/cybersecurity-operations">Cybersecurity Operations</a></li><li class="SubMenu-CasualLinkItem"><a class="SubMenu-ItemLink" data-testid="sub-menu-item-link" data-discover="true" href="/cyber-risk/data-privacy">Data Privacy</a></li><li class="SubMenu-CasualLinkItem"><a class="SubMenu-ItemLink" data-testid="sub-menu-item-link" data-discover="true" href="/endpoint-security">Endpoint Security</a></li><li class="SubMenu-CasualLinkItem"><a class="SubMenu-ItemLink" data-testid="sub-menu-item-link" data-discover="true" href="/ics-ot-security">ICS/OT Security</a></li></ul><ul class="SubMenu-CasualLinkList"><li class="SubMenu-CasualLinkItem"><a class="SubMenu-ItemLink" data-testid="sub-menu-item-link" data-discover="true" href="/cybersecurity-operations/identity-access-management-security">Identity & Access Mgmt Security</a></li><li class="SubMenu-CasualLinkItem"><a class="SubMenu-ItemLink" data-testid="sub-menu-item-link" data-discover="true" href="/vulnerabilities-threats/insider-threats">Insider Threats</a></li><li class="SubMenu-CasualLinkItem"><a class="SubMenu-ItemLink" data-testid="sub-menu-item-link" data-discover="true" href="/ics-ot-security/iot">IoT</a></li><li class="SubMenu-CasualLinkItem"><a class="SubMenu-ItemLink" data-testid="sub-menu-item-link" data-discover="true" href="/endpoint-security/mobile-security">Mobile Security</a></li><li class="SubMenu-CasualLinkItem"><a class="SubMenu-ItemLink" data-testid="sub-menu-item-link" data-discover="true" href="/cybersecurity-operations/perimeter">Perimeter</a></li><li class="SubMenu-CasualLinkItem"><a class="SubMenu-ItemLink" data-testid="sub-menu-item-link" data-discover="true" href="/cybersecurity-operations/physical-security">Physical Security</a></li><li class="SubMenu-CasualLinkItem"><a class="SubMenu-ItemLink" data-testid="sub-menu-item-link" data-discover="true" href="/endpoint-security/remote-workforce">Remote Workforce</a></li><li class="SubMenu-CasualLinkItem"><a class="SubMenu-ItemLink" data-testid="sub-menu-item-link" data-discover="true" href="/threat-intelligence">Threat Intelligence</a></li><li class="SubMenu-CasualLinkItem"><a class="SubMenu-ItemLink" data-testid="sub-menu-item-link" data-discover="true" href="/vulnerabilities-threats">Vulnerabilities & Threats</a></li></ul></div></div><div class="SubMenu-RecentContentWrapper" data-testid="recent"></div></div></div></div></div></div><div class="MainMenu-MenuItemWrapper"><div class="MainMenu-MenuItem" role="menuitem" tabindex="0" data-testid="openSubMenu" aria-label="Open Sub menu of World "><span class="MainMenu-MainTitle">World <span data-component="icon" data-name="ChevronDown" class="MainMenu-SubMenuIcon" style="mask-image:url(/build/_assets/ChevronDown-PF4EH6J6.svg);-webkit-mask-image:url(/build/_assets/ChevronDown-PF4EH6J6.svg);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain"></span></span></div><div class="MainMenu-SubMenuWrapper"><div class="MainMenu-SubMenuContent"><div data-module="sub-menu" class="SubMenu MainMenu-SubMenu" role="presentation"><div class="SubMenu-Container"><div class="SubMenu-RelatedTopicsWrapper"><h4 class="SubMenu-RelatedTopics">Related Topics</h4><div class="SubMenu-CasualLinkWrapper" data-testid="related"><ul class="SubMenu-CasualLinkList"><li class="SubMenu-CasualLinkItem"><a class="SubMenu-ItemLink" data-testid="sub-menu-item-link" data-discover="true" href="/program/dr-global">DR Global</a></li><li class="SubMenu-CasualLinkItem"><a class="SubMenu-ItemLink" data-testid="sub-menu-item-link" data-discover="true" href="/keyword/middle-east-africa">Middle East & Africa</a></li></ul><ul class="SubMenu-CasualLinkList"><li class="SubMenu-CasualLinkItem"><a class="SubMenu-ItemLink" data-testid="sub-menu-item-link" data-discover="true" href="/keyword/asia-pacific">Asia Pacific</a></li></ul></div></div><div class="SubMenu-RecentContentWrapper" data-testid="recent"><div data-testid="see-more" class="SubMenu-SeeMore"><a class="SubMenu-MoreContent SubMenu-MoreContent_noRecent" data-discover="true" href="/program/dr-global"><span class="SubMenu-SeeMoreText">See All</span><span data-component="icon" data-name="ChevronRight" class="SubMenu-SeeMoreIcon" style="mask-image:url(/build/_assets/ChevronRight-NHDKEYGJ.svg);-webkit-mask-image:url(/build/_assets/ChevronRight-NHDKEYGJ.svg);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain"></span></a></div></div></div></div></div></div></div><div class="MainMenu-TitleWrapper"><a class="MainMenu-Title" data-discover="true" href="/program/the-edge">The Edge</a></div><div class="MainMenu-TitleWrapper"><a class="MainMenu-Title" data-discover="true" href="/program/dr-technology">DR Technology</a></div><div class="MainMenu-MenuItemWrapper"><div class="MainMenu-MenuItem" role="menuitem" tabindex="0" data-testid="openSubMenu" aria-label="Open Sub menu of Events"><span class="MainMenu-MainTitle">Events<span data-component="icon" data-name="ChevronDown" class="MainMenu-SubMenuIcon" style="mask-image:url(/build/_assets/ChevronDown-PF4EH6J6.svg);-webkit-mask-image:url(/build/_assets/ChevronDown-PF4EH6J6.svg);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain"></span></span></div><div class="MainMenu-SubMenuWrapper"><div class="MainMenu-SubMenuContent"><div data-module="sub-menu" class="SubMenu MainMenu-SubMenu" role="presentation"><div class="SubMenu-Container"><div class="SubMenu-RelatedTopicsWrapper"><h4 class="SubMenu-RelatedTopics">Related Topics</h4><div class="SubMenu-CasualLinkWrapper" data-testid="related"><ul class="SubMenu-CasualLinkList"><li class="SubMenu-CasualLinkItem"><a class="SubMenu-ItemLink" data-testid="sub-menu-item-link" data-discover="true" href="/events">Upcoming Events</a></li><li class="SubMenu-CasualLinkItem"><a class="SubMenu-ItemLink" data-testid="sub-menu-item-link" data-discover="true" href="/podcasts">Podcasts</a></li></ul><ul class="SubMenu-CasualLinkList"><li class="SubMenu-CasualLinkItem"><a class="SubMenu-ItemLink" data-testid="sub-menu-item-link" data-discover="true" href="/resources?types=Webinar">Webinars</a></li></ul></div></div><div class="SubMenu-RecentContentWrapper" data-testid="recent"><div data-testid="see-more" class="SubMenu-SeeMore"><a class="SubMenu-MoreContent SubMenu-MoreContent_noRecent" data-discover="true" href="/events"><span class="SubMenu-SeeMoreText">SEE ALL</span><span data-component="icon" data-name="ChevronRight" class="SubMenu-SeeMoreIcon" style="mask-image:url(/build/_assets/ChevronRight-NHDKEYGJ.svg);-webkit-mask-image:url(/build/_assets/ChevronRight-NHDKEYGJ.svg);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain"></span></a></div></div></div></div></div></div></div><div class="MainMenu-MenuItemWrapper"><div class="MainMenu-MenuItem" role="menuitem" tabindex="0" data-testid="openSubMenu" aria-label="Open Sub menu of Resources"><span class="MainMenu-MainTitle">Resources<span data-component="icon" data-name="ChevronDown" class="MainMenu-SubMenuIcon" style="mask-image:url(/build/_assets/ChevronDown-PF4EH6J6.svg);-webkit-mask-image:url(/build/_assets/ChevronDown-PF4EH6J6.svg);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain"></span></span></div><div class="MainMenu-SubMenuWrapper"><div class="MainMenu-SubMenuContent"><div data-module="sub-menu" class="SubMenu MainMenu-SubMenu" role="presentation"><div class="SubMenu-Container"><div class="SubMenu-RelatedTopicsWrapper"><h4 class="SubMenu-RelatedTopics">Related Topics</h4><div class="SubMenu-CasualLinkWrapper" data-testid="related"><ul class="SubMenu-CasualLinkList"><li class="SubMenu-CasualLinkItem"><a class="SubMenu-ItemLink" data-testid="sub-menu-item-link" data-discover="true" href="/resources">Library</a></li><li class="SubMenu-CasualLinkItem"><a class="SubMenu-ItemLink" data-testid="sub-menu-item-link" rel="nofollow" target="_blank" href="https://dr-resources.darkreading.com/free/w_defa3135/prgm.cgi">Newsletters</a></li><li class="SubMenu-CasualLinkItem"><a class="SubMenu-ItemLink" data-testid="sub-menu-item-link" data-discover="true" href="/podcasts">Podcasts</a></li><li class="SubMenu-CasualLinkItem"><a class="SubMenu-ItemLink" data-testid="sub-menu-item-link" data-discover="true" href="/resources?types=Report">Reports</a></li><li class="SubMenu-CasualLinkItem"><a class="SubMenu-ItemLink" data-testid="sub-menu-item-link" data-discover="true" href="/videos">Videos</a></li><li class="SubMenu-CasualLinkItem"><a class="SubMenu-ItemLink" data-testid="sub-menu-item-link" data-discover="true" href="/resources?types=Webinar">Webinars</a></li></ul><ul class="SubMenu-CasualLinkList"><li class="SubMenu-CasualLinkItem"><a class="SubMenu-ItemLink" data-testid="sub-menu-item-link" data-discover="true" href="/resources?types=Whitepaper">Whitepapers</a></li><li class="SubMenu-CasualLinkItem"><a class="SubMenu-ItemLink" data-testid="sub-menu-item-link" data-discover="true" href="/ "> </a></li><li class="SubMenu-CasualLinkItem"><a class="SubMenu-ItemLink" data-testid="sub-menu-item-link" data-discover="true" href="/ "> </a></li><li class="SubMenu-CasualLinkItem"><a class="SubMenu-ItemLink" data-testid="sub-menu-item-link" data-discover="true" href="/ "> </a></li><li class="SubMenu-CasualLinkItem"><a class="SubMenu-ItemLink" data-testid="sub-menu-item-link" data-discover="true" href="/ "> </a></li><li class="SubMenu-CasualLinkItem"><a class="SubMenu-ItemLink" data-testid="sub-menu-item-link" data-discover="true" href="/keyword/partner-perspectives">Partner Perspectives</a></li></ul></div></div><div class="SubMenu-RecentContentWrapper" data-testid="recent"><div data-testid="see-more" class="SubMenu-SeeMore"><a class="SubMenu-MoreContent SubMenu-MoreContent_noRecent" data-discover="true" href="/resources"><span class="SubMenu-SeeMoreText">SEE ALL</span><span data-component="icon" data-name="ChevronRight" class="SubMenu-SeeMoreIcon" style="mask-image:url(/build/_assets/ChevronRight-NHDKEYGJ.svg);-webkit-mask-image:url(/build/_assets/ChevronRight-NHDKEYGJ.svg);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain"></span></a></div></div></div></div></div></div></div></div><div class="MainMenu-SearchButtonWrapper"><button data-testid="mainMenu-SearchButton" aria-label="Open Search" class="MainMenu-SearchButton"><span data-component="icon" data-name="Search" class="MainMenu-SearchButtonIcon" style="mask-image:url(/build/_assets/Search-T2ANYVG5.svg);-webkit-mask-image:url(/build/_assets/Search-T2ANYVG5.svg);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain"></span></button></div></div><div class="MainMenu-SearchWrapper"><div class="FullScreenBackground MainMenu-SearchBackground MainMenu-SearchBackground_withSearchBar"></div><button data-testid="mainMenu-SearchCloseButton" class="MainMenu-SearchCloseButton" aria-label="Close Search"><span data-component="icon" data-name="Close" class="MainMenu-SearchCloseIcon" style="mask-image:url(/build/_assets/Close-KKOYAUD6.svg);-webkit-mask-image:url(/build/_assets/Close-KKOYAUD6.svg);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain"></span></button></div></div></div></div></nav><section class="Layout-Section"><div id="iiris-identity" data-testid="iris-identity"></div><div data-template="home-page" class="HomePage"><div class="HomePage-Wrapper"><div data-module="top-featured" class="TopFeatured TopFeatured_variant_recent"><div data-testid="latest-news-wrapper" class="TopFeatured-WrapLatestNews"><div><h2 data-testid="recent-label" class="TopFeatured-WrapLatestNewsTop">CISO Corner</h2></div><div class="TopFeatured-LatestNewsItem"><div class="TopFeatured-LatestNewsItemTitle"><a data-discover="true" href="/endpoint-security/microsoft-releases-recall-windows-insider-preview"><h3 class="TopFeatured-LatestNewsItemTitle">Microsoft Finally Releases Recall as Part of Windows Insider Preview</h3></a></div><div class="TopFeatured-LatestNewsItemDate">Nov 27, 2024</div></div><div class="TopFeatured-LatestNewsItem"><div class="TopFeatured-LatestNewsItemTitle"><a data-discover="true" href="/application-security/israel-defies-downturn-security-funding"><h3 class="TopFeatured-LatestNewsItemTitle">Israel Defies VC Downturn With More Cybersecurity Investments</h3></a></div><div class="TopFeatured-LatestNewsItemDate">Nov 27, 2024</div></div><div class="TopFeatured-LatestNewsItem"><div class="TopFeatured-LatestNewsItemTitle"><a data-discover="true" href="/vulnerabilities-threats/leaky-cybersecurity-holes-water-systems-risk"><h3 class="TopFeatured-LatestNewsItemTitle">Leaky Cybersecurity Holes Put Water Systems at Risk</h3></a></div><div class="TopFeatured-LatestNewsItemDate">Nov 22, 2024</div></div><div class="TopFeatured-LatestNewsItem"><div class="TopFeatured-LatestNewsItemTitle"><a data-discover="true" href="/vulnerabilities-threats/going-beyond-secure-by-demand"><h3 class="TopFeatured-LatestNewsItemTitle">Going Beyond Secure by Demand</h3></a></div><div class="TopFeatured-LatestNewsItemDate">Nov 22, 2024</div></div><div class="TopFeatured-CtaButtonWrapper"><a data-component="button" class="Button Button_size_medium Button_variant_textLink TopFeatured-CtaButton" rel="" data-discover="true" href="/keyword/ciso-corner"><span class="Button-ContentWrapper">More Articles for CISOs</span><span data-component="icon" data-name="ChevronRight" class="Button-Icon Button-Icon_position_right" style="mask-image:url(/build/_assets/ChevronRight-NHDKEYGJ.svg);-webkit-mask-image:url(/build/_assets/ChevronRight-NHDKEYGJ.svg);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain"></span></a></div></div><div data-testid="content-preview-wrapper" class="TopFeatured-WrapContentPreview"><div class="ContentPreview" data-module="content-preview" data-variant="top-featured"><div class="ContentPreview-Wrapper ContentPreview-Wrapper_variant_topFeatured"><a data-testid="thumbnail" data-discover="true" href="/application-security/sneaky-skimmer-malware-magento-sites-black-friday"><div class="ContentPreview-ImageContainer"><span data-testid="content-preview-screen-reader-text" class="ContentPreview-ImageScreenReaderText">A blue credit card on a fish hook being dangled above a computer keyboard</span><img data-testid="content-preview-image" data-component="image" class="ContentPreview-Image" data-src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt3317719ff4b0bbee/6747152ee2b6b17ae587bdee/cardskimming_Kim_Kuperkova_shutterstock.jpg?width=700&auto=webp&quality=80&disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt3317719ff4b0bbee/6747152ee2b6b17ae587bdee/cardskimming_Kim_Kuperkova_shutterstock.jpg?width=700&auto=webp&quality=80&disable=upscale" loading="lazy" alt="" title=""/></div></a><a data-component="keyword" class="Keyword Keyword_variant_standard Keyword_title_applicationSecurity ContentPreview-Category" data-discover="true" href="/application-security">Application Security</a><div class="TopFeaturedPreview"><a class="TopFeaturedPreview-TitleWrapper" data-discover="true" href="/application-security/sneaky-skimmer-malware-magento-sites-black-friday"><h2 class="TopFeaturedPreview-Title" data-testid="preview-default-title">Sneaky Skimmer Malware Targets Magento Sites Ahead of Black Friday</h2></a><a class="TopFeaturedPreview-MobileTitleWrapper" data-discover="true" href="/application-security/sneaky-skimmer-malware-magento-sites-black-friday"><h2 class="TopFeaturedPreview-Title" data-testid="preview-mobile-title">Sneaky Skimmer Malware Targets Magento Sites Ahead of Black Friday</h2></a><p class="TopFeaturedPreview-Summary">A stealthy JavaScript injection attack steals data from the checkout page of sites, either by creating a fake credit card form or extracting data directly from payment fields.</p></div><div class="TopFeaturedPreview-Footer"><span class="TopFeaturedPreview-Date">Nov 27, 2024</span><div data-module="card-time" class="CardTime"><span class="CardTime-SeparatorLine">|</span><div data-component="article-read-time" class="ArticleReadTime ArticleReadTime_size_small CardTime-ReadTime"><span>3 Min<!-- --> <!-- -->Read</span></div></div></div></div></div></div><div class="TopFeatured-WrapContentPreviewHorizontal TopFeatured-WrapContentPreviewHorizontal_isAdsRendered_init TopFeatured-WrapContentPreviewHorizontal_variant_recent"><div class="TopFeatured-WrapContentPreviewHorizontal2 TopFeatured-WrapContentPreviewHorizontal2_isAdsRendered_init"><div class="ContentPreview TopFeatured-ContentPreviewHorizontal TopFeatured-ContentPreviewHorizontal_variant_recent" data-module="content-preview" data-variant="card-horizontal"><div class="HorizontalCard"><div class="HorizontalCard-ImageWrapper"><a data-discover="true" href="/cybersecurity-operations/operation-undercut-russia-malign-influence-campaigns"><span class="HorizontalCard-ImageScreenReaderText">The Russian flag covered by code on a laptop screen</span><img data-component="image" class="HorizontalCard-Image" data-src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt2a398059c351b556/67475250f8c46b7f032fc959/russia_PHOTOCREO_Michal_Bednarek_shutterstock.jpg?width=300&auto=webp&quality=80&disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt2a398059c351b556/67475250f8c46b7f032fc959/russia_PHOTOCREO_Michal_Bednarek_shutterstock.jpg?width=300&auto=webp&quality=80&disable=upscale" loading="lazy" alt="" title=""/></a></div><div class="HorizontalCard-ContentWrapper"><div class="HorizontalCard-KeywordWrapper"><a data-component="keyword" class="Keyword Keyword_variant_alternate Keyword_title_cybersecurityOperations HorizontalCard-Keyword" data-discover="true" href="/cybersecurity-operations">Cybersecurity Operations</a></div><div class="HorizontalCard-TitleWrapper"><a class="HorizontalCard-Title" data-testid="preview-default-title" data-discover="true" href="/cybersecurity-operations/operation-undercut-russia-malign-influence-campaigns">'Operation Undercut' Adds to Russia Malign Influence Campaigns</a></div><div class="HorizontalCard-MobileTitleWrapper"><a class="HorizontalCard-Title" data-testid="preview-mobile-title" data-discover="true" href="/cybersecurity-operations/operation-undercut-russia-malign-influence-campaigns">'Operation Undercut' Adds to Russia Malign Influence Campaigns</a></div><p class="HorizontalCard-Date" data-testid="horizontalCardDate">Nov 27, 2024</p></div></div></div><div class="ContentPreview TopFeatured-ContentPreviewHorizontal TopFeatured-ContentPreviewHorizontal_isLast TopFeatured-ContentPreviewHorizontal_variant_recent" data-module="content-preview" data-variant="card-horizontal"><div class="HorizontalCard"><div class="HorizontalCard-ImageWrapper"><a data-discover="true" href="/cyberattacks-data-breaches/russian-script-kiddie-assembles-massive-ddos-botnet"><span class="HorizontalCard-ImageScreenReaderText">Vector green digital code rain in a Matrix inspired futuristic style</span><img data-component="image" class="HorizontalCard-Image" data-src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/bltd9544fe544dde688/674635c9fde1977e265db529/matrix_Kundra_shutterstock.jpg?width=300&auto=webp&quality=80&disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/bltd9544fe544dde688/674635c9fde1977e265db529/matrix_Kundra_shutterstock.jpg?width=300&auto=webp&quality=80&disable=upscale" loading="lazy" alt="" title=""/></a></div><div class="HorizontalCard-ContentWrapper"><div class="HorizontalCard-KeywordWrapper"><a data-component="keyword" class="Keyword Keyword_variant_alternate Keyword_title_cyberattacksDataBreaches HorizontalCard-Keyword" data-discover="true" href="/cyberattacks-data-breaches">Cyberattacks & Data Breaches</a></div><div class="HorizontalCard-TitleWrapper"><a class="HorizontalCard-Title" data-testid="preview-default-title" data-discover="true" href="/cyberattacks-data-breaches/russian-script-kiddie-assembles-massive-ddos-botnet">Russian Script Kiddie Assembles Massive DDoS Botnet</a></div><div class="HorizontalCard-MobileTitleWrapper"><a class="HorizontalCard-Title" data-testid="preview-mobile-title" data-discover="true" href="/cyberattacks-data-breaches/russian-script-kiddie-assembles-massive-ddos-botnet">Russian Script Kiddie Assembles Massive DDoS Botnet</a></div><p class="HorizontalCard-Date" data-testid="horizontalCardDate">Nov 27, 2024</p></div></div></div></div><div data-testid="content-preview-ad-container" class="TopFeatured-RetangleAds TopFeatured-RetangleAds_isShowAd"></div></div></div><div data-module="newsletter-signup-promo"><div class="SubscribeBanner SubscribeBanner_mode_dark SubscribeBanner_variant_vertical HomePage-NewsletterContent"><div class="SubscribeBanner-Wrapper"><div class="SubscribeBanner-Title" data-testid="subscribeBanner_title">Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.</div><div class="SubscribeBanner-Message" data-testid="subscribeBanner_message"></div><div class="SubscribeBanner-Button"><a data-component="button" data-testid="bannerNewsletterbutton" class="Button Button_size_medium Button_variant_secondaryFilled" href="https://dr-resources.darkreading.com/free/w_defa3135/prgm.cgi" target="_blank" rel="nofollow" data-name="subscribe-banner" data-action-type="sign-up"><span class="Button-ContentWrapper">Subscribe</span></a></div></div></div></div><div data-module="content-spotlight" class="ContentSpotlight ContentSpotlight_mode_light"><article class="ContentSpotlight-Article ContentSpotlight-Article_isReversed" moduleDesign="standard" title="Podcast HP Promo" text-alignment="center" data-testid="content-spotlight-article"><div class="ContentSpotlight-ImageContainer" data-testid="content-spotlight-image-container"><div class="ContentSpotlight-KeywordList"><div class="ContentSpotlight-KeywordWrapper"><a data-component="keyword" class="Keyword Keyword_variant_standard Keyword_title_cyberRisk ContentSpotlight-Keyword" data-discover="true" href="/cyber-risk">Cyber Risk</a></div></div><a data-discover="true" href="/cyber-risk/dark-reading-confidential-quantum"><img data-component="image" class="ContentSpotlight-Image" data-src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt0469f94bd17817ff/6642699959fdc64aa5f9c5fa/dark-reading-confidential-logo-sq.jpg?width=700&auto=webp&quality=80&disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt0469f94bd17817ff/6642699959fdc64aa5f9c5fa/dark-reading-confidential-logo-sq.jpg?width=700&auto=webp&quality=80&disable=upscale" loading="lazy" alt="Black background and white text saying Dark Reading Confidential" title="Black background and white text saying Dark Reading Confidential"/></a><a class="ContentSpotlight-IconWrapper" title="Link to all podcast" data-testid="content-spotlight-icon-link" data-discover="true" href="/podcasts"><span data-component="icon" data-name="Microphone" class="ContentSpotlight-Icon" style="mask-image:url(/build/_assets/Microphone-W4D26BPI.svg);-webkit-mask-image:url(/build/_assets/Microphone-W4D26BPI.svg);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain"></span></a></div><div class="ContentSpotlight-ContentContainer ContentSpotlight-ContentContainer_textAlignment_center" data-testid="content-spotlight-content-container"><p class="ContentSpotlight-ContentSummary" data-testid="content-spotlight-summary">PODCAST</p><a data-discover="true" href="/cyber-risk/dark-reading-confidential-quantum"><h2 class="ContentSpotlight-ContentHeading" data-testid="content-spotlight-heading">Dark Reading Confidential: Quantum Has Landed, So Now What?</h2></a><div class="ContentSpotlight-ContentBodyWrapper"><p class="ContentSpotlight-ContentBody" data-testid="content-spotlight-body">Episode #4: NIST's new post-quantum cryptography standards are here, so what comes next? This episode of Dark Reading Confidential digs into the world of quantum computing from a cybersecurity practitioner's point of view — with guests Matthew McFadden, vice president, Cyber, General Dynamics Information Technology (GDIT) and Thomas Scanlon, professor, Heinz College, Carnegie Mellon University.</p></div><div class="ContentSpotlight-ButtonContainer"><a data-testid="content-spotlight-button-link" data-discover="true" href="/cyber-risk/dark-reading-confidential-quantum"><button data-component="button" data-testid="button_button" class="Button Button_size_medium Button_variant_darkOutlined" type="button"><span class="Button-ContentWrapper">LISTEN TO THE EPISODE</span></button></a></div></div></article></div><div data-module="latest-featured" class="LatestFeatured"><div class="LatestFeatured-ColumnList LatestFeatured-ColumnList_left" data-testid="list-content"><p class="LatestFeatured-Title" data-testid="list-content-title">Latest News</p><div class="LatestFeatured-Content LatestFeatured-Content_left"><div class="ContentPreview LatestFeatured-ContentItem LatestFeatured-ContentItem_left" data-module="content-preview" data-variant="small"><div class="ListPreview"><div class="ListPreview-Container"><div class="ListPreview-ImageWrapper"><a aria-label="Read more about: Two hands typing on a laptop's keyboard, with a digital overlay" data-discover="true" href="/threat-intelligence/ransomware-gangs-seek-pen-testers-boost-professionalism"><div title="Two hands typing on a laptop's keyboard, with a digital overlay"><img data-component="image" class="ListPreview-Image" data-src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt6a62663944a43a13/674629fa4b6244f51f919947/TippaPatt-software-development-shutterstock.jpg?width=300&auto=webp&quality=80&disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt6a62663944a43a13/674629fa4b6244f51f919947/TippaPatt-software-development-shutterstock.jpg?width=300&auto=webp&quality=80&disable=upscale" loading="lazy" alt="Two hands typing on a laptop's keyboard, with a digital overlay" title="Two hands typing on a laptop's keyboard, with a digital overlay"/></div></a></div><div class="ListPreview-ContentWrapper"><div class="ListPreview-KeywordWrapper"><a data-component="keyword" class="Keyword Keyword_variant_alternate Keyword_title_threatIntelligence ListPreview-Keyword" data-discover="true" href="/threat-intelligence">Threat Intelligence</a></div><div class="ListPreview-TitleWrapper"><a class="ListPreview-Title" data-testid="preview-default-title" data-discover="true" href="/threat-intelligence/ransomware-gangs-seek-pen-testers-boost-professionalism">Ransomware Gangs Seek Pen Testers to Boost Quality</a></div><div class="ListPreview-MobileTitleWrapper"><a class="ListPreview-Title" data-testid="preview-mobile-title" data-discover="true" href="/threat-intelligence/ransomware-gangs-seek-pen-testers-boost-professionalism">Ransomware Gangs Seek Pen Testers to Boost Quality</a></div><div class="ListPreview-Footer"><span class="ListPreview-Date" data-testid="list-preview-date">Nov 29, 2024</span><div data-module="card-time" class="CardTime"><span class="CardTime-SeparatorLine">|</span><div data-component="article-read-time" class="ArticleReadTime ArticleReadTime_size_small CardTime-ReadTime"><span>4 Min<!-- --> <!-- -->Read</span></div></div></div></div></div><div class="ListPreview-ContributorsWrapper"><div class="Contributors Contributors_variant_slimline Contributors_cardVariant_small Contributors_hasAvatar" data-component="contributors"><div class="Contributors-AvatarWrapper"><a class="Contributors-AvatarLink" aria-label="Robert Lemos, Contributing Writer" data-discover="true" href="/author/robert-lemos"><img aria-hidden="true" data-testid="contributor-avatar" data-component="image" class="Contributors-Avatar" data-src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt28d2c260c33375ea/64f14ff471df6264a382aaa0/Robert-Lemos.png?width=100&auto=webp&quality=80&disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt28d2c260c33375ea/64f14ff471df6264a382aaa0/Robert-Lemos.png?width=100&auto=webp&quality=80&disable=upscale" loading="lazy" alt="Picture of Robert Lemos, Contributing Writer" title="Picture of Robert Lemos, Contributing Writer"/></a></div><div class="Contributors-InfoWrapper"><span class="Contributors-ByText" data-testid="by-text">by</span><a class="Contributors-ContributorName" data-testid="contributor-name" data-discover="true" href="/author/robert-lemos">Robert Lemos, Contributing Writer</a></div></div></div></div></div><div class="ContentPreview LatestFeatured-ContentItem LatestFeatured-ContentItem_left" data-module="content-preview" data-variant="small"><div class="ListPreview"><div class="ListPreview-Container"><div class="ListPreview-ImageWrapper"><a aria-label="Read more about: The Russian flag covered by code on a laptop screen" data-discover="true" href="/cybersecurity-operations/operation-undercut-russia-malign-influence-campaigns"><div title="The Russian flag covered by code on a laptop screen"><img data-component="image" class="ListPreview-Image" data-src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt2a398059c351b556/67475250f8c46b7f032fc959/russia_PHOTOCREO_Michal_Bednarek_shutterstock.jpg?width=300&auto=webp&quality=80&disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt2a398059c351b556/67475250f8c46b7f032fc959/russia_PHOTOCREO_Michal_Bednarek_shutterstock.jpg?width=300&auto=webp&quality=80&disable=upscale" loading="lazy" alt="The Russian flag covered by code on a laptop screen" title="The Russian flag covered by code on a laptop screen"/></div></a></div><div class="ListPreview-ContentWrapper"><div class="ListPreview-KeywordWrapper"><a data-component="keyword" class="Keyword Keyword_variant_alternate Keyword_title_cybersecurityOperations ListPreview-Keyword" data-discover="true" href="/cybersecurity-operations">Cybersecurity Operations</a></div><div class="ListPreview-TitleWrapper"><a class="ListPreview-Title" data-testid="preview-default-title" data-discover="true" href="/cybersecurity-operations/operation-undercut-russia-malign-influence-campaigns">'Operation Undercut' Adds to Russia Malign Influence Campaigns</a></div><div class="ListPreview-MobileTitleWrapper"><a class="ListPreview-Title" data-testid="preview-mobile-title" data-discover="true" href="/cybersecurity-operations/operation-undercut-russia-malign-influence-campaigns">'Operation Undercut' Adds to Russia Malign Influence Campaigns</a></div><div class="ListPreview-Footer"><span class="ListPreview-Date" data-testid="list-preview-date">Nov 27, 2024</span><div data-module="card-time" class="CardTime"><span class="CardTime-SeparatorLine">|</span><div data-component="article-read-time" class="ArticleReadTime ArticleReadTime_size_small CardTime-ReadTime"><span>3 Min<!-- --> <!-- -->Read</span></div></div></div></div></div><div class="ListPreview-ContributorsWrapper"><div class="Contributors Contributors_variant_slimline Contributors_cardVariant_small Contributors_hasAvatar" data-component="contributors"><div class="Contributors-AvatarWrapper"><a class="Contributors-AvatarLink" aria-label="Jai Vijayan, Contributing Writer" data-discover="true" href="/author/jai-vijayan"><img aria-hidden="true" data-testid="contributor-avatar" data-component="image" class="Contributors-Avatar" data-src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt1a674355ce57f27b/64f14f228727730c7f926217/Jai-Vijayan.jpeg?width=100&auto=webp&quality=80&disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt1a674355ce57f27b/64f14f228727730c7f926217/Jai-Vijayan.jpeg?width=100&auto=webp&quality=80&disable=upscale" loading="lazy" alt="Picture of Jai Vijayan, Contributing Writer" title="Picture of Jai Vijayan, Contributing Writer"/></a></div><div class="Contributors-InfoWrapper"><span class="Contributors-ByText" data-testid="by-text">by</span><a class="Contributors-ContributorName" data-testid="contributor-name" data-discover="true" href="/author/jai-vijayan">Jai Vijayan, Contributing Writer</a></div></div></div></div></div><div class="ContentPreview LatestFeatured-ContentItem LatestFeatured-ContentItem_left" data-module="content-preview" data-variant="small"><div class="ListPreview"><div class="ListPreview-Container"><div class="ListPreview-ImageWrapper"><a aria-label="Read more about: A blue credit card on a fish hook being dangled above a computer keyboard" data-discover="true" href="/application-security/sneaky-skimmer-malware-magento-sites-black-friday"><div title="A blue credit card on a fish hook being dangled above a computer keyboard"><img data-component="image" class="ListPreview-Image" data-src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt3317719ff4b0bbee/6747152ee2b6b17ae587bdee/cardskimming_Kim_Kuperkova_shutterstock.jpg?width=300&auto=webp&quality=80&disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt3317719ff4b0bbee/6747152ee2b6b17ae587bdee/cardskimming_Kim_Kuperkova_shutterstock.jpg?width=300&auto=webp&quality=80&disable=upscale" loading="lazy" alt="A blue credit card on a fish hook being dangled above a computer keyboard" title="A blue credit card on a fish hook being dangled above a computer keyboard"/></div></a></div><div class="ListPreview-ContentWrapper"><div class="ListPreview-KeywordWrapper"><a data-component="keyword" class="Keyword Keyword_variant_alternate Keyword_title_applicationSecurity ListPreview-Keyword" data-discover="true" href="/application-security">Application Security</a></div><div class="ListPreview-TitleWrapper"><a class="ListPreview-Title" data-testid="preview-default-title" data-discover="true" href="/application-security/sneaky-skimmer-malware-magento-sites-black-friday">Sneaky Skimmer Malware Targets Magento Sites Ahead of Black Friday</a></div><div class="ListPreview-MobileTitleWrapper"><a class="ListPreview-Title" data-testid="preview-mobile-title" data-discover="true" href="/application-security/sneaky-skimmer-malware-magento-sites-black-friday">Sneaky Skimmer Malware Targets Magento Sites Ahead of Black Friday</a></div><div class="ListPreview-Footer"><span class="ListPreview-Date" data-testid="list-preview-date">Nov 27, 2024</span><div data-module="card-time" class="CardTime"><span class="CardTime-SeparatorLine">|</span><div data-component="article-read-time" class="ArticleReadTime ArticleReadTime_size_small CardTime-ReadTime"><span>3 Min<!-- --> <!-- -->Read</span></div></div></div></div></div><div class="ListPreview-ContributorsWrapper"><div class="Contributors Contributors_variant_slimline Contributors_cardVariant_small Contributors_hasAvatar" data-component="contributors"><div class="Contributors-AvatarWrapper"><a class="Contributors-AvatarLink" aria-label="Elizabeth Montalbano, Contributing Writer" data-discover="true" href="/author/elizabeth-montalbano"><img aria-hidden="true" data-testid="contributor-avatar" data-component="image" class="Contributors-Avatar" data-src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt3a8c7badad2ca168/64f15cd2b4c236805e4fddad/ElizabethMontalbano.jpg?width=100&auto=webp&quality=80&disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt3a8c7badad2ca168/64f15cd2b4c236805e4fddad/ElizabethMontalbano.jpg?width=100&auto=webp&quality=80&disable=upscale" loading="lazy" alt="Picture of Elizabeth Montalbano, Contributing Writer" title="Picture of Elizabeth Montalbano, Contributing Writer"/></a></div><div class="Contributors-InfoWrapper"><span class="Contributors-ByText" data-testid="by-text">by</span><a class="Contributors-ContributorName" data-testid="contributor-name" data-discover="true" href="/author/elizabeth-montalbano">Elizabeth Montalbano, Contributing Writer</a></div></div></div></div></div><div class="ContentPreview LatestFeatured-ContentItem LatestFeatured-ContentItem_left" data-module="content-preview" data-variant="small"><div class="ListPreview"><div class="ListPreview-Container"><div class="ListPreview-ImageWrapper"><a aria-label="Read more about: Vector green digital code rain in a Matrix inspired futuristic style" data-discover="true" href="/cyberattacks-data-breaches/russian-script-kiddie-assembles-massive-ddos-botnet"><div title="Vector green digital code rain in a Matrix inspired futuristic style"><img data-component="image" class="ListPreview-Image" data-src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/bltd9544fe544dde688/674635c9fde1977e265db529/matrix_Kundra_shutterstock.jpg?width=300&auto=webp&quality=80&disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/bltd9544fe544dde688/674635c9fde1977e265db529/matrix_Kundra_shutterstock.jpg?width=300&auto=webp&quality=80&disable=upscale" loading="lazy" alt="Vector green digital code rain in a Matrix inspired futuristic style" title="Vector green digital code rain in a Matrix inspired futuristic style"/></div></a></div><div class="ListPreview-ContentWrapper"><div class="ListPreview-KeywordWrapper"><a data-component="keyword" class="Keyword Keyword_variant_alternate Keyword_title_cyberattacksDataBreaches ListPreview-Keyword" data-discover="true" href="/cyberattacks-data-breaches">Cyberattacks & Data Breaches</a></div><div class="ListPreview-TitleWrapper"><a class="ListPreview-Title" data-testid="preview-default-title" data-discover="true" href="/cyberattacks-data-breaches/russian-script-kiddie-assembles-massive-ddos-botnet">Russian Script Kiddie Assembles Massive DDoS Botnet</a></div><div class="ListPreview-MobileTitleWrapper"><a class="ListPreview-Title" data-testid="preview-mobile-title" data-discover="true" href="/cyberattacks-data-breaches/russian-script-kiddie-assembles-massive-ddos-botnet">Russian Script Kiddie Assembles Massive DDoS Botnet</a></div><div class="ListPreview-Footer"><span class="ListPreview-Date" data-testid="list-preview-date">Nov 27, 2024</span><div data-module="card-time" class="CardTime"><span class="CardTime-SeparatorLine">|</span><div data-component="article-read-time" class="ArticleReadTime ArticleReadTime_size_small CardTime-ReadTime"><span>4 Min<!-- --> <!-- -->Read</span></div></div></div></div></div><div class="ListPreview-ContributorsWrapper"><div class="Contributors Contributors_variant_slimline Contributors_cardVariant_small Contributors_hasAvatar" data-component="contributors"><div class="Contributors-AvatarWrapper"><a class="Contributors-AvatarLink" aria-label="Jai Vijayan, Contributing Writer" data-discover="true" href="/author/jai-vijayan"><img aria-hidden="true" data-testid="contributor-avatar" data-component="image" class="Contributors-Avatar" data-src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt1a674355ce57f27b/64f14f228727730c7f926217/Jai-Vijayan.jpeg?width=100&auto=webp&quality=80&disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt1a674355ce57f27b/64f14f228727730c7f926217/Jai-Vijayan.jpeg?width=100&auto=webp&quality=80&disable=upscale" loading="lazy" alt="Picture of Jai Vijayan, Contributing Writer" title="Picture of Jai Vijayan, Contributing Writer"/></a></div><div class="Contributors-InfoWrapper"><span class="Contributors-ByText" data-testid="by-text">by</span><a class="Contributors-ContributorName" data-testid="contributor-name" data-discover="true" href="/author/jai-vijayan">Jai Vijayan, Contributing Writer</a></div></div></div></div></div><div class="ContentPreview LatestFeatured-ContentItem LatestFeatured-ContentItem_left" data-module="content-preview" data-variant="small"><div class="ListPreview"><div class="ListPreview-Container"><div class="ListPreview-ImageWrapper"><a aria-label="Read more about: A screen showing the Windows 11 logo" data-discover="true" href="/endpoint-security/microsoft-releases-recall-windows-insider-preview"><div title="A screen showing the Windows 11 logo"><img data-component="image" class="ListPreview-Image" data-src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt665c5e44e3b036f8/6706f434d8c4923c6a1a9e28/mundissima-windows-11-photo-shutterstock.jpg?width=300&auto=webp&quality=80&disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt665c5e44e3b036f8/6706f434d8c4923c6a1a9e28/mundissima-windows-11-photo-shutterstock.jpg?width=300&auto=webp&quality=80&disable=upscale" loading="lazy" alt="A screen showing the Windows 11 logo" title="A screen showing the Windows 11 logo"/></div></a></div><div class="ListPreview-ContentWrapper"><div class="ListPreview-KeywordWrapper"><a data-component="keyword" class="Keyword Keyword_variant_alternate Keyword_title_endpointSecurity ListPreview-Keyword" data-discover="true" href="/endpoint-security">Endpoint Security</a></div><div class="ListPreview-TitleWrapper"><a class="ListPreview-Title" data-testid="preview-default-title" data-discover="true" href="/endpoint-security/microsoft-releases-recall-windows-insider-preview">Microsoft Finally Releases Recall as Part of Windows Insider Preview</a></div><div class="ListPreview-MobileTitleWrapper"><a class="ListPreview-Title" data-testid="preview-mobile-title" data-discover="true" href="/endpoint-security/microsoft-releases-recall-windows-insider-preview">Microsoft Previews Recall in Windows Insider</a></div><div class="ListPreview-Footer"><span class="ListPreview-Date" data-testid="list-preview-date">Nov 27, 2024</span><div data-module="card-time" class="CardTime"><span class="CardTime-SeparatorLine">|</span><div data-component="article-read-time" class="ArticleReadTime ArticleReadTime_size_small CardTime-ReadTime"><span>3 Min<!-- --> <!-- -->Read</span></div></div></div></div></div></div></div><div class="ContentPreview LatestFeatured-ContentItem LatestFeatured-ContentItem_left" data-module="content-preview" data-variant="small"><div class="ListPreview"><div class="ListPreview-Container"><div class="ListPreview-ImageWrapper"><a aria-label="Read more about: Hands holing and working a tablet, overlaid with charts" data-discover="true" href="/application-security/israel-defies-downturn-security-funding"><div title="Hands holing and working a tablet, overlaid with charts"><img data-component="image" class="ListPreview-Image" data-src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/bltf45aedac7f619d1e/6744f4c5df95885d64555b94/thinkhubstudio-investment-security-shutterstock.jpg?width=300&auto=webp&quality=80&disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/bltf45aedac7f619d1e/6744f4c5df95885d64555b94/thinkhubstudio-investment-security-shutterstock.jpg?width=300&auto=webp&quality=80&disable=upscale" loading="lazy" alt="Hands holing and working a tablet, overlaid with charts" title="Hands holing and working a tablet, overlaid with charts"/></div></a></div><div class="ListPreview-ContentWrapper"><div class="ListPreview-KeywordWrapper"><a data-component="keyword" class="Keyword Keyword_variant_alternate Keyword_title_applicationSecurity ListPreview-Keyword" data-discover="true" href="/application-security">Application Security</a></div><div class="ListPreview-TitleWrapper"><a class="ListPreview-Title" data-testid="preview-default-title" data-discover="true" href="/application-security/israel-defies-downturn-security-funding">Israel Defies VC Downturn With More Cybersecurity Investments</a></div><div class="ListPreview-MobileTitleWrapper"><a class="ListPreview-Title" data-testid="preview-mobile-title" data-discover="true" href="/application-security/israel-defies-downturn-security-funding">Israel Defies VC Downturn With More Cybersecurity Investments</a></div><div class="ListPreview-Footer"><span class="ListPreview-Date" data-testid="list-preview-date">Nov 27, 2024</span><div data-module="card-time" class="CardTime"><span class="CardTime-SeparatorLine">|</span><div data-component="article-read-time" class="ArticleReadTime ArticleReadTime_size_small CardTime-ReadTime"><span>5 Min<!-- --> <!-- -->Read</span></div></div></div></div></div><div class="ListPreview-ContributorsWrapper"><div class="Contributors Contributors_variant_slimline Contributors_cardVariant_small Contributors_hasAvatar" data-component="contributors"><div class="Contributors-AvatarWrapper"><a class="Contributors-AvatarLink" aria-label="Robert Lemos, Contributing Writer" data-discover="true" href="/author/robert-lemos"><img aria-hidden="true" data-testid="contributor-avatar" data-component="image" class="Contributors-Avatar" data-src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt28d2c260c33375ea/64f14ff471df6264a382aaa0/Robert-Lemos.png?width=100&auto=webp&quality=80&disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt28d2c260c33375ea/64f14ff471df6264a382aaa0/Robert-Lemos.png?width=100&auto=webp&quality=80&disable=upscale" loading="lazy" alt="Picture of Robert Lemos, Contributing Writer" title="Picture of Robert Lemos, Contributing Writer"/></a></div><div class="Contributors-InfoWrapper"><span class="Contributors-ByText" data-testid="by-text">by</span><a class="Contributors-ContributorName" data-testid="contributor-name" data-discover="true" href="/author/robert-lemos">Robert Lemos, Contributing Writer</a></div></div></div></div></div><div class="ContentPreview LatestFeatured-ContentItem LatestFeatured-ContentItem_left" data-module="content-preview" data-variant="small"><div class="ListPreview"><div class="ListPreview-Container"><div class="ListPreview-ImageWrapper"><a aria-label="Read more about: A still from the famous orgasm scene in "When Harry Met Sally"" data-discover="true" href="/application-security/romcom-apt-zero-day-zero-click-browser-escapes-firefox-tor"><div title="A still from the famous orgasm scene in "When Harry Met Sally""><img data-component="image" class="ListPreview-Image" data-src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt3dd452fdf8cf8240/6746324022170842162612ed/When_Harry_Met_Sally-Collection_Christophel-Alamy.jpg?width=300&auto=webp&quality=80&disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt3dd452fdf8cf8240/6746324022170842162612ed/When_Harry_Met_Sally-Collection_Christophel-Alamy.jpg?width=300&auto=webp&quality=80&disable=upscale" loading="lazy" alt="A still from the famous orgasm scene in "When Harry Met Sally"" title="A still from the famous orgasm scene in "When Harry Met Sally""/></div></a></div><div class="ListPreview-ContentWrapper"><div class="ListPreview-KeywordWrapper"><a data-component="keyword" class="Keyword Keyword_variant_alternate Keyword_title_applicationSecurity ListPreview-Keyword" data-discover="true" href="/application-security">Application Security</a></div><div class="ListPreview-TitleWrapper"><a class="ListPreview-Title" data-testid="preview-default-title" data-discover="true" href="/application-security/romcom-apt-zero-day-zero-click-browser-escapes-firefox-tor">'RomCom' APT Mounts Zero-Day, Zero-Click Browser Escapes in Firefox, Tor</a></div><div class="ListPreview-MobileTitleWrapper"><a class="ListPreview-Title" data-testid="preview-mobile-title" data-discover="true" href="/application-security/romcom-apt-zero-day-zero-click-browser-escapes-firefox-tor">'RomCom' APT Mounts Zero-Day, Zero-Click Browser Escapes</a></div><div class="ListPreview-Footer"><span class="ListPreview-Date" data-testid="list-preview-date">Nov 26, 2024</span><div data-module="card-time" class="CardTime"><span class="CardTime-SeparatorLine">|</span><div data-component="article-read-time" class="ArticleReadTime ArticleReadTime_size_small CardTime-ReadTime"><span>4 Min<!-- --> <!-- -->Read</span></div></div></div></div></div><div class="ListPreview-ContributorsWrapper"><div class="Contributors Contributors_variant_slimline Contributors_cardVariant_small Contributors_hasAvatar" data-component="contributors"><div class="Contributors-AvatarWrapper"><a class="Contributors-AvatarLink" aria-label="Nate Nelson, Contributing Writer" data-discover="true" href="/author/nate-nelson"><img aria-hidden="true" data-testid="contributor-avatar" data-component="image" class="Contributors-Avatar" data-src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt00df7fa701809c8c/64f15c901c6887515143a4d1/Nate-Nelson_(1).jpg?width=100&auto=webp&quality=80&disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt00df7fa701809c8c/64f15c901c6887515143a4d1/Nate-Nelson_(1).jpg?width=100&auto=webp&quality=80&disable=upscale" loading="lazy" alt="Picture of Nate Nelson, Contributing Writer" title="Picture of Nate Nelson, Contributing Writer"/></a></div><div class="Contributors-InfoWrapper"><span class="Contributors-ByText" data-testid="by-text">by</span><a class="Contributors-ContributorName" data-testid="contributor-name" data-discover="true" href="/author/nate-nelson">Nate Nelson, Contributing Writer</a></div></div></div></div></div><div class="ContentPreview LatestFeatured-ContentItem LatestFeatured-ContentItem_left" data-module="content-preview" data-variant="small"><div class="ListPreview"><div class="ListPreview-Container"><div class="ListPreview-ImageWrapper"><a aria-label="Read more about: Woman holding a red penalty card" data-discover="true" href="/cybersecurity-operations/geico-travelers-fined-lax-data-security"><div title="Woman holding a red penalty card"><img data-component="image" class="ListPreview-Image" data-src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt09426f45a36f3ccb/6746316c6b0aab7078f2116d/red_penalty_card_Phanie_-_Sipa_Press_Alamy.jpg?width=300&auto=webp&quality=80&disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt09426f45a36f3ccb/6746316c6b0aab7078f2116d/red_penalty_card_Phanie_-_Sipa_Press_Alamy.jpg?width=300&auto=webp&quality=80&disable=upscale" loading="lazy" alt="Woman holding a red penalty card" title="Woman holding a red penalty card"/></div></a></div><div class="ListPreview-ContentWrapper"><div class="ListPreview-KeywordWrapper"><a data-component="keyword" class="Keyword Keyword_variant_alternate Keyword_title_cybersecurityOperations ListPreview-Keyword" data-discover="true" href="/cybersecurity-operations">Cybersecurity Operations</a></div><div class="ListPreview-TitleWrapper"><a class="ListPreview-Title" data-testid="preview-default-title" data-discover="true" href="/cybersecurity-operations/geico-travelers-fined-lax-data-security">Geico, Travelers Fined $11.3M for Lax Data Security</a></div><div class="ListPreview-MobileTitleWrapper"><a class="ListPreview-Title" data-testid="preview-mobile-title" data-discover="true" href="/cybersecurity-operations/geico-travelers-fined-lax-data-security">Geico, Travelers Fined $11.3M for Lax Data Security</a></div><div class="ListPreview-Footer"><span class="ListPreview-Date" data-testid="list-preview-date">Nov 26, 2024</span><div data-module="card-time" class="CardTime"><span class="CardTime-SeparatorLine">|</span><div data-component="article-read-time" class="ArticleReadTime ArticleReadTime_size_small CardTime-ReadTime"><span>2 Min<!-- --> <!-- -->Read</span></div></div></div></div></div><div class="ListPreview-ContributorsWrapper"><div class="Contributors Contributors_variant_slimline Contributors_cardVariant_small Contributors_hasAvatar" data-component="contributors"><div class="Contributors-AvatarWrapper"><a class="Contributors-AvatarLink" aria-label="Dark Reading Staff" data-discover="true" href="/author/dark-reading-staff"><img aria-hidden="true" data-testid="contributor-avatar" data-component="image" class="Contributors-Avatar" data-src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt99b391f0439c1434/64f179af7de67f4e4300e517/285801_DR23_Graphics_Website_Author_Logo_0.jpg?width=100&auto=webp&quality=80&disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt99b391f0439c1434/64f179af7de67f4e4300e517/285801_DR23_Graphics_Website_Author_Logo_0.jpg?width=100&auto=webp&quality=80&disable=upscale" loading="lazy" alt="Picture of Dark Reading Staff" title="Picture of Dark Reading Staff"/></a></div><div class="Contributors-InfoWrapper"><span class="Contributors-ByText" data-testid="by-text">by</span><a class="Contributors-ContributorName" data-testid="contributor-name" data-discover="true" href="/author/dark-reading-staff">Dark Reading Staff</a><span class="Contributors-ContributorTitle" data-testid="contributor-title">, <!-- -->Dark Reading</span></div></div></div></div></div><div class="ContentPreview LatestFeatured-ContentItem LatestFeatured-ContentItem_left" data-module="content-preview" data-variant="small"><div class="ListPreview"><div class="ListPreview-Container"><div class="ListPreview-ImageWrapper"><a aria-label="Read more about: Hooded figures on the Chinese flag cover with code" data-discover="true" href="/application-security/salt-typhoon-malware-arsenal-ghostspider"><div title="Hooded figures on the Chinese flag cover with code"><img data-component="image" class="ListPreview-Image" data-src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt969f0c750ba3ee59/6744e5923d9773026cc63c90/Chinese_hackers-3D_generator-Alamy.jpg?width=300&auto=webp&quality=80&disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt969f0c750ba3ee59/6744e5923d9773026cc63c90/Chinese_hackers-3D_generator-Alamy.jpg?width=300&auto=webp&quality=80&disable=upscale" loading="lazy" alt="Hooded figures on the Chinese flag cover with code" title="Hooded figures on the Chinese flag cover with code"/></div></a></div><div class="ListPreview-ContentWrapper"><div class="ListPreview-KeywordWrapper"><a data-component="keyword" class="Keyword Keyword_variant_alternate Keyword_title_applicationSecurity ListPreview-Keyword" data-discover="true" href="/application-security">Application Security</a></div><div class="ListPreview-TitleWrapper"><a class="ListPreview-Title" data-testid="preview-default-title" data-discover="true" href="/application-security/salt-typhoon-malware-arsenal-ghostspider">Salt Typhoon Builds Out Malware Arsenal With GhostSpider</a></div><div class="ListPreview-MobileTitleWrapper"><a class="ListPreview-Title" data-testid="preview-mobile-title" data-discover="true" href="/application-security/salt-typhoon-malware-arsenal-ghostspider">Salt Typhoon Builds Out Malware Arsenal With GhostSpider</a></div><div class="ListPreview-Footer"><span class="ListPreview-Date" data-testid="list-preview-date">Nov 26, 2024</span><div data-module="card-time" class="CardTime"><span class="CardTime-SeparatorLine">|</span><div data-component="article-read-time" class="ArticleReadTime ArticleReadTime_size_small CardTime-ReadTime"><span>4 Min<!-- --> <!-- -->Read</span></div></div></div></div></div><div class="ListPreview-ContributorsWrapper"><div class="Contributors Contributors_variant_slimline Contributors_cardVariant_small Contributors_hasAvatar" data-component="contributors"><div class="Contributors-AvatarWrapper"><a class="Contributors-AvatarLink" aria-label="Nate Nelson, Contributing Writer" data-discover="true" href="/author/nate-nelson"><img aria-hidden="true" data-testid="contributor-avatar" data-component="image" class="Contributors-Avatar" data-src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt00df7fa701809c8c/64f15c901c6887515143a4d1/Nate-Nelson_(1).jpg?width=100&auto=webp&quality=80&disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt00df7fa701809c8c/64f15c901c6887515143a4d1/Nate-Nelson_(1).jpg?width=100&auto=webp&quality=80&disable=upscale" loading="lazy" alt="Picture of Nate Nelson, Contributing Writer" title="Picture of Nate Nelson, Contributing Writer"/></a></div><div class="Contributors-InfoWrapper"><span class="Contributors-ByText" data-testid="by-text">by</span><a class="Contributors-ContributorName" data-testid="contributor-name" data-discover="true" href="/author/nate-nelson">Nate Nelson, Contributing Writer</a></div></div></div></div></div><div class="ContentPreview LatestFeatured-ContentItem LatestFeatured-ContentItem_left" data-module="content-preview" data-variant="small"><div class="ListPreview"><div class="ListPreview-Container"><div class="ListPreview-ImageWrapper"><a aria-label="Read more about: AWS logo against a black background." data-discover="true" href="/identity-access-management-security/aws-rolls-out-updates-to-amazon-cognito"><div title="AWS logo against a black background."><img data-component="image" class="ListPreview-Image" data-src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt6b376a9ebdf9876f/674616ddfbdcfd40f7ec33c3/AWS-GK_Images-Alamy.jpg?width=300&auto=webp&quality=80&disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt6b376a9ebdf9876f/674616ddfbdcfd40f7ec33c3/AWS-GK_Images-Alamy.jpg?width=300&auto=webp&quality=80&disable=upscale" loading="lazy" alt="AWS logo against a black background." title="AWS logo against a black background."/></div></a></div><div class="ListPreview-ContentWrapper"><div class="ListPreview-KeywordWrapper"><a data-component="keyword" class="Keyword Keyword_variant_alternate Keyword_title_identityAccessManagementSecurity ListPreview-Keyword" data-discover="true" href="/cybersecurity-operations/identity-access-management-security">Identity & Access Management Security</a></div><div class="ListPreview-TitleWrapper"><a class="ListPreview-Title" data-testid="preview-default-title" data-discover="true" href="/identity-access-management-security/aws-rolls-out-updates-to-amazon-cognito">AWS Rolls Out Updates to Amazon Cognito</a></div><div class="ListPreview-MobileTitleWrapper"><a class="ListPreview-Title" data-testid="preview-mobile-title" data-discover="true" href="/identity-access-management-security/aws-rolls-out-updates-to-amazon-cognito">AWS Rolls Out Updates to Amazon Cognito</a></div><div class="ListPreview-Footer"><span class="ListPreview-Date" data-testid="list-preview-date">Nov 26, 2024</span><div data-module="card-time" class="CardTime"><span class="CardTime-SeparatorLine">|</span><div data-component="article-read-time" class="ArticleReadTime ArticleReadTime_size_small CardTime-ReadTime"><span>1 Min<!-- --> <!-- -->Read</span></div></div></div></div></div><div class="ListPreview-ContributorsWrapper"><div class="Contributors Contributors_variant_slimline Contributors_cardVariant_small Contributors_hasAvatar" data-component="contributors"><div class="Contributors-AvatarWrapper"><a class="Contributors-AvatarLink" aria-label="Jennifer Lawinski" data-discover="true" href="/author/jennifer-lawinski"><img aria-hidden="true" data-testid="contributor-avatar" data-component="image" class="Contributors-Avatar" data-src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt64edbfe42402bf03/660b3a58f5fc7993e5562490/jennifer-lawinski.jpg?width=100&auto=webp&quality=80&disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt64edbfe42402bf03/660b3a58f5fc7993e5562490/jennifer-lawinski.jpg?width=100&auto=webp&quality=80&disable=upscale" loading="lazy" alt="Picture of Jennifer Lawinski" title="Picture of Jennifer Lawinski"/></a></div><div class="Contributors-InfoWrapper"><span class="Contributors-ByText" data-testid="by-text">by</span><a class="Contributors-ContributorName" data-testid="contributor-name" data-discover="true" href="/author/jennifer-lawinski">Jennifer Lawinski</a><span class="Contributors-ContributorTitle" data-testid="contributor-title">, <!-- -->Contributing Writer</span></div></div></div></div></div></div><a data-testid="list-content-more-content" class="LatestFeatured-Link" data-discover="true" href="/latest-news">More News</a></div><div class="LatestFeatured-ColumnList" data-testid="list-content"><div class="LatestFeatured-Ad"></div><p class="LatestFeatured-Title LatestFeatured-Title_right" data-testid="list-content-title">Latest Commentary</p><div class="LatestFeatured-Content"><div class="ContentPreview LatestFeatured-ContentItem" data-module="content-preview" data-variant="contributor-focused"><div class="ContributorFocusedCard"><div class="ContributorFocusedCard-Wrapper"><div class="ContributorFocusedCard-Body"><a aria-label="Yochai Corem" data-discover="true" href="/author/yochai-corem"><span class="ContributorFocusedCard-ScreenReaderText">Picture of Yochai Corem</span><img aria-hidden="true" data-component="image" class="ContributorFocusedCard-Avatar" data-src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blta3b7bc01b57064f1/6744e937fba932022fb82943/Yochai_Corem_-_Headshot_Square.jpg?width=150&auto=webp&quality=80&disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blta3b7bc01b57064f1/6744e937fba932022fb82943/Yochai_Corem_-_Headshot_Square.jpg?width=150&auto=webp&quality=80&disable=upscale" loading="lazy" alt="" title=""/></a></div><div class="ContributorFocusedCard-InfoWrapper"><a class="ContributorFocusedCard-ContributorName" data-discover="true" href="/author/yochai-corem">Yochai Corem</a><p class="ContributorFocusedCard-ContributorTitle" data-testid="preview-contributor-title">CEO, Cyberint</p></div></div><div class="ContributorFocusedCard-ContentWrapper"><a data-component="keyword" class="Keyword Keyword_variant_alternate Keyword_title_cybersecurityOperations" data-discover="true" href="/cybersecurity-operations">Cybersecurity Operations</a><div class="ContributorFocusedCard-TitleWrapper"><a class="ContributorFocusedCard-Title" data-testid="contributor-focused-card-title" data-discover="true" href="/cybersecurity-operations/how-learning-fly-made-better-cybersecurity-ceo">How Learning to Fly Made Me a Better Cybersecurity CEO</a></div><div class="ContributorFocusedCard-Footer"><span class="ContributorFocusedCard-Date">Nov 27, 2024</span><div data-module="card-time" class="CardTime"><span class="CardTime-SeparatorLine">|</span><div data-component="article-read-time" class="ArticleReadTime ArticleReadTime_size_small CardTime-ReadTime"><span>5 Min<!-- --> <!-- -->Read</span></div></div></div></div></div></div><div class="ContentPreview LatestFeatured-ContentItem" data-module="content-preview" data-variant="contributor-focused"><div class="ContributorFocusedCard"><div class="ContributorFocusedCard-Wrapper"><div class="ContributorFocusedCard-Body"><a aria-label="Kyle Hanslovan" data-discover="true" href="/author/kyle-hanslovan"><span class="ContributorFocusedCard-ScreenReaderText">Picture of Kyle Hanslovan</span><img aria-hidden="true" data-component="image" class="ContributorFocusedCard-Avatar" data-src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt07db825f66e79b6d/6740e48f804c6d0fcc0a0569/image.png?width=150&auto=webp&quality=80&disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt07db825f66e79b6d/6740e48f804c6d0fcc0a0569/image.png?width=150&auto=webp&quality=80&disable=upscale" loading="lazy" alt="" title=""/></a></div><div class="ContributorFocusedCard-InfoWrapper"><a class="ContributorFocusedCard-ContributorName" data-discover="true" href="/author/kyle-hanslovan">Kyle Hanslovan</a><p class="ContributorFocusedCard-ContributorTitle" data-testid="preview-contributor-title">CEO & Co-Founder, Huntress</p></div></div><div class="ContributorFocusedCard-ContentWrapper"><a data-component="keyword" class="Keyword Keyword_variant_alternate Keyword_title_vulnerabilitiesThreats" data-discover="true" href="/vulnerabilities-threats">Vulnerabilities & Threats</a><div class="ContributorFocusedCard-TitleWrapper"><a class="ContributorFocusedCard-Title" data-testid="contributor-focused-card-title" data-discover="true" href="/vulnerabilities-threats/my-car-knows-my-secrets">My Car Knows My Secrets, and I'm (Mostly) OK With That</a></div><div class="ContributorFocusedCard-Footer"><span class="ContributorFocusedCard-Date">Nov 26, 2024</span><div data-module="card-time" class="CardTime"><span class="CardTime-SeparatorLine">|</span><div data-component="article-read-time" class="ArticleReadTime ArticleReadTime_size_small CardTime-ReadTime"><span>5 Min<!-- --> <!-- -->Read</span></div></div></div></div></div></div><div class="ContentPreview LatestFeatured-ContentItem" data-module="content-preview" data-variant="contributor-focused"><div class="ContributorFocusedCard"><div class="ContributorFocusedCard-Wrapper"><div class="ContributorFocusedCard-Body"><a aria-label="Theresa Payton" data-discover="true" href="/author/theresa-payton"><span class="ContributorFocusedCard-ScreenReaderText">Picture of Theresa Payton</span><img aria-hidden="true" data-component="image" class="ContributorFocusedCard-Avatar" data-src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt20ee1170850d5dd0/6744a031e0c37144153e8b99/payton.jpg?width=150&auto=webp&quality=80&disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt20ee1170850d5dd0/6744a031e0c37144153e8b99/payton.jpg?width=150&auto=webp&quality=80&disable=upscale" loading="lazy" alt="" title=""/></a></div><div class="ContributorFocusedCard-InfoWrapper"><a class="ContributorFocusedCard-ContributorName" data-discover="true" href="/author/theresa-payton">Theresa Payton</a><p class="ContributorFocusedCard-ContributorTitle" data-testid="preview-contributor-title">Former White House CIO, and CEO, Fortalice Solutions, LLC</p></div></div><div class="ContributorFocusedCard-ContentWrapper"><a data-component="keyword" class="Keyword Keyword_variant_alternate Keyword_title_cybersecurityOperations" data-discover="true" href="/cybersecurity-operations">Cybersecurity Operations</a><div class="ContributorFocusedCard-TitleWrapper"><a class="ContributorFocusedCard-Title" data-testid="contributor-focused-card-title" data-discover="true" href="/cybersecurity-operations/closing-cybersecurity-career-diversity-gap">Closing the Cybersecurity Career Diversity Gap</a></div><div class="ContributorFocusedCard-Footer"><span class="ContributorFocusedCard-Date">Nov 25, 2024</span><div data-module="card-time" class="CardTime"><span class="CardTime-SeparatorLine">|</span><div data-component="article-read-time" class="ArticleReadTime ArticleReadTime_size_small CardTime-ReadTime"><span>6 Min<!-- --> <!-- -->Read</span></div></div></div></div></div></div><div class="ContentPreview LatestFeatured-ContentItem" data-module="content-preview" data-variant="contributor-focused"><div class="ContributorFocusedCard"><div class="ContributorFocusedCard-Wrapper"><div class="ContributorFocusedCard-Body"><a aria-label="Saša Zdjelar" data-discover="true" href="/author/sa-a-zdjelar"><span class="ContributorFocusedCard-ScreenReaderText">Picture of Saša Zdjelar</span><img aria-hidden="true" data-component="image" class="ContributorFocusedCard-Avatar" data-src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt72f244ca7124b703/673e4e9471136097dd20e7bb/Zdjelar-Family-173.jpg?width=150&auto=webp&quality=80&disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt72f244ca7124b703/673e4e9471136097dd20e7bb/Zdjelar-Family-173.jpg?width=150&auto=webp&quality=80&disable=upscale" loading="lazy" alt="" title=""/></a></div><div class="ContributorFocusedCard-InfoWrapper"><a class="ContributorFocusedCard-ContributorName" data-discover="true" href="/author/sa-a-zdjelar">Saša Zdjelar</a><p class="ContributorFocusedCard-ContributorTitle" data-testid="preview-contributor-title">Chief Trust Officer, ReversingLabs</p></div></div><div class="ContributorFocusedCard-ContentWrapper"><a data-component="keyword" class="Keyword Keyword_variant_alternate Keyword_title_vulnerabilitiesThreats" data-discover="true" href="/vulnerabilities-threats">Vulnerabilities & Threats</a><div class="ContributorFocusedCard-TitleWrapper"><a class="ContributorFocusedCard-Title" data-testid="contributor-focused-card-title" data-discover="true" href="/vulnerabilities-threats/going-beyond-secure-by-demand">Going Beyond Secure by Demand</a></div><div class="ContributorFocusedCard-Footer"><span class="ContributorFocusedCard-Date">Nov 22, 2024</span><div data-module="card-time" class="CardTime"><span class="CardTime-SeparatorLine">|</span><div data-component="article-read-time" class="ArticleReadTime ArticleReadTime_size_small CardTime-ReadTime"><span>5 Min<!-- --> <!-- -->Read</span></div></div></div></div></div></div><div class="ContentPreview LatestFeatured-ContentItem" data-module="content-preview" data-variant="contributor-focused"><div class="ContributorFocusedCard"><div class="ContributorFocusedCard-Wrapper"><div class="ContributorFocusedCard-Body"><a aria-label="Akhil Mittal" data-discover="true" href="/author/akhil-mittal"><span class="ContributorFocusedCard-ScreenReaderText">Picture of Akhil Mittal</span><img aria-hidden="true" data-component="image" class="ContributorFocusedCard-Avatar" data-src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt3446f06358b4db95/66fc440c97272d3e8e205cb0/IMG_3766.jpg?width=150&auto=webp&quality=80&disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt3446f06358b4db95/66fc440c97272d3e8e205cb0/IMG_3766.jpg?width=150&auto=webp&quality=80&disable=upscale" loading="lazy" alt="" title=""/></a></div><div class="ContributorFocusedCard-InfoWrapper"><a class="ContributorFocusedCard-ContributorName" data-discover="true" href="/author/akhil-mittal">Akhil Mittal</a><p class="ContributorFocusedCard-ContributorTitle" data-testid="preview-contributor-title">Senior Manager, Black Duck Software</p></div></div><div class="ContributorFocusedCard-ContentWrapper"><a data-component="keyword" class="Keyword Keyword_variant_alternate Keyword_title_cyberattacksDataBreaches" data-discover="true" href="/cyberattacks-data-breaches">Cyberattacks & Data Breaches</a><div class="ContributorFocusedCard-TitleWrapper"><a class="ContributorFocusedCard-Title" data-testid="contributor-focused-card-title" data-discover="true" href="/cyberattacks-data-breaches/cybersecurity-critical-breaches-disasters">Cybersecurity Is Critical, but Breaches Don't Have to Be Disasters</a></div><div class="ContributorFocusedCard-Footer"><span class="ContributorFocusedCard-Date">Nov 21, 2024</span><div data-module="card-time" class="CardTime"><span class="CardTime-SeparatorLine">|</span><div data-component="article-read-time" class="ArticleReadTime ArticleReadTime_size_small CardTime-ReadTime"><span>6 Min<!-- --> <!-- -->Read</span></div></div></div></div></div></div><div class="ContentPreview LatestFeatured-ContentItem" data-module="content-preview" data-variant="contributor-focused"><div class="ContributorFocusedCard"><div class="ContributorFocusedCard-Wrapper"><div class="ContributorFocusedCard-Body"><a aria-label="Michael Daniel" data-discover="true" href="/author/michael-daniel"><span class="ContributorFocusedCard-ScreenReaderText">Picture of Michael Daniel</span><img aria-hidden="true" data-component="image" class="ContributorFocusedCard-Avatar" data-src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/bltfa5d99e15abba65a/64f14ed523c23947c322b3a8/Michael_Daniel.jpg?width=150&auto=webp&quality=80&disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/bltfa5d99e15abba65a/64f14ed523c23947c322b3a8/Michael_Daniel.jpg?width=150&auto=webp&quality=80&disable=upscale" loading="lazy" alt="" title=""/></a></div><div class="ContributorFocusedCard-InfoWrapper"><a class="ContributorFocusedCard-ContributorName" data-discover="true" href="/author/michael-daniel">Michael Daniel</a><p class="ContributorFocusedCard-ContributorTitle" data-testid="preview-contributor-title">President & CEO, Cyber Threat Alliance</p></div></div><div class="ContributorFocusedCard-ContentWrapper"><a data-component="keyword" class="Keyword Keyword_variant_alternate Keyword_title_vulnerabilitiesThreats" data-discover="true" href="/vulnerabilities-threats">Vulnerabilities & Threats</a><div class="ContributorFocusedCard-TitleWrapper"><a class="ContributorFocusedCard-Title" data-testid="contributor-focused-card-title" data-discover="true" href="/vulnerabilities-threats/us-cyber-agencies-underfunded-problem">Small US Cyber Agencies Are Underfunded & That's a Problem</a></div><div class="ContributorFocusedCard-Footer"><span class="ContributorFocusedCard-Date">Nov 20, 2024</span><div data-module="card-time" class="CardTime"><span class="CardTime-SeparatorLine">|</span><div data-component="article-read-time" class="ArticleReadTime ArticleReadTime_size_small CardTime-ReadTime"><span>5 Min<!-- --> <!-- -->Read</span></div></div></div></div></div></div></div><a data-testid="list-content-more-content" class="LatestFeatured-Link LatestFeatured-Link_right" data-discover="true" href="/latest-commentary">More Commentary</a></div></div><div data-module="content-cards" class="ContentCards"><div class="ContentCards-CardsWrapper ContentCards-CardsWrapper_horizontal"><div class="ContentCards-Header ContentCards-Header_horizontal" data-testid="content-cards-header"><h3 class="ContentCards-Title" data-testid="contentCardsTitle">Startup Alley</h3><a class="ContentCards-Link" data-testid="content-card-link" data-discover="true" href="/program/dr-emerging-technology"><span class="ContentCards-LinkText" data-testid="contentCardsBreadcrumbsLinkTitle">Read More Startup Launches</span><span data-component="icon" data-name="ChevronRight" class="ContentCards-LinkIcon" style="mask-image:url(/build/_assets/ChevronRight-NHDKEYGJ.svg);-webkit-mask-image:url(/build/_assets/ChevronRight-NHDKEYGJ.svg);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain"></span></a></div><div class="ContentCards-Content ContentCards-Content_horizontal ContentCards-Content_right"><div class="ContentCards-ContentPreview ContentCards-ContentPreview_horizontal" data-testid="content-preview-horizontal"><div class="ContentPreview" data-module="content-preview" data-variant="card-horizontal"><div class="HorizontalCard"><div class="HorizontalCard-ImageWrapper"><a data-discover="true" href="/cybersecurity-operations/untitled"><span class="HorizontalCard-ImageScreenReaderText">Scene of blue skiy with wispy clouds</span><img data-component="image" class="HorizontalCard-Image" data-src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt13bf1affe8923637/67350f06072cb331ecd50aea/cloud-connections_Zoonar_GmbH_Alamy_Stock_Photo.jpg?width=300&auto=webp&quality=80&disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt13bf1affe8923637/67350f06072cb331ecd50aea/cloud-connections_Zoonar_GmbH_Alamy_Stock_Photo.jpg?width=300&auto=webp&quality=80&disable=upscale" loading="lazy" alt="" title=""/></a></div><div class="HorizontalCard-ContentWrapper"><div class="HorizontalCard-KeywordWrapper"><a data-component="keyword" class="Keyword Keyword_variant_alternate Keyword_title_cybersecurityOperations HorizontalCard-Keyword" data-discover="true" href="/cybersecurity-operations">Cybersecurity Operations</a></div><div class="HorizontalCard-TitleWrapper"><a class="HorizontalCard-Title" data-testid="preview-default-title" data-discover="true" href="/cybersecurity-operations/untitled">DeepTempo Launches AI-Based Security App for Snowflake</a></div><div class="HorizontalCard-MobileTitleWrapper"><a class="HorizontalCard-Title" data-testid="preview-mobile-title" data-discover="true" href="/cybersecurity-operations/untitled">DeepTempo Launches AI-Based Security App for Snowflake</a></div><p class="HorizontalCard-Date" data-testid="horizontalCardDate">Nov 20, 2024</p></div></div></div></div><div class="ContentCards-ContentPreview ContentCards-ContentPreview_horizontal" data-testid="content-preview-horizontal"><div class="ContentPreview" data-module="content-preview" data-variant="card-horizontal"><div class="HorizontalCard"><div class="HorizontalCard-ImageWrapper"><a data-discover="true" href="/cyber-risk/riig-launches-risk-intelligence-solutions"><span class="HorizontalCard-ImageScreenReaderText">A keyboard with a red key marked RISK</span><img data-component="image" class="HorizontalCard-Image" data-src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt2e083f08865b175c/66f2c37003ecc04ce5a19432/Risk(1800)-Olekcii_Mach_Alamy.jpg?width=300&auto=webp&quality=80&disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt2e083f08865b175c/66f2c37003ecc04ce5a19432/Risk(1800)-Olekcii_Mach_Alamy.jpg?width=300&auto=webp&quality=80&disable=upscale" loading="lazy" alt="" title=""/></a></div><div class="HorizontalCard-ContentWrapper"><div class="HorizontalCard-KeywordWrapper"><a data-component="keyword" class="Keyword Keyword_variant_alternate Keyword_title_cyberRisk HorizontalCard-Keyword" data-discover="true" href="/cyber-risk">Cyber Risk</a></div><div class="HorizontalCard-TitleWrapper"><a class="HorizontalCard-Title" data-testid="preview-default-title" data-discover="true" href="/cyber-risk/riig-launches-risk-intelligence-solutions">RIIG Launches With Risk Intelligence Solutions</a></div><div class="HorizontalCard-MobileTitleWrapper"><a class="HorizontalCard-Title" data-testid="preview-mobile-title" data-discover="true" href="/cyber-risk/riig-launches-risk-intelligence-solutions">RIIG Launches With Risk Intelligence Solutions</a></div><p class="HorizontalCard-Date" data-testid="horizontalCardDate">Nov 20, 2024</p></div></div></div></div><div class="ContentCards-ContentPreview ContentCards-ContentPreview_horizontal" data-testid="content-preview-horizontal"><div class="ContentPreview" data-module="content-preview" data-variant="card-horizontal"><div class="HorizontalCard"><div class="HorizontalCard-ImageWrapper"><a data-discover="true" href="/ics-ot-security/frenos-takes-home-prize-2024-datatribe-challenge"><span class="HorizontalCard-ImageScreenReaderText">a brass two-handled trophy against a red curtain in the background.</span><img data-component="image" class="HorizontalCard-Image" data-src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt25563b5d5c98516a/66f475229441d64a76fe188c/trophy1800_Zoonar_GmbH_alamy.jpg?width=300&auto=webp&quality=80&disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt25563b5d5c98516a/66f475229441d64a76fe188c/trophy1800_Zoonar_GmbH_alamy.jpg?width=300&auto=webp&quality=80&disable=upscale" loading="lazy" alt="" title=""/></a></div><div class="HorizontalCard-ContentWrapper"><div class="HorizontalCard-KeywordWrapper"><a data-component="keyword" class="Keyword Keyword_variant_alternate Keyword_title_icsOtSecurity HorizontalCard-Keyword" data-discover="true" href="/ics-ot-security">ICS/OT Security</a></div><div class="HorizontalCard-TitleWrapper"><a class="HorizontalCard-Title" data-testid="preview-default-title" data-discover="true" href="/ics-ot-security/frenos-takes-home-prize-2024-datatribe-challenge">Frenos Takes Home the Prize at 2024 DataTribe Challenge</a></div><div class="HorizontalCard-MobileTitleWrapper"><a class="HorizontalCard-Title" data-testid="preview-mobile-title" data-discover="true" href="/ics-ot-security/frenos-takes-home-prize-2024-datatribe-challenge">Frenos Takes Home the Prize at 2024 DataTribe Challenge</a></div><p class="HorizontalCard-Date" data-testid="horizontalCardDate">Nov 14, 2024</p></div></div></div></div></div></div></div><div data-module="feature-series" class="FeatureSeries" style="background-image:url("https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blte79004b68482621f/64f15091672f87c70214bb2d/109803_DR21_DREdge_Widget.jpg?width=800&format=png&auto=webp")"><div class="FeatureSeries-Content"><div class="FeatureSeries-ContentList FeatureSeries-ContentList_withBackground_https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blte79004b68482621f/64f15091672f87c70214bb2d/109803_DR21_DREdge_Widget.jpg"><div class="ListItem" data-testid="feature-list-item"><div class="ListItem-VariantWrapper"><a data-testid="list-item-title" class="ListItem-Title ListItem-Title_variant1" data-discover="true" href="/cybersecurity-operations/phishing-prevention-framework-reduces-incidents-by-half">Phishing Prevention Framework Reduces Incidents by Half</a><p class="ListItem-Description" data-testid="list-item-description">The anti-fraud plan calls for companies to create a pipeline for compiling attack information, along with formal processes to disseminate that intelligence across business groups.</p></div></div><div class="ListItem" data-testid="feature-list-item"><div class="ListItem-VariantWrapper"><a data-testid="list-item-title" class="ListItem-Title ListItem-Title_variant1" data-discover="true" href="/cybersecurity-operations/hiring-gap-not-talent-gap">What Talent Gap? Hiring Practices Are the Real Problem</a><p class="ListItem-Description" data-testid="list-item-description">While the need for cybersecurity talent still exists, the budget may not. Here's how to maximize security staff despite hiring freezes.</p></div></div><div class="ListItem" data-testid="feature-list-item"><div class="ListItem-VariantWrapper"><a data-testid="list-item-title" class="ListItem-Title ListItem-Title_variant1" data-discover="true" href="/endpoint-security/how-a-mental-health-non-profit-secure-systems-for-compassionate-care">How a Mental Health Nonprofit Secures Endpoints for Compassionate Care</a><p class="ListItem-Description" data-testid="list-item-description">Consolidating endpoint management boosts cybersecurity while keeping an Oklahoma-based nonprofit focused on community mental health.</p></div></div></div></div><div class="FeatureSeries-LogoSectionRoot"><div class="FeatureSeries-LogoSection"><div class="FeatureSeries-LogoWidth"><div class="FeatureSeries-LogoAspect"><a class="FeatureSeries-LogoLink" data-discover="true" href="/program/the-edge"><img data-component="image" class="FeatureSeries-Logo" data-src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt8e8148e5c072c2a4/653a7169d1bf76040a77cfc5/Dark_Reading_Logo_TheEdge_4C_rev.png?width=800&auto=webp&quality=80&disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt8e8148e5c072c2a4/653a7169d1bf76040a77cfc5/Dark_Reading_Logo_TheEdge_4C_rev.png?width=800&auto=webp&quality=80&disable=upscale" loading="lazy" alt="The Edge logo for Dark Reading, without the name of the sponsor." title="The Edge logo for Dark Reading, without the name of the sponsor."/></a></div></div><div class="FeatureSeries-LogoSectionContent"><p class="FeatureSeries-Description" data-testid="logo-description">Cybersecurity Features In-Depth: On security strategy, latest trends, and people to know. Brought to you by Mandiant.</p><div class="FeatureSeries-ActionsWrapper"><a class="FeatureSeries-CTA" rel="noreferrer" data-testid="cta-button" data-discover="true" href="/program/the-edge">Go to The Edge</a></div></div></div></div></div><div data-module="feature-series" class="FeatureSeries" style="background-image:url("https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt9c889327f44205d2/64f15090b3a30f6dca781e9c/109803_DR21_DRTechnology_Widget.jpg?width=800&format=png&auto=webp")"><div class="FeatureSeries-LogoSectionRoot"><div class="FeatureSeries-LogoSection"><div class="FeatureSeries-LogoWidth"><div class="FeatureSeries-LogoAspect"><a class="FeatureSeries-LogoLink" data-discover="true" href="/program/dr-technology"><img data-component="image" class="FeatureSeries-Logo" data-src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/bltc85414f028de9f36/653a7145cd6cfe040a2bae61/Dark_Reading_Logo_Technology_4C_rev.png?width=800&auto=webp&quality=80&disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/bltc85414f028de9f36/653a7145cd6cfe040a2bae61/Dark_Reading_Logo_Technology_4C_rev.png?width=800&auto=webp&quality=80&disable=upscale" loading="lazy" alt="DR Technology Logo" title="DR Technology Logo"/></a></div></div><div class="FeatureSeries-LogoSectionContent"><p class="FeatureSeries-Description" data-testid="logo-description">Security Technology: Featuring news, news analysis, and commentary on the latest technology trends. </p><div class="FeatureSeries-ActionsWrapper"><a class="FeatureSeries-CTA" rel="noreferrer" data-testid="cta-button" data-discover="true" href="/program/dr-technology">Go to DR Technology</a></div></div></div></div><div class="FeatureSeries-Content"><div class="FeatureSeries-ContentList FeatureSeries-ContentList_withBackground_https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt9c889327f44205d2/64f15090b3a30f6dca781e9c/109803_DR21_DRTechnology_Widget.jpg"><div class="ListItem" data-testid="feature-list-item"><div class="ListItem-VariantWrapper"><a data-testid="list-item-title" class="ListItem-Title ListItem-Title_variant1" data-discover="true" href="/endpoint-security/microsoft-releases-recall-windows-insider-preview">Microsoft Finally Releases Recall as Part of Windows Insider Preview</a><p class="ListItem-Description" data-testid="list-item-description">The preview version now includes multiple security-focused additions Microsoft had promised to add, such as SecureBoot, BitLocker, and Windows Hello.</p></div></div><div class="ListItem" data-testid="feature-list-item"><div class="ListItem-VariantWrapper"><a data-testid="list-item-title" class="ListItem-Title ListItem-Title_variant1" data-discover="true" href="/identity-access-management-security/aws-rolls-out-updates-to-amazon-cognito">AWS Rolls Out Updates to Amazon Cognito</a><p class="ListItem-Description" data-testid="list-item-description">Amazon Web Services' identity and access management platform has added new features that help developers implement secure, scalable, and customizable authentication solutions for their applications.</p></div></div><div class="ListItem" data-testid="feature-list-item"><div class="ListItem-VariantWrapper"><a data-testid="list-item-title" class="ListItem-Title ListItem-Title_variant1" data-discover="true" href="/cybersecurity-operations/phishing-prevention-framework-reduces-incidents-by-half">Phishing Prevention Framework Reduces Incidents by Half</a><p class="ListItem-Description" data-testid="list-item-description">The anti-fraud plan calls for companies to create a pipeline for compiling attack information, along with formal processes to disseminate that intelligence across business groups.</p></div></div></div></div></div><div data-module="feature-series" class="FeatureSeries" style="background-image:url("https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/bltb1db702ecb19a9df/655e23f4344e35040757bf35/DR_Global.png?width=800&format=png&auto=webp")"><div class="FeatureSeries-Content"><div class="FeatureSeries-ContentList FeatureSeries-ContentList_withBackground_https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/bltb1db702ecb19a9df/655e23f4344e35040757bf35/DR_Global.png"><div class="ListItem" data-testid="feature-list-item"><div class="ListItem-VariantWrapper"><a data-testid="list-item-title" class="ListItem-Title ListItem-Title_variant1" data-discover="true" href="/application-security/israel-defies-downturn-security-funding">Israel Defies VC Downturn With More Cybersecurity Investments</a><p class="ListItem-Description" data-testid="list-item-description">With a focus on creating technologies for other markets, Israel continues to be a valued destination for venture capital in cybersecurity outside the US and Europe.</p></div></div><div class="ListItem" data-testid="feature-list-item"><div class="ListItem-VariantWrapper"><a data-testid="list-item-title" class="ListItem-Title ListItem-Title_variant1" data-discover="true" href="/cyberattacks-data-breaches/yakuza-victim-data-leaked-japanese-attack">Yakuza Victim Data Leaked in Japanese Agency Attack</a><p class="ListItem-Description" data-testid="list-item-description">A local government resource for helping Japanese citizens cut ties with organized crime was successfully phished in a tech support scam, and could have dangerous consequences.</p></div></div><div class="ListItem" data-testid="feature-list-item"><div class="ListItem-VariantWrapper"><a data-testid="list-item-title" class="ListItem-Title ListItem-Title_variant1" data-discover="true" href="/cybersecurity-operations/endace-establishes-middle-east-regional-headquarters-in-saudi-arabia">Endace Establishes Middle East Regional Headquarters in Saudi Arabia</a><p class="ListItem-Description" data-testid="list-item-description"></p></div></div></div></div><div class="FeatureSeries-LogoSectionRoot"><div class="FeatureSeries-LogoSection"><div class="FeatureSeries-LogoWidth"><div class="FeatureSeries-LogoAspect"><a class="FeatureSeries-LogoLink" data-discover="true" href="/program/dr-global"><img data-component="image" class="FeatureSeries-Logo" data-src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt15692fbdc8091019/654e0d604ac254040aba8f01/Dark_Reading_Logo_Global_0.png?width=800&auto=webp&quality=80&disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt15692fbdc8091019/654e0d604ac254040aba8f01/Dark_Reading_Logo_Global_0.png?width=800&auto=webp&quality=80&disable=upscale" loading="lazy" alt="DR Global White on Black background" title="DR Global White on Black background"/></a></div></div><div class="FeatureSeries-LogoSectionContent"><p class="FeatureSeries-Description" data-testid="logo-description">Breaking cybersecurity news, news analysis, commentary, and other content from around the world.</p><div class="FeatureSeries-ActionsWrapper"><a class="FeatureSeries-CTA" rel="noreferrer" data-testid="cta-button" data-discover="true" href="/program/dr-global">Go to DR Global</a></div></div></div></div></div><div data-module="content-cards" class="ContentCards"><div class="ContentCards-CardsWrapper ContentCards-CardsWrapper_vertical"><div class="ContentCards-Header ContentCards-Header_vertical" data-testid="content-cards-header"><h3 class="ContentCards-Title" data-testid="contentCardsTitle">Press Releases</h3><a class="ContentCards-Link" data-testid="content-card-link" data-discover="true" href="/latest-press-release"><span class="ContentCards-LinkText" data-testid="contentCardsBreadcrumbsLinkTitle">See all</span><span data-component="icon" data-name="ChevronRight" class="ContentCards-LinkIcon" style="mask-image:url(/build/_assets/ChevronRight-NHDKEYGJ.svg);-webkit-mask-image:url(/build/_assets/ChevronRight-NHDKEYGJ.svg);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain"></span></a></div><div class="ContentCards-Content ContentCards-Content_vertical ContentCards-Content_none"><div class="ContentCards-ContentPreview ContentCards-ContentPreview_vertical" data-testid="content-preview-vertical"><div class="ContentPreview" data-module="content-preview" data-variant="card-vertical"><div class="ContentPreview-Wrapper ContentPreview-Wrapper_variant_cardVertical"><a data-testid="thumbnail" data-discover="true" href="/cloud-security/cyberratings-org-announces-test-results-cloud-service-provider-native-firewalls"><div class="ContentPreview-ImageContainer"><span data-testid="content-preview-screen-reader-text" class="ContentPreview-ImageScreenReaderText">PR logo</span><img data-testid="content-preview-image" data-component="image" class="ContentPreview-Image" data-src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt850556f866500627/654a5a8e05eb4d040a046894/325351_DR23_Graphics_General_Large_Text_v1.png?width=700&auto=webp&quality=80&disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt850556f866500627/654a5a8e05eb4d040a046894/325351_DR23_Graphics_General_Large_Text_v1.png?width=700&auto=webp&quality=80&disable=upscale" loading="lazy" alt="" title=""/></div></a><a data-component="keyword" class="Keyword Keyword_variant_standard Keyword_title_сloudSecurity ContentPreview-Category" data-discover="true" href="/cloud-security">Сloud Security</a><div class="VerticalCard"><div class="VerticalCard-Body"><a class="VerticalCard-Title VerticalCard-Title_displayOption_default" data-testid="preview-default-title" style="margin-bottom:0" data-discover="true" href="/cloud-security/cyberratings-org-announces-test-results-cloud-service-provider-native-firewalls">CyberRatings.org Announces Test Results for Cloud Service Provider Native Firewalls</a><a class="VerticalCard-Title VerticalCard-Title_displayOption_mobile" data-testid="preview-mobile-title" style="margin-bottom:0" data-discover="true" href="/cloud-security/cyberratings-org-announces-test-results-cloud-service-provider-native-firewalls">CyberRatings.org Announces Test Results for Cloud Service Provider Native Firewalls</a></div><div class="VerticalCard-Footer"><span class="VerticalCard-Date" data-testid="vertical-card-date">Nov 26, 2024</span><div data-module="card-time" class="CardTime"><div data-component="article-read-time" class="ArticleReadTime ArticleReadTime_size_small CardTime-ReadTime"><span>2 Min<!-- --> <!-- -->Read</span></div></div></div></div></div></div></div><div class="ContentCards-ContentPreview ContentCards-ContentPreview_vertical" data-testid="content-preview-vertical"><div class="ContentPreview" data-module="content-preview" data-variant="card-vertical"><div class="ContentPreview-Wrapper ContentPreview-Wrapper_variant_cardVertical"><a data-testid="thumbnail" data-discover="true" href="/application-security/cycognito-report-highlights-rising-cybersecurity-risks-holiday-e-commerce"><div class="ContentPreview-ImageContainer"><span data-testid="content-preview-screen-reader-text" class="ContentPreview-ImageScreenReaderText">PR logo</span><img data-testid="content-preview-image" data-component="image" class="ContentPreview-Image" data-src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt850556f866500627/654a5a8e05eb4d040a046894/325351_DR23_Graphics_General_Large_Text_v1.png?width=700&auto=webp&quality=80&disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt850556f866500627/654a5a8e05eb4d040a046894/325351_DR23_Graphics_General_Large_Text_v1.png?width=700&auto=webp&quality=80&disable=upscale" loading="lazy" alt="" title=""/></div></a><a data-component="keyword" class="Keyword Keyword_variant_standard Keyword_title_applicationSecurity ContentPreview-Category" data-discover="true" href="/application-security">Application Security</a><div class="VerticalCard"><div class="VerticalCard-Body"><a class="VerticalCard-Title VerticalCard-Title_displayOption_default" data-testid="preview-default-title" style="margin-bottom:0" data-discover="true" href="/application-security/cycognito-report-highlights-rising-cybersecurity-risks-holiday-e-commerce">CyCognito Report Highlights Rising Cybersecurity Risks in Holiday E-Commerce</a><a class="VerticalCard-Title VerticalCard-Title_displayOption_mobile" data-testid="preview-mobile-title" style="margin-bottom:0" data-discover="true" href="/application-security/cycognito-report-highlights-rising-cybersecurity-risks-holiday-e-commerce">CyCognito Report Highlights Rising Cybersecurity Risks in Holiday E-Commerce</a></div><div class="VerticalCard-Footer"><span class="VerticalCard-Date" data-testid="vertical-card-date">Nov 26, 2024</span><div data-module="card-time" class="CardTime"><div data-component="article-read-time" class="ArticleReadTime ArticleReadTime_size_small CardTime-ReadTime"><span>2 Min<!-- --> <!-- -->Read</span></div></div></div></div></div></div></div><div class="ContentCards-ContentPreview ContentCards-ContentPreview_vertical" data-testid="content-preview-vertical"><div class="ContentPreview" data-module="content-preview" data-variant="card-vertical"><div class="ContentPreview-Wrapper ContentPreview-Wrapper_variant_cardVertical"><a data-testid="thumbnail" data-discover="true" href="/cloud-security/study-finds-76-of-cybersecurity-professionals-believe-ai-should-be-heavily-regulated"><div class="ContentPreview-ImageContainer"><span data-testid="content-preview-screen-reader-text" class="ContentPreview-ImageScreenReaderText">PR Logo</span><img data-testid="content-preview-image" data-component="image" class="ContentPreview-Image" data-src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt850556f866500627/654a5a8e05eb4d040a046894/325351_DR23_Graphics_General_Large_Text_v1.png?width=700&auto=webp&quality=80&disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt850556f866500627/654a5a8e05eb4d040a046894/325351_DR23_Graphics_General_Large_Text_v1.png?width=700&auto=webp&quality=80&disable=upscale" loading="lazy" alt="" title=""/></div></a><a data-component="keyword" class="Keyword Keyword_variant_standard Keyword_title_сloudSecurity ContentPreview-Category" data-discover="true" href="/cloud-security">Сloud Security</a><div class="VerticalCard"><div class="VerticalCard-Body"><a class="VerticalCard-Title VerticalCard-Title_displayOption_default" data-testid="preview-default-title" style="margin-bottom:0" data-discover="true" href="/cloud-security/study-finds-76-of-cybersecurity-professionals-believe-ai-should-be-heavily-regulated">Study Finds 76% of Cybersecurity Professionals Believe AI Should Be Heavily Regulated</a><a class="VerticalCard-Title VerticalCard-Title_displayOption_mobile" data-testid="preview-mobile-title" style="margin-bottom:0" data-discover="true" href="/cloud-security/study-finds-76-of-cybersecurity-professionals-believe-ai-should-be-heavily-regulated">Study Finds 76% of Cybersecurity Professionals Believe AI Should Be Heavily Regulated</a></div><div class="VerticalCard-Footer"><span class="VerticalCard-Date" data-testid="vertical-card-date">Nov 21, 2024</span><div data-module="card-time" class="CardTime"><div data-component="article-read-time" class="ArticleReadTime ArticleReadTime_size_small CardTime-ReadTime"><span>3 Min<!-- --> <!-- -->Read</span></div></div></div></div></div></div></div><div class="ContentCards-ContentPreview ContentCards-ContentPreview_vertical" data-testid="content-preview-vertical"><div class="ContentPreview" data-module="content-preview" data-variant="card-vertical"><div class="ContentPreview-Wrapper ContentPreview-Wrapper_variant_cardVertical"><a data-testid="thumbnail" data-discover="true" href="/cybersecurity-operations/endace-establishes-middle-east-regional-headquarters-in-saudi-arabia"><div class="ContentPreview-ImageContainer"><span data-testid="content-preview-screen-reader-text" class="ContentPreview-ImageScreenReaderText">PR Logo</span><img data-testid="content-preview-image" data-component="image" class="ContentPreview-Image" data-src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt850556f866500627/654a5a8e05eb4d040a046894/325351_DR23_Graphics_General_Large_Text_v1.png?width=700&auto=webp&quality=80&disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt850556f866500627/654a5a8e05eb4d040a046894/325351_DR23_Graphics_General_Large_Text_v1.png?width=700&auto=webp&quality=80&disable=upscale" loading="lazy" alt="" title=""/></div></a><a data-component="keyword" class="Keyword Keyword_variant_standard Keyword_title_cybersecurityOperations ContentPreview-Category" data-discover="true" href="/cybersecurity-operations">Cybersecurity Operations</a><div class="VerticalCard"><div class="VerticalCard-Body"><a class="VerticalCard-Title VerticalCard-Title_displayOption_default" data-testid="preview-default-title" style="margin-bottom:0" data-discover="true" href="/cybersecurity-operations/endace-establishes-middle-east-regional-headquarters-in-saudi-arabia">Endace Establishes Middle East Regional Headquarters in Saudi Arabia</a><a class="VerticalCard-Title VerticalCard-Title_displayOption_mobile" data-testid="preview-mobile-title" style="margin-bottom:0" data-discover="true" href="/cybersecurity-operations/endace-establishes-middle-east-regional-headquarters-in-saudi-arabia">Endace Establishes Middle East Regional Headquarters in Saudi Arabia</a></div><div class="VerticalCard-Footer"><span class="VerticalCard-Date" data-testid="vertical-card-date">Nov 21, 2024</span><div data-module="card-time" class="CardTime"><div data-component="article-read-time" class="ArticleReadTime ArticleReadTime_size_small CardTime-ReadTime"><span>2 Min<!-- --> <!-- -->Read</span></div></div></div></div></div></div></div></div></div></div><div data-module="content-cards" class="ContentCards"><div class="ContentCards-CardsWrapper ContentCards-CardsWrapper_horizontal"><div class="ContentCards-Header ContentCards-Header_horizontal" data-testid="content-cards-header"><h3 class="ContentCards-Title" data-testid="contentCardsTitle">Partner Perspectives</h3><a class="ContentCards-Link" data-testid="content-card-link" data-discover="true" href="/keyword/partner-perspectives"><span class="ContentCards-LinkText" data-testid="contentCardsBreadcrumbsLinkTitle">More Partner Perspectives</span><span data-component="icon" data-name="ChevronRight" class="ContentCards-LinkIcon" style="mask-image:url(/build/_assets/ChevronRight-NHDKEYGJ.svg);-webkit-mask-image:url(/build/_assets/ChevronRight-NHDKEYGJ.svg);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain"></span></a></div><div class="ContentCards-Content ContentCards-Content_horizontal ContentCards-Content_none"><div class="ContentCards-ContentPreview ContentCards-ContentPreview_horizontal" data-testid="content-preview-horizontal"><div class="ContentPreview" data-module="content-preview" data-variant="card-horizontal"><div class="HorizontalCard"><div class="HorizontalCard-ImageWrapper"><a data-discover="true" href="/cybersecurity-operations/four-security-questions-to-ask-your-enterprise-generative-ai-provider"><span class="HorizontalCard-ImageScreenReaderText">cybersecurity meeting concept</span><img data-component="image" class="HorizontalCard-Image" data-src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt5c68ce2cd5715df5/66552a4009eeb9bc2bffa3a4/meeting-Prostock-studio-AlamyStockPhoto.jpg?width=300&auto=webp&quality=80&disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt5c68ce2cd5715df5/66552a4009eeb9bc2bffa3a4/meeting-Prostock-studio-AlamyStockPhoto.jpg?width=300&auto=webp&quality=80&disable=upscale" loading="lazy" alt="" title=""/></a></div><div class="HorizontalCard-ContentWrapper"><div class="HorizontalCard-KeywordWrapper"><a data-component="keyword" class="Keyword Keyword_variant_alternate Keyword_title_cybersecurityOperations HorizontalCard-Keyword" data-discover="true" href="/cybersecurity-operations">Cybersecurity Operations</a></div><div class="HorizontalCard-TitleWrapper"><a class="HorizontalCard-Title" data-testid="preview-default-title" data-discover="true" href="/cybersecurity-operations/four-security-questions-to-ask-your-enterprise-generative-ai-provider">4 Security Questions to Ask Your Enterprise Generative AI Provider</a></div><div class="HorizontalCard-MobileTitleWrapper"><a class="HorizontalCard-Title" data-testid="preview-mobile-title" data-discover="true" href="/cybersecurity-operations/four-security-questions-to-ask-your-enterprise-generative-ai-provider">4 Security Questions to Ask Your Enterprise Generative AI Provider</a></div><p class="HorizontalCard-Date" data-testid="horizontalCardDate">May 30, 2024</p></div></div></div></div><div class="ContentCards-ContentPreview ContentCards-ContentPreview_horizontal" data-testid="content-preview-horizontal"><div class="ContentPreview" data-module="content-preview" data-variant="card-horizontal"><div class="HorizontalCard"><div class="HorizontalCard-ImageWrapper"><a data-discover="true" href="/vulnerabilities-threats/looking-to-leverage-generative-ai-prep-for-success-with-these-4-tips"><span class="HorizontalCard-ImageScreenReaderText">Generative AI word cloud</span><img data-component="image" class="HorizontalCard-Image" data-src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt07309b91c116606b/65ca5364c31fbf040a5a0761/GenAI_MauriceNorbert_Alamy.jpg?width=300&auto=webp&quality=80&disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt07309b91c116606b/65ca5364c31fbf040a5a0761/GenAI_MauriceNorbert_Alamy.jpg?width=300&auto=webp&quality=80&disable=upscale" loading="lazy" alt="" title=""/></a></div><div class="HorizontalCard-ContentWrapper"><div class="HorizontalCard-KeywordWrapper"><a data-component="keyword" class="Keyword Keyword_variant_alternate Keyword_title_vulnerabilitiesThreats HorizontalCard-Keyword" data-discover="true" href="/vulnerabilities-threats">Vulnerabilities & Threats</a></div><div class="HorizontalCard-TitleWrapper"><a class="HorizontalCard-Title" data-testid="preview-default-title" data-discover="true" href="/vulnerabilities-threats/looking-to-leverage-generative-ai-prep-for-success-with-these-4-tips">Looking to Leverage Generative AI? Prep for Success With These 4 Tips</a></div><div class="HorizontalCard-MobileTitleWrapper"><a class="HorizontalCard-Title" data-testid="preview-mobile-title" data-discover="true" href="/vulnerabilities-threats/looking-to-leverage-generative-ai-prep-for-success-with-these-4-tips">Looking to Leverage Generative AI? Prep for Success With These 4 Tips</a></div><p class="HorizontalCard-Date" data-testid="horizontalCardDate">May 28, 2024</p></div></div></div></div><div class="ContentCards-ContentPreview ContentCards-ContentPreview_horizontal" data-testid="content-preview-horizontal"><div class="ContentPreview" data-module="content-preview" data-variant="card-horizontal"><div class="HorizontalCard"><div class="HorizontalCard-ImageWrapper"><a data-discover="true" href="/cyberattacks-data-breaches/asian-threat-actors-use-new-techniques-to-attack-familiar-targets"><span class="HorizontalCard-ImageScreenReaderText">Rows of computer monitors with skulls and crossbones indicating a cyberattack</span><img data-component="image" class="HorizontalCard-Image" data-src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt067891c8ed741073/64f16fb3095a7f672290fc51/Cyberattack_Skorzewiak_Alamy.jpg?width=300&auto=webp&quality=80&disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt067891c8ed741073/64f16fb3095a7f672290fc51/Cyberattack_Skorzewiak_Alamy.jpg?width=300&auto=webp&quality=80&disable=upscale" loading="lazy" alt="" title=""/></a></div><div class="HorizontalCard-ContentWrapper"><div class="HorizontalCard-KeywordWrapper"><a data-component="keyword" class="Keyword Keyword_variant_alternate Keyword_title_cyberattacksDataBreaches HorizontalCard-Keyword" data-discover="true" href="/cyberattacks-data-breaches">Cyberattacks & Data Breaches</a></div><div class="HorizontalCard-TitleWrapper"><a class="HorizontalCard-Title" data-testid="preview-default-title" data-discover="true" href="/cyberattacks-data-breaches/asian-threat-actors-use-new-techniques-to-attack-familiar-targets">Asian Threat Actors Use New Techniques to Attack Familiar Targets</a></div><div class="HorizontalCard-MobileTitleWrapper"><a class="HorizontalCard-Title" data-testid="preview-mobile-title" data-discover="true" href="/cyberattacks-data-breaches/asian-threat-actors-use-new-techniques-to-attack-familiar-targets">Asian Threat Actors Use New Techniques to Attack Familiar Targets</a></div><p class="HorizontalCard-Date" data-testid="horizontalCardDate">May 16, 2024</p></div></div></div></div><div class="ContentCards-ContentPreview ContentCards-ContentPreview_horizontal" data-testid="content-preview-horizontal"><div class="ContentPreview" data-module="content-preview" data-variant="card-horizontal"><div class="HorizontalCard"><div class="HorizontalCard-ImageWrapper"><a data-discover="true" href="/vulnerabilities-threats/how-to-red-team-genai-challenges-best-practices-and-learnings"><span class="HorizontalCard-ImageScreenReaderText">blue team against red team representing concept of red teaming using foosball table</span><img data-component="image" class="HorizontalCard-Image" data-src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt2d00b1e77d6b3e2d/64f1702f7de67f048f00e4b5/redteam-josefotograf-alamy.jpg?width=300&auto=webp&quality=80&disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt2d00b1e77d6b3e2d/64f1702f7de67f048f00e4b5/redteam-josefotograf-alamy.jpg?width=300&auto=webp&quality=80&disable=upscale" loading="lazy" alt="" title=""/></a></div><div class="HorizontalCard-ContentWrapper"><div class="HorizontalCard-KeywordWrapper"><a data-component="keyword" class="Keyword Keyword_variant_alternate Keyword_title_vulnerabilitiesThreats HorizontalCard-Keyword" data-discover="true" href="/vulnerabilities-threats">Vulnerabilities & Threats</a></div><div class="HorizontalCard-TitleWrapper"><a class="HorizontalCard-Title" data-testid="preview-default-title" data-discover="true" href="/vulnerabilities-threats/how-to-red-team-genai-challenges-best-practices-and-learnings">How to Red Team GenAI: Challenges, Best Practices, and Learnings</a></div><div class="HorizontalCard-MobileTitleWrapper"><a class="HorizontalCard-Title" data-testid="preview-mobile-title" data-discover="true" href="/vulnerabilities-threats/how-to-red-team-genai-challenges-best-practices-and-learnings">How to Red Team GenAI: Challenges, Best Practices, and Learnings</a></div><p class="HorizontalCard-Date" data-testid="horizontalCardDate">Apr 29, 2024</p></div></div></div></div><div class="ContentCards-ContentPreview ContentCards-ContentPreview_horizontal" data-testid="content-preview-horizontal"><div class="ContentPreview" data-module="content-preview" data-variant="card-horizontal"><div class="HorizontalCard"><div class="HorizontalCard-ImageWrapper"><a data-discover="true" href="/threat-intelligence/5-attack-trends-organizations-of-all-sizes-should-be-monitoring"><span class="HorizontalCard-ImageScreenReaderText">Five Darts Hit Bulls-Eye on Dart Board Competition. 4 darts are blue and one dart is red.</span><img data-component="image" class="HorizontalCard-Image" data-src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/bltcfccccca39d09213/662acbd7a4c41513c3efd064/5darts-YAY-Media-AS-Alamy-Stock-Photo.jpg?width=300&auto=webp&quality=80&disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/bltcfccccca39d09213/662acbd7a4c41513c3efd064/5darts-YAY-Media-AS-Alamy-Stock-Photo.jpg?width=300&auto=webp&quality=80&disable=upscale" loading="lazy" alt="" title=""/></a></div><div class="HorizontalCard-ContentWrapper"><div class="HorizontalCard-KeywordWrapper"><a data-component="keyword" class="Keyword Keyword_variant_alternate Keyword_title_threatIntelligence HorizontalCard-Keyword" data-discover="true" href="/threat-intelligence">Threat Intelligence</a></div><div class="HorizontalCard-TitleWrapper"><a class="HorizontalCard-Title" data-testid="preview-default-title" data-discover="true" href="/threat-intelligence/5-attack-trends-organizations-of-all-sizes-should-be-monitoring">5 Attack Trends Organizations of All Sizes Should Be Monitoring</a></div><div class="HorizontalCard-MobileTitleWrapper"><a class="HorizontalCard-Title" data-testid="preview-mobile-title" data-discover="true" href="/threat-intelligence/5-attack-trends-organizations-of-all-sizes-should-be-monitoring">5 Attack Trends Organizations of All Sizes Should Be Monitoring</a></div><p class="HorizontalCard-Date" data-testid="horizontalCardDate">Apr 25, 2024</p></div></div></div></div><div class="ContentCards-ContentPreview ContentCards-ContentPreview_horizontal" data-testid="content-preview-horizontal"><div class="ContentPreview" data-module="content-preview" data-variant="card-horizontal"><div class="HorizontalCard"><div class="HorizontalCard-ImageWrapper"><a data-discover="true" href="/cloud-security/why-a-native-first-approach-is-key-to-cloud-security"><span class="HorizontalCard-ImageScreenReaderText">Blue cloud with yellow closed padlock on technology background</span><img data-component="image" class="HorizontalCard-Image" data-src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt15fb1a33889ad369/661eec0fbbe2ba55868d05dc/cloud-security-padlock-Rasi-Bhadramani-Alamy.jpg?width=300&auto=webp&quality=80&disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt15fb1a33889ad369/661eec0fbbe2ba55868d05dc/cloud-security-padlock-Rasi-Bhadramani-Alamy.jpg?width=300&auto=webp&quality=80&disable=upscale" loading="lazy" alt="" title=""/></a></div><div class="HorizontalCard-ContentWrapper"><div class="HorizontalCard-KeywordWrapper"><a data-component="keyword" class="Keyword Keyword_variant_alternate Keyword_title_сloudSecurity HorizontalCard-Keyword" data-discover="true" href="/cloud-security">Сloud Security</a></div><div class="HorizontalCard-TitleWrapper"><a class="HorizontalCard-Title" data-testid="preview-default-title" data-discover="true" href="/cloud-security/why-a-native-first-approach-is-key-to-cloud-security">Why a Native-First Approach Is Key to Cloud Security</a></div><div class="HorizontalCard-MobileTitleWrapper"><a class="HorizontalCard-Title" data-testid="preview-mobile-title" data-discover="true" href="/cloud-security/why-a-native-first-approach-is-key-to-cloud-security">Why a Native-First Approach Is Key to Cloud Security</a></div><p class="HorizontalCard-Date" data-testid="horizontalCardDate">Apr 17, 2024</p></div></div></div></div></div></div></div><div data-module="resources" class="Resources"><div class="Resources-Header"><span class="Resources-Title" data-testid="resources-title">More Insights</span></div><div class="Resources-ContentWrapper"><div class="Resources-ItemWrapper"><div data-component="content-list" class="ContentList"><div class="ContentList-Header"><span data-component="icon" data-name="ChalkBoard" class="ContentList-Icon" style="mask-image:url(/build/_assets/ChalkBoard-7VYJPH3F.svg);-webkit-mask-image:url(/build/_assets/ChalkBoard-7VYJPH3F.svg);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain"></span><span class="ContentList-Title" data-testid="content-list-title">Webinars</span></div><ul class="ContentList-List"><li class="ContentList-ListItem"><a target="_blank" rel="nofollow" data-testid="content-list-item-title" href="https://dr-resources.darkreading.com/c/pubRD.mpl?secure=1&sr=pp&_t=pp:&qf=w_runz04&ch=SBX&cid=_upcoming_webinars_8.500001502&_mc=_upcoming_webinars_8.500001502"><p class="ContentList-ListItemTitle">The Unreasonable Effectiveness of Inside Out Attack Surface Management</p></a><span class="ContentList-ListItemDate ContentList-ListItemDate_webinar" data-testid="content-list-item-date">Dec 4, 2024</span></li></ul><div class="ContentList-CTAButton"><span data-component="button" role="presentation" class="Button Button_size_medium Button_variant_textLink"><span class="Button-ContentWrapper"><a class="ContentList-CTAText" rel="noreferrer" data-discover="true" href="/resources?types=Webinar" target="_blank">More Webinars</a></span><span data-component="icon" data-name="ChevronRight" class="Button-Icon Button-Icon_position_right" style="mask-image:url(/build/_assets/ChevronRight-NHDKEYGJ.svg);-webkit-mask-image:url(/build/_assets/ChevronRight-NHDKEYGJ.svg);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain"></span></span></div></div></div><div class="Resources-ItemWrapper"><div data-component="content-list" class="ContentList"><div class="ContentList-Header"><span data-component="icon" data-name="Date" class="ContentList-Icon" style="mask-image:url(/build/_assets/Date-KJRS72FO.svg);-webkit-mask-image:url(/build/_assets/Date-KJRS72FO.svg);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain"></span><span class="ContentList-Title" data-testid="content-list-title">Events</span></div><ul class="ContentList-List"><li class="ContentList-ListItem"><a target="_blank" rel="nofollow" data-testid="content-list-item-title" href="https://darkreading.tradepub.com/c/pubRD.mpl?secure=1&sr=pp&_t=pp:&qf=w_defa7201&ch=SBX&cid=_session_16.500326&_mc=_session_16.500326"><p class="ContentList-ListItemTitle">Cybersecurity Outlook 2025</p></a><span class="ContentList-ListItemDate" data-testid="content-list-item-date">Dec 5, 2024</span></li></ul><div class="ContentList-CTAButton"><span data-component="button" role="presentation" class="Button Button_size_medium Button_variant_textLink"><span class="Button-ContentWrapper"><a class="ContentList-CTAText" rel="noreferrer" data-discover="true" href="/events" target="_blank">More Events</a></span><span data-component="icon" data-name="ChevronRight" class="Button-Icon Button-Icon_position_right" style="mask-image:url(/build/_assets/ChevronRight-NHDKEYGJ.svg);-webkit-mask-image:url(/build/_assets/ChevronRight-NHDKEYGJ.svg);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain"></span></span></div></div></div></div></div></div></div></section><footer data-module="footer" class="Footer"><div class="Footer-Background"></div><div data-testid="logo" class="Footer-LogoContainer Footer-LogoContainer_length_2"><a data-discover="true" href="/"><img title="Logo" data-component="image" class="Footer-LogoImage Footer-LogoImage_length_2" data-src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt6aed714e279eeb34/6542104467527c040a9b2014/Logo_-_Dark_Reading.svg?width=700&auto=webp&quality=80&disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt6aed714e279eeb34/6542104467527c040a9b2014/Logo_-_Dark_Reading.svg?width=700&auto=webp&quality=80&disable=upscale" loading="lazy" alt="Logo"/></a></div><div data-testid="LinkSection" class="LinkSection LinkSection_length_2"><h5 class="LinkSection-Title" data-testid="link-section-title">Discover More With Informa Tech</h5><div class="LinkSection-LinksWrapper"><a class="LinkSection-Link" rel="noreferrer" data-discover="true" href="/program/black-hat" target="_blank">Black Hat</a><a class="LinkSection-Link" rel="noreferrer" data-discover="true" href="/program/omdia-cybersecurity" target="_blank">Omdia</a></div></div><div data-testid="LinkSection" class="LinkSection LinkSection_length_2"><h5 class="LinkSection-Title" data-testid="link-section-title">Working With Us</h5><div class="LinkSection-LinksWrapper"><a class="LinkSection-Link" data-discover="true" href="/about-us" target="_self">About Us</a><a class="LinkSection-Link" data-discover="true" href="/advertise" target="_self">Advertise</a><a class="LinkSection-Link" target="_blank" rel="noreferrer" href="https://info.wrightsmedia.com/informa-licensing-reprints-request">Reprints</a></div></div><div data-testid="registration" class="Footer-RegistrationWrapper"><div class="RegistrationSection RegistrationSection_linkSectionLength_2"><h5 class="RegistrationSection-Title">Join Us</h5><div class="Layout-Register Layout-Register_variant_footer"></div><div class="Layout-NewsLetter Layout-NewsLetter_variant_footer"><div data-module="newsletter-signup-promo"><a data-component="button" data-testid="footerNewsletterButton" class="Button Button_size_medium Button_variant_primaryFilled" href="https://dr-resources.darkreading.com/free/w_defa3135/prgm.cgi" target="_blank" rel="nofollow" data-name="subscribe-footer" data-action-type="sign-up"><span class="Button-ContentWrapper">Newsletter Sign-Up</span></a></div></div></div></div><div data-testid="social" class="SocialSection SocialSection_linkSectionLength_2"><h5 class="SocialSection-Title">Follow Us</h5><div data-component="social-share" class="SocialShare SocialShare_variant_layout"><a target="_blank" rel="noreferrer" aria-label="Twitter" href="https://twitter.com/DarkReading"><span class="SocialShare-IconWrapper SocialShare-IconWrapper_variant_layout"><span data-component="icon" data-name="Twitter" class="SocialShare-Icon SocialShare-Icon_variant_layout SocialShare-Icon_type_twitter" style="mask-image:url(/build/_assets/Twitter-WD5AOEQ7.svg);-webkit-mask-image:url(/build/_assets/Twitter-WD5AOEQ7.svg);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain"></span></span></a><a target="_blank" rel="noreferrer" aria-label="Linkedin" href="https://www.linkedin.com/company/dark-reading/"><span class="SocialShare-IconWrapper SocialShare-IconWrapper_variant_layout"><span data-component="icon" data-name="Linkedin" class="SocialShare-Icon SocialShare-Icon_variant_layout SocialShare-Icon_type_linkedin" style="mask-image:url(/build/_assets/Linkedin-VQUF3EEQ.svg);-webkit-mask-image:url(/build/_assets/Linkedin-VQUF3EEQ.svg);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain"></span></span></a><a target="_blank" rel="noreferrer" aria-label="Facebook" href="https://www.facebook.com/darkreadingcom/"><span class="SocialShare-IconWrapper SocialShare-IconWrapper_variant_layout"><span data-component="icon" data-name="Facebook" class="SocialShare-Icon SocialShare-Icon_variant_layout SocialShare-Icon_type_facebook" style="mask-image:url(/build/_assets/Facebook-CJB5G2HY.svg);-webkit-mask-image:url(/build/_assets/Facebook-CJB5G2HY.svg);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain"></span></span></a><a target="_blank" rel="noreferrer" aria-label="Youtube" href="https://www.youtube.com/@DarkReadingOfficialYT"><span class="SocialShare-IconWrapper SocialShare-IconWrapper_variant_layout"><span data-component="icon" data-name="Youtube" class="SocialShare-Icon SocialShare-Icon_variant_layout SocialShare-Icon_type_youtube" style="mask-image:url(/build/_assets/Youtube-S4PSC4UA.svg);-webkit-mask-image:url(/build/_assets/Youtube-S4PSC4UA.svg);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain"></span></span></a><a target="_blank" rel="noreferrer" aria-label="RSS" href="https://www.darkreading.com/rss.xml"><span class="SocialShare-IconWrapper SocialShare-IconWrapper_variant_layout"><span data-component="icon" data-name="RSS" class="SocialShare-Icon SocialShare-Icon_variant_layout SocialShare-Icon_type_rss" style="mask-image:url(/build/_assets/RSS-3XFHIVCK.svg);-webkit-mask-image:url(/build/_assets/RSS-3XFHIVCK.svg);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain"></span></span></a><a target="_blank" rel="noreferrer" aria-label="GoogleNews" href="https://news.google.com/publications/CAAqBwgKMKmknwswtq63Aw?ceid=US:en&oc=3&hl=en-US&gl=US"><span class="SocialShare-IconWrapper SocialShare-IconWrapper_variant_layout"><span data-component="icon" data-name="GoogleNews" class="SocialShare-Icon SocialShare-Icon_variant_layout SocialShare-Icon_type_googleNews" style="mask-image:url(/build/_assets/GoogleNews-6O72APW7.svg);-webkit-mask-image:url(/build/_assets/GoogleNews-6O72APW7.svg);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain"></span></span></a></div></div><div class="CopyrightsSection"><div class="CopyrightsSection-Background"></div><div data-testid="copyrights" class="CopyrightsSection-Wrapper"><a data-testid="businessUnit" class="CopyrightsSection-BusinessLink" target="_blank" href="https://www.informatech.com"><img title="Informa Tech" data-component="image" class="CopyrightsSection-BusinessImage" data-src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blte88e1a0b459f2cef/6500460020e2ed10ea731cb1/InformaTechBTYB_240x60.webp?width=700&auto=webp&quality=80&disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blte88e1a0b459f2cef/6500460020e2ed10ea731cb1/InformaTechBTYB_240x60.webp?width=700&auto=webp&quality=80&disable=upscale" loading="lazy" alt="Informa Tech"/></a><div class="CopyrightsSection-TextWrapper"><p data-testid="copyrightText" class="CopyrightsSection-Text"><span class="CopyrightsSection-TextBlock"></span>Copyright © 2024 Informa PLC Informa UK Limited is a company registered in England and Wales with company number 1072954 whose registered office is 5 Howick Place, London, SW1P 1WG.</p><div data-testid="copyrightLinks" class="CopyrightsSection-LinksWrapper CopyrightsSection-LinksWrapper_hasLinks"><a class="CopyrightsSection-Link" rel="noreferrer" target="_blank" href="https://www.informatech.com/">Home<span class="CopyrightsSection-LinkSeparator">|</span></a><a class="CopyrightsSection-Link" rel="noreferrer" data-discover="true" href="/cookie-policy" target="_blank">Cookie Policy<span class="CopyrightsSection-LinkSeparator">|</span></a><a class="CopyrightsSection-Link" rel="noreferrer" target="_blank" href="https://www.informa.com/privacy-policy/">Privacy<span class="CopyrightsSection-LinkSeparator">|</span></a><a class="CopyrightsSection-Link" rel="noreferrer" target="_blank" href="https://www.informatech.com/terms-and-conditions/">Terms of Use</a></div></div></div></div></footer></div></div></main><script>((STORAGE_KEY, restoreKey) => { if (!window.history.state || !window.history.state.key) { let key = Math.random().toString(32).slice(2); window.history.replaceState({ key }, ""); } try { let positions = JSON.parse(sessionStorage.getItem(STORAGE_KEY) || "{}"); let storedY = positions[restoreKey || window.history.state.key]; if (typeof storedY === "number") { window.scrollTo(0, storedY); } } catch (error) { console.error(error); sessionStorage.removeItem(STORAGE_KEY); } })("positions", null)</script><link rel="modulepreload" href="/build/manifest-A2F38A42.js"/><link rel="modulepreload" href="/build/entry.client-SFHSSSEN.js"/><link rel="modulepreload" href="/build/_shared/chunk-RVHE4U6B.js"/><link rel="modulepreload" href="/build/_shared/chunk-SJXV5VAW.js"/><link rel="modulepreload" href="/build/_shared/chunk-63EVRDSK.js"/><link rel="modulepreload" href="/build/_shared/chunk-ADMCF34Z.js"/><link rel="modulepreload" href="/build/_shared/chunk-QLNIWV7P.js"/><link rel="modulepreload" href="/build/_shared/chunk-VAILQJN5.js"/><link rel="modulepreload" href="/build/_shared/chunk-RZRUW7QG.js"/><link rel="modulepreload" href="/build/_shared/chunk-3MIG7PUI.js"/><link rel="modulepreload" href="/build/_shared/chunk-B7M2L5OV.js"/><link rel="modulepreload" href="/build/_shared/chunk-JWYSME77.js"/><link rel="modulepreload" href="/build/_shared/chunk-JRHR4PP4.js"/><link rel="modulepreload" href="/build/_shared/chunk-WTDTITBY.js"/><link rel="modulepreload" href="/build/_shared/chunk-VZQVWFLO.js"/><link rel="modulepreload" href="/build/_shared/chunk-4PCUPHYO.js"/><link rel="modulepreload" href="/build/_shared/chunk-JERMOH2I.js"/><link rel="modulepreload" href="/build/_shared/chunk-265XATAY.js"/><link rel="modulepreload" href="/build/_shared/chunk-5JUJG2OP.js"/><link rel="modulepreload" href="/build/_shared/chunk-BC6KZFPP.js"/><link rel="modulepreload" href="/build/_shared/chunk-QVUW3IXO.js"/><link rel="modulepreload" href="/build/_shared/chunk-ALTNKHHR.js"/><link rel="modulepreload" href="/build/_shared/chunk-HMGGHMSJ.js"/><link rel="modulepreload" href="/build/_shared/chunk-IW54JVOH.js"/><link rel="modulepreload" href="/build/root-TPDAOOC5.js"/><link rel="modulepreload" href="/build/_shared/chunk-B7N643NL.js"/><link rel="modulepreload" href="/build/_shared/chunk-RF3GAYWA.js"/><link rel="modulepreload" href="/build/_shared/chunk-JM7IRZAX.js"/><link rel="modulepreload" href="/build/_shared/chunk-7IHSV4VV.js"/><link rel="modulepreload" href="/build/_shared/chunk-PLHCH5TH.js"/><link rel="modulepreload" href="/build/_shared/chunk-3NMSOMAP.js"/><link rel="modulepreload" href="/build/_shared/chunk-7WX3BG7O.js"/><link rel="modulepreload" href="/build/_shared/chunk-2Q3IQPTU.js"/><link rel="modulepreload" href="/build/_shared/chunk-B765HE7O.js"/><link rel="modulepreload" href="/build/_shared/chunk-4DPVJM62.js"/><link rel="modulepreload" href="/build/_shared/chunk-PHSYQFSR.js"/><link rel="modulepreload" href="/build/_shared/chunk-GGO4FWBQ.js"/><link rel="modulepreload" href="/build/_shared/chunk-N3DN6AS5.js"/><link rel="modulepreload" href="/build/_shared/chunk-TDM4RAGW.js"/><link rel="modulepreload" href="/build/routes/_index-5CINTQR2.js"/><script>window.__remixContext = {"future":{"v3_fetcherPersist":false,"v3_relativeSplatPath":false,"v3_throwAbortReason":false},"state":{"loaderData":{"root":{"brand":"darkreading","authenticationStatus":"anonymous","siteName":"Dark Reading","ads":{"networkId":3834,"parentAdUnit":"darkreading.home","enabledAds":"all","checkClientIP":false,"disableSponsorBar":true},"authConfig":{"enabled":false,"disableCaptcha":false},"isDctsTurnOn":false,"oneTrust":{"siteId":"4b083961-e2ac-4755-8801-f7c83a5fb187"},"gtmIds":{"primary":"GTM-5523ZCM","secondary":"GTM-WB8Q7XR"},"pageContent":{"registrationText":"Learn about New Cybersecurity Threats, Vulnerabilities and Technology Trends."},"ui":{"brand":"darkreading","theme":"theme1","font":{"primary":{"name":"Inter","url":"https://fonts.googleapis.com/css2?family=Inter:wght@100;200;300;400;500;600;700;800;900\u0026display=swap"},"secondary":{"name":"Inter","url":"https://fonts.googleapis.com/css2?family=Inter:wght@100;200;300;400;500;600;700;800;900\u0026display=swap"}}},"environment":"prod","featureToggles":{"elnNewsletter":false,"elnWithoutNewsletter":false,"iirisAuthentication":false,"subBrand":false,"useSettingsRedirectAPIVersion1":false,"gatingEnabled":false,"iirisRecommendationDisabled":false,"iasPetEnabled":true,"bridgedMediaEnabled":true,"ecommerceEnabled":false,"iirisRecommendationVer":"version4","weather3MonthForecastEnabled":false,"legacyHomepage":false},"layout":{"socialLinks":[{"type":"Twitter","url":"https://twitter.com/DarkReading"},{"type":"Linkedin","url":"https://www.linkedin.com/company/dark-reading/"},{"type":"Facebook","url":"https://www.facebook.com/darkreadingcom/"},{"type":"Youtube","url":"https://www.youtube.com/@DarkReadingOfficialYT"},{"type":"RSS","url":"https://www.darkreading.com/rss.xml"},{"type":"GoogleNews","url":"https://news.google.com/publications/CAAqBwgKMKmknwswtq63Aw?ceid=US:en\u0026oc=3\u0026hl=en-US\u0026gl=US"}],"informaBar":{"enabled":true,"leftSection":{"description":"Dark Reading is part of the Informa Tech Division of Informa PLC","subMenu":[{"title":"Informa PLC","url":"https://www.informa.com/"},{"title":"ABOUT US","url":"https://www.informa.com/about-us/"},{"title":"INVESTOR RELATIONS","url":"https://www.informa.com/investors/"},{"title":"TALENT","url":"https://www.informa.com/talent/"}]},"rightSection":{"description":"This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales and Scotlan. Number 8860726."}},"nav":{"mainMenuItems":[{"title":"Cybersecurity Topics","url":"","seeAllLink":"","seeAllLinkUrl":"","hasSubMenu":true,"subMenu":[{"title":"Application Security","url":"/application-security"},{"title":"Cybersecurity Careers","url":"/cybersecurity-operations/cybersecurity-careers"},{"title":"Cloud Security","url":"/cloud-security"},{"title":"Cyber Risk","url":"/cyber-risk"},{"title":"Cyberattacks \u0026 Data Breaches","url":"/cyberattacks-data-breaches"},{"title":"Cybersecurity Analytics","url":"/cybersecurity-analytics"},{"title":"Cybersecurity Operations","url":"/cybersecurity-operations"},{"title":"Data Privacy","url":"/cyber-risk/data-privacy"},{"title":"Endpoint Security","url":"/endpoint-security"},{"title":"ICS/OT Security","url":"/ics-ot-security"},{"title":"Identity \u0026 Access Mgmt Security","url":"/cybersecurity-operations/identity-access-management-security"},{"title":"Insider Threats","url":"/vulnerabilities-threats/insider-threats"},{"title":"IoT","url":"/ics-ot-security/iot"},{"title":"Mobile Security","url":"/endpoint-security/mobile-security"},{"title":"Perimeter","url":"/cybersecurity-operations/perimeter"},{"title":"Physical Security","url":"/cybersecurity-operations/physical-security"},{"title":"Remote Workforce","url":"/endpoint-security/remote-workforce"},{"title":"Threat Intelligence","url":"/threat-intelligence"},{"title":"Vulnerabilities \u0026 Threats","url":"/vulnerabilities-threats"}],"recentContents":[]},{"title":"World ","url":"/program/dr-global","seeAllLink":"See All","seeAllLinkUrl":"/program/dr-global","hasSubMenu":true,"subMenu":[{"title":"DR Global","url":"/program/dr-global"},{"title":"Middle East \u0026 Africa","url":"/keyword/middle-east-africa"},{"title":"Asia Pacific","url":"/keyword/asia-pacific"}],"recentContents":[]},{"title":"The Edge","url":"/program/the-edge","seeAllLink":"","seeAllLinkUrl":"/program/the-edge","hasSubMenu":false,"subMenu":[],"recentContents":[]},{"title":"DR Technology","url":"/program/dr-technology","seeAllLink":"","seeAllLinkUrl":"/program/dr-technology","hasSubMenu":false,"subMenu":[],"recentContents":[]},{"title":"Events","url":"/events","seeAllLink":"SEE ALL","seeAllLinkUrl":"/events","hasSubMenu":true,"subMenu":[{"title":"Upcoming Events","url":"/events"},{"title":"Podcasts","url":"/podcasts"},{"title":"Webinars","url":"/resources?types=Webinar"}],"recentContents":[]},{"title":"Resources","url":"/resources","seeAllLink":"SEE ALL","seeAllLinkUrl":"/resources","hasSubMenu":true,"subMenu":[{"title":"Library","url":"/resources"},{"title":"Newsletters","url":"https://dr-resources.darkreading.com/free/w_defa3135/prgm.cgi"},{"title":"Podcasts","url":"/podcasts"},{"title":"Reports","url":"/resources?types=Report"},{"title":"Videos","url":"/videos"},{"title":"Webinars","url":"/resources?types=Webinar"},{"title":"Whitepapers","url":"/resources?types=Whitepaper"},{"title":" ","url":" "},{"title":" ","url":" "},{"title":" ","url":" "},{"title":" ","url":" "},{"title":"Partner Perspectives","url":"/keyword/partner-perspectives"}],"recentContents":[]}],"secondaryMenu":[{"title":"Black Hat News","url":"/program/black-hat"},{"title":"Omdia Cybersecurity","url":"/program/omdia-cybersecurity"},{"title":"Advertise","url":"https://reg.darkreading.com/media-kit?kcode=drsitehd"}]},"megaMenu":{"largeMenu":[{"title":"Cybersecurity Topics","url":"","subMenu":[{"title":"Application Security","url":"/application-security"},{"title":"Cybersecurity Careers","url":"/cybersecurity-operations/cybersecurity-careers"},{"title":"Cloud Security","url":"/cloud-security"},{"title":"Cyber Risk","url":"/cyber-risk"},{"title":"Cyberattacks \u0026 Data Breaches","url":"/cyberattacks-data-breaches"},{"title":"Cybersecurity Analytics","url":"/cybersecurity-analytics"},{"title":"Cybersecurity Operations","url":"/cybersecurity-operations"},{"title":"Data Privacy","url":"/cyber-risk/data-privacy"},{"title":"Endpoint Security","url":"/endpoint-security"},{"title":"ICS/OT Security","url":"/ics-ot-security"},{"title":"Identity \u0026 Access Mgmt Security","url":"/cybersecurity-operations/identity-access-management-security"},{"title":"Insider Threats","url":"/vulnerabilities-threats/insider-threats"},{"title":"IoT","url":"/ics-ot-security/iot"},{"title":"Mobile Security","url":"/endpoint-security/mobile-security"},{"title":"Perimeter","url":"/cybersecurity-operations/perimeter"},{"title":"Physical Security","url":"/cybersecurity-operations/physical-security"},{"title":"Remote Workforce","url":"/endpoint-security/remote-workforce"},{"title":"Threat Intelligence","url":"/threat-intelligence"},{"title":"Vulnerabilities \u0026 Threats","url":"/vulnerabilities-threats"}],"seeAllLink":"","seeAllLinkUrl":""},{"title":"World ","url":"/program/dr-global","subMenu":[{"title":"DR Global","url":"/program/dr-global"},{"title":"Middle East \u0026 Africa","url":"/keyword/middle-east-africa"},{"title":"Asia Pacific","url":"/keyword/asia-pacific"}],"seeAllLink":"See All","seeAllLinkUrl":"/program/dr-global"},{"title":"The Edge","url":"/program/the-edge","subMenu":[],"seeAllLink":"","seeAllLinkUrl":"/program/the-edge"},{"title":"DR Technology","url":"/program/dr-technology","subMenu":[],"seeAllLink":"","seeAllLinkUrl":"/program/dr-technology"},{"title":"Events","url":"/events","subMenu":[{"title":"Upcoming Events","url":"/events"},{"title":"Podcasts","url":"/podcasts"},{"title":"Webinars","url":"/resources?types=Webinar"}],"seeAllLink":"SEE ALL","seeAllLinkUrl":"/events"},{"title":"Resources","url":"/resources","subMenu":[{"title":"Library","url":"/resources"},{"title":"Newsletters","url":"https://dr-resources.darkreading.com/free/w_defa3135/prgm.cgi"},{"title":"Podcasts","url":"/podcasts"},{"title":"Reports","url":"/resources?types=Report"},{"title":"Videos","url":"/videos"},{"title":"Webinars","url":"/resources?types=Webinar"},{"title":"Whitepapers","url":"/resources?types=Whitepaper"},{"title":" ","url":" "},{"title":" ","url":" "},{"title":" ","url":" "},{"title":" ","url":" "},{"title":"Partner Perspectives","url":"/keyword/partner-perspectives"}],"seeAllLink":"SEE ALL","seeAllLinkUrl":"/resources"}],"smallMenu":[{"title":"Resources","url":"","subMenu":[]},{"title":"More","url":"","subMenu":[{"title":"About Us","url":"/about-us"},{"title":"Advertise With Us","url":"/advertise"},{"title":"Submissions","url":"/cyberattacks-data-breaches/how-to-submit-a-column-to-dark-reading"}]}],"sideNavSections":[]},"navBase":{"logo":{"url":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blte9ead971f13c662e/65437029846d7c040a6e588d/Logo_-_Dark_Reading.svg","altText":"Dark Reading Logo"}},"footer":{"logo":{"url":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt6aed714e279eeb34/6542104467527c040a9b2014/Logo_-_Dark_Reading.svg","altText":"Logo"},"linkSections":[{"links":[{"image":{"altText":"","url":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt39752b9f502ed723/65004ef460832757db397d3a/Dark_Reading_Logo_Stacked_K.png"},"openInNewTab":true,"title":"Black Hat","url":"/program/black-hat"},{"image":{"altText":"","url":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt39752b9f502ed723/65004ef460832757db397d3a/Dark_Reading_Logo_Stacked_K.png"},"openInNewTab":true,"title":"Omdia","url":"/program/omdia-cybersecurity"}],"title":"Discover More With Informa Tech","type":"1"},{"links":[{"image":{"altText":"","url":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt64bc80c1cc860f0e/64ff3af37434dc8f904db946/Dark_Reading_Logo_0_200px.png"},"openInNewTab":false,"title":"About Us","url":"/about-us"},{"image":{"altText":"","url":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt9a23e12b46e10b76/64ff3b08f7b4013e16a3d26a/Dark_Reading_Logo_0_200px.png"},"openInNewTab":false,"title":"Advertise","url":"/advertise"},{"image":{"altText":"","url":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt7b65ada713568986/64ff3bd1abb8d8128a7762bd/Dark_Reading_Logo_0_200px.png"},"openInNewTab":true,"title":"Reprints","url":"https://info.wrightsmedia.com/informa-licensing-reprints-request"}],"title":"Working With Us","type":"1"}],"brandLinks":[],"copyright":{"businessUnit":{"url":"https://www.informatech.com","name":"Informa Tech","logoUrl":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blte88e1a0b459f2cef/6500460020e2ed10ea731cb1/InformaTechBTYB_240x60.webp"},"links":[{"image":{"altText":"Home","url":"https://www.informatech.com/"},"openInNewTab":true,"title":"Home","url":"https://www.informatech.com/"},{"image":{"altText":"Cookie Policy","url":"/cookie-policy"},"openInNewTab":true,"title":"Cookie Policy","url":"/cookie-policy"},{"image":{"altText":"Privacy","url":"https://www.informa.com/privacy-policy/"},"openInNewTab":true,"title":"Privacy","url":"https://www.informa.com/privacy-policy/"},{"image":{"altText":"Terms of Use","url":"https://www.informatech.com/terms-and-conditions/"},"openInNewTab":true,"title":"Terms of Use","url":"https://www.informatech.com/terms-and-conditions/"}],"title":" Informa PLC Informa UK Limited is a company registered in England and Wales with company number 1072954 whose registered office is 5 Howick Place, London, SW1P 1WG."}},"isSponsorBarEnabled":true,"isPaidContent":false},"newRelicJs":"window.NREUM||(NREUM={});NREUM.init={distributed_tracing:{enabled:true},privacy:{cookies_enabled:true},ajax:{deny_list:[\"bam.eu01.nr-data.net\"]}};\n\n;NREUM.loader_config={accountID:\"3936348\",trustKey:\"3288925\",agentID:\"538600199\",licenseKey:\"NRJS-26ae6a3b09493bbcc87\",applicationID:\"538600199\"};\n;NREUM.info={beacon:\"bam.eu01.nr-data.net\",errorBeacon:\"bam.eu01.nr-data.net\",licenseKey:\"NRJS-26ae6a3b09493bbcc87\",applicationID:\"538600199\",sa:1};\n;/*! For license information please see nr-loader-spa-1.274.0.min.js.LICENSE.txt */\n(()=\u003e{var e,t,r={8122:(e,t,r)=\u003e{\"use strict\";r.d(t,{a:()=\u003ei});var n=r(944);function i(e,t){try{if(!e||\"object\"!=typeof e)return(0,n.R)(3);if(!t||\"object\"!=typeof t)return(0,n.R)(4);const r=Object.create(Object.getPrototypeOf(t),Object.getOwnPropertyDescriptors(t)),o=0===Object.keys(r).length?e:r;for(let a in o)if(void 0!==e[a])try{if(null===e[a]){r[a]=null;continue}Array.isArray(e[a])\u0026\u0026Array.isArray(t[a])?r[a]=Array.from(new Set([...e[a],...t[a]])):\"object\"==typeof e[a]\u0026\u0026\"object\"==typeof t[a]?r[a]=i(e[a],t[a]):r[a]=e[a]}catch(e){(0,n.R)(1,e)}return r}catch(e){(0,n.R)(2,e)}}},2555:(e,t,r)=\u003e{\"use strict\";r.d(t,{Vp:()=\u003ec,fn:()=\u003es,x1:()=\u003eu});var n=r(384),i=r(8122);const o={beacon:n.NT.beacon,errorBeacon:n.NT.errorBeacon,licenseKey:void 0,applicationID:void 0,sa:void 0,queueTime:void 0,applicationTime:void 0,ttGuid:void 0,user:void 0,account:void 0,product:void 0,extra:void 0,jsAttributes:{},userAttributes:void 0,atts:void 0,transactionName:void 0,tNamePlain:void 0},a={};function s(e){try{const t=c(e);return!!t.licenseKey\u0026\u0026!!t.errorBeacon\u0026\u0026!!t.applicationID}catch(e){return!1}}function c(e){if(!e)throw new Error(\"All info objects require an agent identifier!\");if(!a[e])throw new Error(\"Info for \".concat(e,\" was never set\"));return a[e]}function u(e,t){if(!e)throw new Error(\"All info objects require an agent identifier!\");a[e]=(0,i.a)(t,o);const r=(0,n.nY)(e);r\u0026\u0026(r.info=a[e])}},9417:(e,t,r)=\u003e{\"use strict\";r.d(t,{D0:()=\u003eh,gD:()=\u003eg,xN:()=\u003ep});var n=r(993);const i=e=\u003e{if(!e||\"string\"!=typeof e)return!1;try{document.createDocumentFragment().querySelector(e)}catch{return!1}return!0};var o=r(2614),a=r(944),s=r(384),c=r(8122);const u=\"[data-nr-mask]\",d=()=\u003e{const e={mask_selector:\"*\",block_selector:\"[data-nr-block]\",mask_input_options:{color:!1,date:!1,\"datetime-local\":!1,email:!1,month:!1,number:!1,range:!1,search:!1,tel:!1,text:!1,time:!1,url:!1,week:!1,textarea:!1,select:!1,password:!0}};return{ajax:{deny_list:void 0,block_internal:!0,enabled:!0,harvestTimeSeconds:10,autoStart:!0},distributed_tracing:{enabled:void 0,exclude_newrelic_header:void 0,cors_use_newrelic_header:void 0,cors_use_tracecontext_headers:void 0,allowed_origins:void 0},feature_flags:[],generic_events:{enabled:!0,harvestTimeSeconds:30,autoStart:!0},harvest:{tooManyRequestsDelay:60},jserrors:{enabled:!0,harvestTimeSeconds:10,autoStart:!0},logging:{enabled:!0,harvestTimeSeconds:10,autoStart:!0,level:n.p_.INFO},metrics:{enabled:!0,autoStart:!0},obfuscate:void 0,page_action:{enabled:!0},page_view_event:{enabled:!0,autoStart:!0},page_view_timing:{enabled:!0,harvestTimeSeconds:30,autoStart:!0},performance:{capture_marks:!1,capture_measures:!1},privacy:{cookies_enabled:!0},proxy:{assets:void 0,beacon:void 0},session:{expiresMs:o.wk,inactiveMs:o.BB},session_replay:{autoStart:!0,enabled:!1,harvestTimeSeconds:60,preload:!1,sampling_rate:10,error_sampling_rate:100,collect_fonts:!1,inline_images:!1,fix_stylesheets:!0,mask_all_inputs:!0,get mask_text_selector(){return e.mask_selector},set mask_text_selector(t){i(t)?e.mask_selector=\"\".concat(t,\",\").concat(u):\"\"===t||null===t?e.mask_selector=u:(0,a.R)(5,t)},get block_class(){return\"nr-block\"},get ignore_class(){return\"nr-ignore\"},get mask_text_class(){return\"nr-mask\"},get block_selector(){return e.block_selector},set block_selector(t){i(t)?e.block_selector+=\",\".concat(t):\"\"!==t\u0026\u0026(0,a.R)(6,t)},get mask_input_options(){return e.mask_input_options},set mask_input_options(t){t\u0026\u0026\"object\"==typeof t?e.mask_input_options={...t,password:!0}:(0,a.R)(7,t)}},session_trace:{enabled:!0,harvestTimeSeconds:10,autoStart:!0},soft_navigations:{enabled:!0,harvestTimeSeconds:10,autoStart:!0},spa:{enabled:!0,harvestTimeSeconds:10,autoStart:!0},ssl:void 0,user_actions:{enabled:!0}}},l={},f=\"All configuration objects require an agent identifier!\";function h(e){if(!e)throw new Error(f);if(!l[e])throw new Error(\"Configuration for \".concat(e,\" was never set\"));return l[e]}function p(e,t){if(!e)throw new Error(f);l[e]=(0,c.a)(t,d());const r=(0,s.nY)(e);r\u0026\u0026(r.init=l[e])}function g(e,t){if(!e)throw new Error(f);var r=h(e);if(r){for(var n=t.split(\".\"),i=0;i\u003cn.length-1;i++)if(\"object\"!=typeof(r=r[n[i]]))return;r=r[n[n.length-1]]}return r}},5603:(e,t,r)=\u003e{\"use strict\";r.d(t,{a:()=\u003ec,o:()=\u003es});var n=r(384),i=r(8122);const o={accountID:void 0,trustKey:void 0,agentID:void 0,licenseKey:void 0,applicationID:void 0,xpid:void 0},a={};function s(e){if(!e)throw new Error(\"All loader-config objects require an agent identifier!\");if(!a[e])throw new Error(\"LoaderConfig for \".concat(e,\" was never set\"));return a[e]}function c(e,t){if(!e)throw new Error(\"All loader-config objects require an agent identifier!\");a[e]=(0,i.a)(t,o);const r=(0,n.nY)(e);r\u0026\u0026(r.loader_config=a[e])}},3371:(e,t,r)=\u003e{\"use strict\";r.d(t,{V:()=\u003ef,f:()=\u003el});var n=r(8122),i=r(384),o=r(6154),a=r(9324);let s=0;const c={buildEnv:a.F3,distMethod:a.Xs,version:a.xv,originTime:o.WN},u={customTransaction:void 0,disabled:!1,isolatedBacklog:!1,loaderType:void 0,maxBytes:3e4,onerror:void 0,ptid:void 0,releaseIds:{},appMetadata:{},session:void 0,denyList:void 0,timeKeeper:void 0,obfuscator:void 0},d={};function l(e){if(!e)throw new Error(\"All runtime objects require an agent identifier!\");if(!d[e])throw new Error(\"Runtime for \".concat(e,\" was never set\"));return d[e]}function f(e,t){if(!e)throw new Error(\"All runtime objects require an agent identifier!\");d[e]={...(0,n.a)(t,u),...c},Object.hasOwnProperty.call(d[e],\"harvestCount\")||Object.defineProperty(d[e],\"harvestCount\",{get:()=\u003e++s});const r=(0,i.nY)(e);r\u0026\u0026(r.runtime=d[e])}},9324:(e,t,r)=\u003e{\"use strict\";r.d(t,{F3:()=\u003ei,Xs:()=\u003eo,Yq:()=\u003ea,xv:()=\u003en});const n=\"1.274.0\",i=\"PROD\",o=\"CDN\",a=\"^2.0.0-alpha.17\"},6154:(e,t,r)=\u003e{\"use strict\";r.d(t,{A4:()=\u003es,OF:()=\u003ed,RI:()=\u003ei,WN:()=\u003eh,bv:()=\u003eo,gm:()=\u003ea,lR:()=\u003ef,m:()=\u003eu,mw:()=\u003ec,sb:()=\u003el});var n=r(1863);const i=\"undefined\"!=typeof window\u0026\u0026!!window.document,o=\"undefined\"!=typeof WorkerGlobalScope\u0026\u0026(\"undefined\"!=typeof self\u0026\u0026self instanceof WorkerGlobalScope\u0026\u0026self.navigator instanceof WorkerNavigator||\"undefined\"!=typeof globalThis\u0026\u0026globalThis instanceof WorkerGlobalScope\u0026\u0026globalThis.navigator instanceof WorkerNavigator),a=i?window:\"undefined\"!=typeof WorkerGlobalScope\u0026\u0026(\"undefined\"!=typeof self\u0026\u0026self instanceof WorkerGlobalScope\u0026\u0026self||\"undefined\"!=typeof globalThis\u0026\u0026globalThis instanceof WorkerGlobalScope\u0026\u0026globalThis),s=\"complete\"===a?.document?.readyState,c=Boolean(\"hidden\"===a?.document?.visibilityState),u=\"\"+a?.location,d=/iPad|iPhone|iPod/.test(a.navigator?.userAgent),l=d\u0026\u0026\"undefined\"==typeof SharedWorker,f=(()=\u003e{const e=a.navigator?.userAgent?.match(/Firefox[/\\s](\\d+\\.\\d+)/);return Array.isArray(e)\u0026\u0026e.length\u003e=2?+e[1]:0})(),h=Date.now()-(0,n.t)()},7295:(e,t,r)=\u003e{\"use strict\";r.d(t,{Xv:()=\u003ea,gX:()=\u003ei,iW:()=\u003eo});var n=[];function i(e){if(!e||o(e))return!1;if(0===n.length)return!0;for(var t=0;t\u003cn.length;t++){var r=n[t];if(\"*\"===r.hostname)return!1;if(s(r.hostname,e.hostname)\u0026\u0026c(r.pathname,e.pathname))return!1}return!0}function o(e){return void 0===e.hostname}function a(e){if(n=[],e\u0026\u0026e.length)for(var t=0;t\u003ce.length;t++){let r=e[t];if(!r)continue;0===r.indexOf(\"http://\")?r=r.substring(7):0===r.indexOf(\"https://\")\u0026\u0026(r=r.substring(8));const i=r.indexOf(\"/\");let o,a;i\u003e0?(o=r.substring(0,i),a=r.substring(i)):(o=r,a=\"\");let[s]=o.split(\":\");n.push({hostname:s,pathname:a})}}function s(e,t){return!(e.length\u003et.length)\u0026\u0026t.indexOf(e)===t.length-e.length}function c(e,t){return 0===e.indexOf(\"/\")\u0026\u0026(e=e.substring(1)),0===t.indexOf(\"/\")\u0026\u0026(t=t.substring(1)),\"\"===e||e===t}},1687:(e,t,r)=\u003e{\"use strict\";r.d(t,{Ak:()=\u003ec,Ze:()=\u003el,x3:()=\u003eu});var n=r(7836),i=r(3606),o=r(860),a=r(2646);const s={};function c(e,t){const r={staged:!1,priority:o.P3[t]||0};d(e),s[e].get(t)||s[e].set(t,r)}function u(e,t){e\u0026\u0026s[e]\u0026\u0026(s[e].get(t)\u0026\u0026s[e].delete(t),h(e,t,!1),s[e].size\u0026\u0026f(e))}function d(e){if(!e)throw new Error(\"agentIdentifier required\");s[e]||(s[e]=new Map)}function l(e=\"\",t=\"feature\",r=!1){if(d(e),!e||!s[e].get(t)||r)return h(e,t);s[e].get(t).staged=!0,f(e)}function f(e){const t=Array.from(s[e]);t.every((([e,t])=\u003et.staged))\u0026\u0026(t.sort(((e,t)=\u003ee[1].priority-t[1].priority)),t.forEach((([t])=\u003e{s[e].delete(t),h(e,t)})))}function h(e,t,r=!0){const o=e?n.ee.get(e):n.ee,s=i.i.handlers;if(!o.aborted\u0026\u0026o.backlog\u0026\u0026s){if(r){const e=o.backlog[t],r=s[t];if(r){for(let t=0;e\u0026\u0026t\u003ce.length;++t)p(e[t],r);Object.entries(r).forEach((([e,t])=\u003e{Object.values(t||{}).forEach((t=\u003e{t[0]?.on\u0026\u0026t[0]?.context()instanceof a.y\u0026\u0026t[0].on(e,t[1])}))}))}}o.isolatedBacklog||delete s[t],o.backlog[t]=null,o.emit(\"drain-\"+t,[])}}function p(e,t){var r=e[1];Object.values(t[r]||{}).forEach((t=\u003e{var r=e[0];if(t[0]===r){var n=t[1],i=e[3],o=e[2];n.apply(i,o)}}))}},7836:(e,t,r)=\u003e{\"use strict\";r.d(t,{P:()=\u003ec,ee:()=\u003eu});var n=r(384),i=r(8990),o=r(3371),a=r(2646),s=r(5607);const c=\"nr@context:\".concat(s.W),u=function e(t,r){var n={},s={},d={},l=!1;try{l=16===r.length\u0026\u0026(0,o.f)(r).isolatedBacklog}catch(e){}var f={on:p,addEventListener:p,removeEventListener:function(e,t){var r=n[e];if(!r)return;for(var i=0;i\u003cr.length;i++)r[i]===t\u0026\u0026r.splice(i,1)},emit:function(e,r,n,i,o){!1!==o\u0026\u0026(o=!0);if(u.aborted\u0026\u0026!i)return;t\u0026\u0026o\u0026\u0026t.emit(e,r,n);for(var a=h(n),c=g(e),d=c.length,l=0;l\u003cd;l++)c[l].apply(a,r);var p=v()[s[e]];p\u0026\u0026p.push([f,e,r,a]);return a},get:m,listeners:g,context:h,buffer:function(e,t){const r=v();if(t=t||\"feature\",f.aborted)return;Object.entries(e||{}).forEach((([e,n])=\u003e{s[n]=t,t in r||(r[t]=[])}))},abort:function(){f._aborted=!0,Object.keys(f.backlog).forEach((e=\u003e{delete f.backlog[e]}))},isBuffering:function(e){return!!v()[s[e]]},debugId:r,backlog:l?{}:t\u0026\u0026\"object\"==typeof t.backlog?t.backlog:{},isolatedBacklog:l};return Object.defineProperty(f,\"aborted\",{get:()=\u003e{let e=f._aborted||!1;return e||(t\u0026\u0026(e=t.aborted),e)}}),f;function h(e){return e\u0026\u0026e instanceof a.y?e:e?(0,i.I)(e,c,(()=\u003enew a.y(c))):new a.y(c)}function p(e,t){n[e]=g(e).concat(t)}function g(e){return n[e]||[]}function m(t){return d[t]=d[t]||e(f,t)}function v(){return f.backlog}}(void 0,\"globalEE\"),d=(0,n.Zm)();d.ee||(d.ee=u)},2646:(e,t,r)=\u003e{\"use strict\";r.d(t,{y:()=\u003en});class n{constructor(e){this.contextId=e}}},9908:(e,t,r)=\u003e{\"use strict\";r.d(t,{d:()=\u003en,p:()=\u003ei});var n=r(7836).ee.get(\"handle\");function i(e,t,r,i,o){o?(o.buffer([e],i),o.emit(e,t,r)):(n.buffer([e],i),n.emit(e,t,r))}},3606:(e,t,r)=\u003e{\"use strict\";r.d(t,{i:()=\u003eo});var n=r(9908);o.on=a;var i=o.handlers={};function o(e,t,r,o){a(o||n.d,i,e,t,r)}function a(e,t,r,i,o){o||(o=\"feature\"),e||(e=n.d);var a=t[o]=t[o]||{};(a[r]=a[r]||[]).push([e,i])}},3878:(e,t,r)=\u003e{\"use strict\";function n(e,t){return{capture:e,passive:!1,signal:t}}function i(e,t,r=!1,i){window.addEventListener(e,t,n(r,i))}function o(e,t,r=!1,i){document.addEventListener(e,t,n(r,i))}r.d(t,{DD:()=\u003eo,jT:()=\u003en,sp:()=\u003ei})},5607:(e,t,r)=\u003e{\"use strict\";r.d(t,{W:()=\u003en});const n=(0,r(9566).bz)()},9566:(e,t,r)=\u003e{\"use strict\";r.d(t,{LA:()=\u003es,ZF:()=\u003ec,bz:()=\u003ea,el:()=\u003eu});var n=r(6154);const i=\"xxxxxxxx-xxxx-4xxx-yxxx-xxxxxxxxxxxx\";function o(e,t){return e?15\u0026e[t]:16*Math.random()|0}function a(){const e=n.gm?.crypto||n.gm?.msCrypto;let t,r=0;return e\u0026\u0026e.getRandomValues\u0026\u0026(t=e.getRandomValues(new Uint8Array(30))),i.split(\"\").map((e=\u003e\"x\"===e?o(t,r++).toString(16):\"y\"===e?(3\u0026o()|8).toString(16):e)).join(\"\")}function s(e){const t=n.gm?.crypto||n.gm?.msCrypto;let r,i=0;t\u0026\u0026t.getRandomValues\u0026\u0026(r=t.getRandomValues(new Uint8Array(e)));const a=[];for(var s=0;s\u003ce;s++)a.push(o(r,i++).toString(16));return a.join(\"\")}function c(){return s(16)}function u(){return s(32)}},2614:(e,t,r)=\u003e{\"use strict\";r.d(t,{BB:()=\u003ea,H3:()=\u003en,g:()=\u003eu,iL:()=\u003ec,tS:()=\u003es,uh:()=\u003ei,wk:()=\u003eo});const n=\"NRBA\",i=\"SESSION\",o=144e5,a=18e5,s={STARTED:\"session-started\",PAUSE:\"session-pause\",RESET:\"session-reset\",RESUME:\"session-resume\",UPDATE:\"session-update\"},c={SAME_TAB:\"same-tab\",CROSS_TAB:\"cross-tab\"},u={OFF:0,FULL:1,ERROR:2}},1863:(e,t,r)=\u003e{\"use strict\";function n(){return Math.floor(performance.now())}r.d(t,{t:()=\u003en})},7485:(e,t,r)=\u003e{\"use strict\";r.d(t,{D:()=\u003ei});var n=r(6154);function i(e){if(0===(e||\"\").indexOf(\"data:\"))return{protocol:\"data\"};try{const t=new URL(e,location.href),r={port:t.port,hostname:t.hostname,pathname:t.pathname,search:t.search,protocol:t.protocol.slice(0,t.protocol.indexOf(\":\")),sameOrigin:t.protocol===n.gm?.location?.protocol\u0026\u0026t.host===n.gm?.location?.host};return r.port\u0026\u0026\"\"!==r.port||(\"http:\"===t.protocol\u0026\u0026(r.port=\"80\"),\"https:\"===t.protocol\u0026\u0026(r.port=\"443\")),r.pathname\u0026\u0026\"\"!==r.pathname?r.pathname.startsWith(\"/\")||(r.pathname=\"/\".concat(r.pathname)):r.pathname=\"/\",r}catch(e){return{}}}},944:(e,t,r)=\u003e{\"use strict\";function n(e,t){\"function\"==typeof console.debug\u0026\u0026console.debug(\"New Relic Warning: https://github.com/newrelic/newrelic-browser-agent/blob/main/docs/warning-codes.md#\".concat(e),t)}r.d(t,{R:()=\u003en})},5284:(e,t,r)=\u003e{\"use strict\";r.d(t,{t:()=\u003ec,B:()=\u003es});var n=r(7836),i=r(6154);const o=\"newrelic\";const a=new Set,s={};function c(e,t){const r=n.ee.get(t);s[t]??={},e\u0026\u0026\"object\"==typeof e\u0026\u0026(a.has(t)||(r.emit(\"rumresp\",[e]),s[t]=e,a.add(t),function(e={}){try{i.gm.dispatchEvent(new CustomEvent(o,{detail:e}))}catch(e){}}({loaded:!0})))}},8990:(e,t,r)=\u003e{\"use strict\";r.d(t,{I:()=\u003ei});var n=Object.prototype.hasOwnProperty;function i(e,t,r){if(n.call(e,t))return e[t];var i=r();if(Object.defineProperty\u0026\u0026Object.keys)try{return Object.defineProperty(e,t,{value:i,writable:!0,enumerable:!1}),i}catch(e){}return e[t]=i,i}},6389:(e,t,r)=\u003e{\"use strict\";function n(e,t=500,r={}){const n=r?.leading||!1;let i;return(...r)=\u003e{n\u0026\u0026void 0===i\u0026\u0026(e.apply(this,r),i=setTimeout((()=\u003e{i=clearTimeout(i)}),t)),n||(clearTimeout(i),i=setTimeout((()=\u003e{e.apply(this,r)}),t))}}function i(e){let t=!1;return(...r)=\u003e{t||(t=!0,e.apply(this,r))}}r.d(t,{J:()=\u003ei,s:()=\u003en})},3304:(e,t,r)=\u003e{\"use strict\";r.d(t,{A:()=\u003eo});var n=r(7836);const i=()=\u003e{const e=new WeakSet;return(t,r)=\u003e{if(\"object\"==typeof r\u0026\u0026null!==r){if(e.has(r))return;e.add(r)}return r}};function o(e){try{return JSON.stringify(e,i())??\"\"}catch(e){try{n.ee.emit(\"internal-error\",[e])}catch(e){}return\"\"}}},5289:(e,t,r)=\u003e{\"use strict\";r.d(t,{GG:()=\u003eo,sB:()=\u003ea});var n=r(3878);function i(){return\"undefined\"==typeof document||\"complete\"===document.readyState}function o(e,t){if(i())return e();(0,n.sp)(\"load\",e,t)}function a(e){if(i())return e();(0,n.DD)(\"DOMContentLoaded\",e)}},384:(e,t,r)=\u003e{\"use strict\";r.d(t,{NT:()=\u003eo,US:()=\u003ed,Zm:()=\u003ea,bQ:()=\u003ec,dV:()=\u003es,nY:()=\u003eu,pV:()=\u003el});var n=r(6154),i=r(1863);const o={beacon:\"bam.nr-data.net\",errorBeacon:\"bam.nr-data.net\"};function a(){return n.gm.NREUM||(n.gm.NREUM={}),void 0===n.gm.newrelic\u0026\u0026(n.gm.newrelic=n.gm.NREUM),n.gm.NREUM}function s(){let e=a();return e.o||(e.o={ST:n.gm.setTimeout,SI:n.gm.setImmediate,CT:n.gm.clearTimeout,XHR:n.gm.XMLHttpRequest,REQ:n.gm.Request,EV:n.gm.Event,PR:n.gm.Promise,MO:n.gm.MutationObserver,FETCH:n.gm.fetch,WS:n.gm.WebSocket}),e}function c(e,t){let r=a();r.initializedAgents??={},t.initializedAt={ms:(0,i.t)(),date:new Date},r.initializedAgents[e]=t}function u(e){let t=a();return t.initializedAgents?.[e]}function d(e,t){a()[e]=t}function l(){return function(){let e=a();const t=e.info||{};e.info={beacon:o.beacon,errorBeacon:o.errorBeacon,...t}}(),function(){let e=a();const t=e.init||{};e.init={...t}}(),s(),function(){let e=a();const t=e.loader_config||{};e.loader_config={...t}}(),a()}},2843:(e,t,r)=\u003e{\"use strict\";r.d(t,{u:()=\u003ei});var n=r(3878);function i(e,t=!1,r,i){(0,n.DD)(\"visibilitychange\",(function(){if(t)return void(\"hidden\"===document.visibilityState\u0026\u0026e());e(document.visibilityState)}),r,i)}},8139:(e,t,r)=\u003e{\"use strict\";r.d(t,{u:()=\u003ef});var n=r(7836),i=r(3434),o=r(8990),a=r(6154);const s={},c=a.gm.XMLHttpRequest,u=\"addEventListener\",d=\"removeEventListener\",l=\"nr@wrapped:\".concat(n.P);function f(e){var t=function(e){return(e||n.ee).get(\"events\")}(e);if(s[t.debugId]++)return t;s[t.debugId]=1;var r=(0,i.YM)(t,!0);function f(e){r.inPlace(e,[u,d],\"-\",p)}function p(e,t){return e[1]}return\"getPrototypeOf\"in Object\u0026\u0026(a.RI\u0026\u0026h(document,f),h(a.gm,f),h(c.prototype,f)),t.on(u+\"-start\",(function(e,t){var n=e[1];if(null!==n\u0026\u0026(\"function\"==typeof n||\"object\"==typeof n)){var i=(0,o.I)(n,l,(function(){var e={object:function(){if(\"function\"!=typeof n.handleEvent)return;return n.handleEvent.apply(n,arguments)},function:n}[typeof n];return e?r(e,\"fn-\",null,e.name||\"anonymous\"):n}));this.wrapped=e[1]=i}})),t.on(d+\"-start\",(function(e){e[1]=this.wrapped||e[1]})),t}function h(e,t,...r){let n=e;for(;\"object\"==typeof n\u0026\u0026!Object.prototype.hasOwnProperty.call(n,u);)n=Object.getPrototypeOf(n);n\u0026\u0026t(n,...r)}},3434:(e,t,r)=\u003e{\"use strict\";r.d(t,{Jt:()=\u003eo,YM:()=\u003ec});var n=r(7836),i=r(5607);const o=\"nr@original:\".concat(i.W);var a=Object.prototype.hasOwnProperty,s=!1;function c(e,t){return e||(e=n.ee),r.inPlace=function(e,t,n,i,o){n||(n=\"\");const a=\"-\"===n.charAt(0);for(let s=0;s\u003ct.length;s++){const c=t[s],u=e[c];d(u)||(e[c]=r(u,a?c+n:n,i,c,o))}},r.flag=o,r;function r(t,r,n,s,c){return d(t)?t:(r||(r=\"\"),nrWrapper[o]=t,function(e,t,r){if(Object.defineProperty\u0026\u0026Object.keys)try{return Object.keys(e).forEach((function(r){Object.defineProperty(t,r,{get:function(){return e[r]},set:function(t){return e[r]=t,t}})})),t}catch(e){u([e],r)}for(var n in e)a.call(e,n)\u0026\u0026(t[n]=e[n])}(t,nrWrapper,e),nrWrapper);function nrWrapper(){var o,a,d,l;try{a=this,o=[...arguments],d=\"function\"==typeof n?n(o,a):n||{}}catch(t){u([t,\"\",[o,a,s],d],e)}i(r+\"start\",[o,a,s],d,c);try{return l=t.apply(a,o)}catch(e){throw i(r+\"err\",[o,a,e],d,c),e}finally{i(r+\"end\",[o,a,l],d,c)}}}function i(r,n,i,o){if(!s||t){var a=s;s=!0;try{e.emit(r,n,i,t,o)}catch(t){u([t,r,n,i],e)}s=a}}}function u(e,t){t||(t=n.ee);try{t.emit(\"internal-error\",e)}catch(e){}}function d(e){return!(e\u0026\u0026\"function\"==typeof e\u0026\u0026e.apply\u0026\u0026!e[o])}},9300:(e,t,r)=\u003e{\"use strict\";r.d(t,{T:()=\u003en});const n=r(860).K7.ajax},3333:(e,t,r)=\u003e{\"use strict\";r.d(t,{TZ:()=\u003en,Zp:()=\u003ei,mq:()=\u003es,nf:()=\u003ea,qN:()=\u003eo});const n=r(860).K7.genericEvents,i=[\"auxclick\",\"click\",\"copy\",\"keydown\",\"paste\",\"scrollend\"],o=[\"focus\",\"blur\"],a=4,s=1e3},6774:(e,t,r)=\u003e{\"use strict\";r.d(t,{T:()=\u003en});const n=r(860).K7.jserrors},993:(e,t,r)=\u003e{\"use strict\";r.d(t,{ET:()=\u003eo,TZ:()=\u003ea,p_:()=\u003ei});var n=r(860);const i={ERROR:\"ERROR\",WARN:\"WARN\",INFO:\"INFO\",DEBUG:\"DEBUG\",TRACE:\"TRACE\"},o=\"log\",a=n.K7.logging},3785:(e,t,r)=\u003e{\"use strict\";r.d(t,{R:()=\u003ec,b:()=\u003eu});var n=r(9908),i=r(1863),o=r(860),a=r(3969),s=r(993);function c(e,t,r={},c=s.p_.INFO){(0,n.p)(a.xV,[\"API/logging/\".concat(c.toLowerCase(),\"/called\")],void 0,o.K7.metrics,e),(0,n.p)(s.ET,[(0,i.t)(),t,r,c],void 0,o.K7.logging,e)}function u(e){return\"string\"==typeof e\u0026\u0026Object.values(s.p_).some((t=\u003et===e.toUpperCase().trim()))}},3969:(e,t,r)=\u003e{\"use strict\";r.d(t,{TZ:()=\u003en,XG:()=\u003es,rs:()=\u003ei,xV:()=\u003ea,z_:()=\u003eo});const n=r(860).K7.metrics,i=\"sm\",o=\"cm\",a=\"storeSupportabilityMetrics\",s=\"storeEventMetrics\"},6630:(e,t,r)=\u003e{\"use strict\";r.d(t,{T:()=\u003en});const n=r(860).K7.pageViewEvent},782:(e,t,r)=\u003e{\"use strict\";r.d(t,{T:()=\u003en});const n=r(860).K7.pageViewTiming},6344:(e,t,r)=\u003e{\"use strict\";r.d(t,{BB:()=\u003ed,G4:()=\u003eo,Qb:()=\u003el,TZ:()=\u003ei,Ug:()=\u003ea,_s:()=\u003es,bc:()=\u003eu,yP:()=\u003ec});var n=r(2614);const i=r(860).K7.sessionReplay,o={RECORD:\"recordReplay\",PAUSE:\"pauseReplay\",REPLAY_RUNNING:\"replayRunning\",ERROR_DURING_REPLAY:\"errorDuringReplay\"},a=.12,s={DomContentLoaded:0,Load:1,FullSnapshot:2,IncrementalSnapshot:3,Meta:4,Custom:5},c={[n.g.ERROR]:15e3,[n.g.FULL]:3e5,[n.g.OFF]:0},u={RESET:{message:\"Session was reset\",sm:\"Reset\"},IMPORT:{message:\"Recorder failed to import\",sm:\"Import\"},TOO_MANY:{message:\"429: Too Many Requests\",sm:\"Too-Many\"},TOO_BIG:{message:\"Payload was too large\",sm:\"Too-Big\"},CROSS_TAB:{message:\"Session Entity was set to OFF on another tab\",sm:\"Cross-Tab\"},ENTITLEMENTS:{message:\"Session Replay is not allowed and will not be started\",sm:\"Entitlement\"}},d=5e3,l={API:\"api\"}},5270:(e,t,r)=\u003e{\"use strict\";r.d(t,{Aw:()=\u003ec,CT:()=\u003eu,SR:()=\u003es});var n=r(384),i=r(9417),o=r(7767),a=r(6154);function s(e){return!!(0,n.dV)().o.MO\u0026\u0026(0,o.V)(e)\u0026\u0026!0===(0,i.gD)(e,\"session_trace.enabled\")}function c(e){return!0===(0,i.gD)(e,\"session_replay.preload\")\u0026\u0026s(e)}function u(e,t){const r=t.correctAbsoluteTimestamp(e);return{originalTimestamp:e,correctedTimestamp:r,timestampDiff:e-r,originTime:a.WN,correctedOriginTime:t.correctedOriginTime,originTimeDiff:Math.floor(a.WN-t.correctedOriginTime)}}},3738:(e,t,r)=\u003e{\"use strict\";r.d(t,{He:()=\u003ei,Kp:()=\u003es,Lc:()=\u003eu,Rz:()=\u003ed,TZ:()=\u003en,bD:()=\u003eo,d3:()=\u003ea,jx:()=\u003el,uP:()=\u003ec});const n=r(860).K7.sessionTrace,i=\"bstResource\",o=\"resource\",a=\"-start\",s=\"-end\",c=\"fn\"+a,u=\"fn\"+s,d=\"pushState\",l=1e3},3962:(e,t,r)=\u003e{\"use strict\";r.d(t,{AM:()=\u003eo,O2:()=\u003es,Qu:()=\u003ec,TZ:()=\u003ea,ih:()=\u003eu,tC:()=\u003ei});var n=r(860);const i=[\"click\",\"keydown\",\"submit\"],o=\"api\",a=n.K7.softNav,s={INITIAL_PAGE_LOAD:\"\",ROUTE_CHANGE:1,UNSPECIFIED:2},c={INTERACTION:1,AJAX:2,CUSTOM_END:3,CUSTOM_TRACER:4},u={IP:\"in progress\",FIN:\"finished\",CAN:\"cancelled\"}},7378:(e,t,r)=\u003e{\"use strict\";r.d(t,{$p:()=\u003ex,BR:()=\u003eb,Kp:()=\u003eR,L3:()=\u003ey,Lc:()=\u003ec,NC:()=\u003eo,SG:()=\u003ed,TZ:()=\u003ei,U6:()=\u003ep,UT:()=\u003em,d3:()=\u003ew,dT:()=\u003ef,e5:()=\u003eA,gx:()=\u003ev,l9:()=\u003el,oW:()=\u003eh,op:()=\u003eg,rw:()=\u003eu,tH:()=\u003eE,uP:()=\u003es,wW:()=\u003eT,xq:()=\u003ea});var n=r(384);const i=r(860).K7.spa,o=[\"click\",\"submit\",\"keypress\",\"keydown\",\"keyup\",\"change\"],a=999,s=\"fn-start\",c=\"fn-end\",u=\"cb-start\",d=\"api-ixn-\",l=\"remaining\",f=\"interaction\",h=\"spaNode\",p=\"jsonpNode\",g=\"fetch-start\",m=\"fetch-done\",v=\"fetch-body-\",b=\"jsonp-end\",y=(0,n.dV)().o.ST,w=\"-start\",R=\"-end\",x=\"-body\",T=\"cb\"+R,A=\"jsTime\",E=\"fetch\"},4234:(e,t,r)=\u003e{\"use strict\";r.d(t,{W:()=\u003eo});var n=r(7836),i=r(1687);class o{constructor(e,t){this.agentIdentifier=e,this.ee=n.ee.get(e),this.featureName=t,this.blocked=!1}deregisterDrain(){(0,i.x3)(this.agentIdentifier,this.featureName)}}},7767:(e,t,r)=\u003e{\"use strict\";r.d(t,{V:()=\u003eo});var n=r(9417),i=r(6154);const o=e=\u003ei.RI\u0026\u0026!0===(0,n.gD)(e,\"privacy.cookies_enabled\")},425:(e,t,r)=\u003e{\"use strict\";r.d(t,{j:()=\u003ej});var n=r(860),i=r(2555),o=r(3371),a=r(9908),s=r(7836),c=r(1687),u=r(5289),d=r(6154),l=r(944),f=r(3969),h=r(384),p=r(6344);const g=[\"setErrorHandler\",\"finished\",\"addToTrace\",\"addRelease\",\"addPageAction\",\"setCurrentRouteName\",\"setPageViewName\",\"setCustomAttribute\",\"interaction\",\"noticeError\",\"setUserId\",\"setApplicationVersion\",\"start\",p.G4.RECORD,p.G4.PAUSE,\"log\",\"wrapLogger\"],m=[\"setErrorHandler\",\"finished\",\"addToTrace\",\"addRelease\"];var v=r(1863),b=r(2614),y=r(993),w=r(3785),R=r(2646),x=r(3434);function T(e,t,r,n){if(\"object\"!=typeof t||!t||\"string\"!=typeof r||!r||\"function\"!=typeof t[r])return(0,l.R)(29);const i=function(e){return(e||s.ee).get(\"logger\")}(e),o=(0,x.YM)(i),a=new R.y(s.P);return a.level=n.level,a.customAttributes=n.customAttributes,o.inPlace(t,[r],\"wrap-logger-\",a),i}function A(){const e=(0,h.pV)();g.forEach((t=\u003e{e[t]=(...r)=\u003efunction(t,...r){let n=[];return Object.values(e.initializedAgents).forEach((e=\u003e{e\u0026\u0026e.api?e.exposed\u0026\u0026e.api[t]\u0026\u0026n.push(e.api[t](...r)):(0,l.R)(38,t)})),n.length\u003e1?n:n[0]}(t,...r)}))}const E={};var S=r(9417),N=r(5603),O=r(5284);const _=e=\u003e{const t=e.startsWith(\"http\");e+=\"/\",r.p=t?e:\"https://\"+e};let I=!1;function j(e,t={},g,R){let{init:x,info:j,loader_config:P,runtime:C={},exposed:k=!0}=t;C.loaderType=g;const L=(0,h.pV)();j||(x=L.init,j=L.info,P=L.loader_config),(0,S.xN)(e.agentIdentifier,x||{}),(0,N.a)(e.agentIdentifier,P||{}),j.jsAttributes??={},d.bv\u0026\u0026(j.jsAttributes.isWorker=!0),(0,i.x1)(e.agentIdentifier,j);const H=(0,S.D0)(e.agentIdentifier),D=[j.beacon,j.errorBeacon];I||(H.proxy.assets\u0026\u0026(_(H.proxy.assets),D.push(H.proxy.assets)),H.proxy.beacon\u0026\u0026D.push(H.proxy.beacon),A(),(0,h.US)(\"activatedFeatures\",O.B),e.runSoftNavOverSpa\u0026\u0026=!0===H.soft_navigations.enabled\u0026\u0026H.feature_flags.includes(\"soft_nav\")),C.denyList=[...H.ajax.deny_list||[],...H.ajax.block_internal?D:[]],C.ptid=e.agentIdentifier,(0,o.V)(e.agentIdentifier,C),e.ee=s.ee.get(e.agentIdentifier),void 0===e.api\u0026\u0026(e.api=function(e,t,h=!1){t||(0,c.Ak)(e,\"api\");const g={};var R=s.ee.get(e),x=R.get(\"tracer\");E[e]=b.g.OFF,R.on(p.G4.REPLAY_RUNNING,(t=\u003e{E[e]=t}));var A=\"api-\",S=A+\"ixn-\";function N(t,r,n,o){const a=(0,i.Vp)(e);return null===r?delete a.jsAttributes[t]:(0,i.x1)(e,{...a,jsAttributes:{...a.jsAttributes,[t]:r}}),I(A,n,!0,o||null===r?\"session\":void 0)(t,r)}function O(){}g.log=function(e,{customAttributes:t={},level:r=y.p_.INFO}={}){(0,a.p)(f.xV,[\"API/log/called\"],void 0,n.K7.metrics,R),(0,w.R)(R,e,t,r)},g.wrapLogger=(e,t,{customAttributes:r={},level:i=y.p_.INFO}={})=\u003e{(0,a.p)(f.xV,[\"API/wrapLogger/called\"],void 0,n.K7.metrics,R),T(R,e,t,{customAttributes:r,level:i})},m.forEach((e=\u003e{g[e]=I(A,e,!0,\"api\")})),g.addPageAction=I(A,\"addPageAction\",!0,n.K7.genericEvents),g.setPageViewName=function(t,r){if(\"string\"==typeof t)return\"/\"!==t.charAt(0)\u0026\u0026(t=\"/\"+t),(0,o.f)(e).customTransaction=(r||\"http://custom.transaction\")+t,I(A,\"setPageViewName\",!0)()},g.setCustomAttribute=function(e,t,r=!1){if(\"string\"==typeof e){if([\"string\",\"number\",\"boolean\"].includes(typeof t)||null===t)return N(e,t,\"setCustomAttribute\",r);(0,l.R)(40,typeof t)}else(0,l.R)(39,typeof e)},g.setUserId=function(e){if(\"string\"==typeof e||null===e)return N(\"enduser.id\",e,\"setUserId\",!0);(0,l.R)(41,typeof e)},g.setApplicationVersion=function(e){if(\"string\"==typeof e||null===e)return N(\"application.version\",e,\"setApplicationVersion\",!1);(0,l.R)(42,typeof e)},g.start=()=\u003e{try{(0,a.p)(f.xV,[\"API/start/called\"],void 0,n.K7.metrics,R),R.emit(\"manual-start-all\")}catch(e){(0,l.R)(23,e)}},g[p.G4.RECORD]=function(){(0,a.p)(f.xV,[\"API/recordReplay/called\"],void 0,n.K7.metrics,R),(0,a.p)(p.G4.RECORD,[],void 0,n.K7.sessionReplay,R)},g[p.G4.PAUSE]=function(){(0,a.p)(f.xV,[\"API/pauseReplay/called\"],void 0,n.K7.metrics,R),(0,a.p)(p.G4.PAUSE,[],void 0,n.K7.sessionReplay,R)},g.interaction=function(e){return(new O).get(\"object\"==typeof e?e:{})};const _=O.prototype={createTracer:function(e,t){var r={},i=this,o=\"function\"==typeof t;return(0,a.p)(f.xV,[\"API/createTracer/called\"],void 0,n.K7.metrics,R),h||(0,a.p)(S+\"tracer\",[(0,v.t)(),e,r],i,n.K7.spa,R),function(){if(x.emit((o?\"\":\"no-\")+\"fn-start\",[(0,v.t)(),i,o],r),o)try{return t.apply(this,arguments)}catch(e){const t=\"string\"==typeof e?new Error(e):e;throw x.emit(\"fn-err\",[arguments,this,t],r),t}finally{x.emit(\"fn-end\",[(0,v.t)()],r)}}}};function I(e,t,r,i){return function(){return(0,a.p)(f.xV,[\"API/\"+t+\"/called\"],void 0,n.K7.metrics,R),i\u0026\u0026(0,a.p)(e+t,[(0,v.t)(),...arguments],r?null:this,i,R),r?void 0:this}}function j(){r.e(478).then(r.bind(r,8778)).then((({setAPI:t})=\u003e{t(e),(0,c.Ze)(e,\"api\")})).catch((e=\u003e{(0,l.R)(27,e),R.abort()}))}return[\"actionText\",\"setName\",\"setAttribute\",\"save\",\"ignore\",\"onEnd\",\"getContext\",\"end\",\"get\"].forEach((e=\u003e{_[e]=I(S,e,void 0,h?n.K7.softNav:n.K7.spa)})),g.setCurrentRouteName=h?I(S,\"routeName\",void 0,n.K7.softNav):I(A,\"routeName\",!0,n.K7.spa),g.noticeError=function(t,r){\"string\"==typeof t\u0026\u0026(t=new Error(t)),(0,a.p)(f.xV,[\"API/noticeError/called\"],void 0,n.K7.metrics,R),(0,a.p)(\"err\",[t,(0,v.t)(),!1,r,!!E[e]],void 0,n.K7.jserrors,R)},d.RI?(0,u.GG)((()=\u003ej()),!0):j(),g}(e.agentIdentifier,R,e.runSoftNavOverSpa)),void 0===e.exposed\u0026\u0026(e.exposed=k),I=!0}},8374:(e,t,r)=\u003e{r.nc=(()=\u003e{try{return document?.currentScript?.nonce}catch(e){}return\"\"})()},860:(e,t,r)=\u003e{\"use strict\";r.d(t,{$J:()=\u003eo,K7:()=\u003en,P3:()=\u003ei});const n={ajax:\"ajax\",genericEvents:\"generic_events\",jserrors:\"jserrors\",logging:\"logging\",metrics:\"metrics\",pageAction:\"page_action\",pageViewEvent:\"page_view_event\",pageViewTiming:\"page_view_timing\",sessionReplay:\"session_replay\",sessionTrace:\"session_trace\",softNav:\"soft_navigations\",spa:\"spa\"},i={[n.pageViewEvent]:1,[n.pageViewTiming]:2,[n.metrics]:3,[n.jserrors]:4,[n.spa]:5,[n.ajax]:6,[n.sessionTrace]:7,[n.softNav]:8,[n.sessionReplay]:9,[n.logging]:10,[n.genericEvents]:11},o={[n.pageViewTiming]:\"events\",[n.ajax]:\"events\",[n.spa]:\"events\",[n.softNav]:\"events\",[n.metrics]:\"jserrors\",[n.jserrors]:\"jserrors\",[n.sessionTrace]:\"browser/blobs\",[n.sessionReplay]:\"browser/blobs\",[n.logging]:\"browser/logs\",[n.genericEvents]:\"ins\"}}},n={};function i(e){var t=n[e];if(void 0!==t)return t.exports;var o=n[e]={exports:{}};return r[e](o,o.exports,i),o.exports}i.m=r,i.d=(e,t)=\u003e{for(var r in t)i.o(t,r)\u0026\u0026!i.o(e,r)\u0026\u0026Object.defineProperty(e,r,{enumerable:!0,get:t[r]})},i.f={},i.e=e=\u003ePromise.all(Object.keys(i.f).reduce(((t,r)=\u003e(i.f[r](e,t),t)),[])),i.u=e=\u003e({212:\"nr-spa-compressor\",249:\"nr-spa-recorder\",478:\"nr-spa\"}[e]+\"-1.274.0.min.js\"),i.o=(e,t)=\u003eObject.prototype.hasOwnProperty.call(e,t),e={},t=\"NRBA-1.274.0.PROD:\",i.l=(r,n,o,a)=\u003e{if(e[r])e[r].push(n);else{var s,c;if(void 0!==o)for(var u=document.getElementsByTagName(\"script\"),d=0;d\u003cu.length;d++){var l=u[d];if(l.getAttribute(\"src\")==r||l.getAttribute(\"data-webpack\")==t+o){s=l;break}}if(!s){c=!0;var f={478:\"sha512-1vUqEfJPB8Pihje9mv5CfYgkitO1FWcS+UQb84DbXqP8oYctRv4/lzl/MzNLPlRhcY1WVDBGL20I8vm6s2VV7g==\",249:\"sha512-Y/BeZAh6VSTmUtUNmS5XdyKxL92s30Fyyj8xVW76HSPxcKItL4+x2+kGMZc8pMJnUpZDz1L4eftZQAJh3D8NnA==\",212:\"sha512-Gn2tQ3qog5Yhrx/gRutkSTYPp+7nkKFt4/mIXg99LxcNpMDAYJZDBYmAACdoHNM86+iq1F3cBcQotFNzjIX8bw==\"};(s=document.createElement(\"script\")).charset=\"utf-8\",s.timeout=120,i.nc\u0026\u0026s.setAttribute(\"nonce\",i.nc),s.setAttribute(\"data-webpack\",t+o),s.src=r,0!==s.src.indexOf(window.location.origin+\"/\")\u0026\u0026(s.crossOrigin=\"anonymous\"),f[a]\u0026\u0026(s.integrity=f[a])}e[r]=[n];var h=(t,n)=\u003e{s.onerror=s.onload=null,clearTimeout(p);var i=e[r];if(delete e[r],s.parentNode\u0026\u0026s.parentNode.removeChild(s),i\u0026\u0026i.forEach((e=\u003ee(n))),t)return t(n)},p=setTimeout(h.bind(null,void 0,{type:\"timeout\",target:s}),12e4);s.onerror=h.bind(null,s.onerror),s.onload=h.bind(null,s.onload),c\u0026\u0026document.head.appendChild(s)}},i.r=e=\u003e{\"undefined\"!=typeof Symbol\u0026\u0026Symbol.toStringTag\u0026\u0026Object.defineProperty(e,Symbol.toStringTag,{value:\"Module\"}),Object.defineProperty(e,\"__esModule\",{value:!0})},i.p=\"https://js-agent.newrelic.com/\",(()=\u003e{var e={38:0,788:0};i.f.j=(t,r)=\u003e{var n=i.o(e,t)?e[t]:void 0;if(0!==n)if(n)r.push(n[2]);else{var o=new Promise(((r,i)=\u003en=e[t]=[r,i]));r.push(n[2]=o);var a=i.p+i.u(t),s=new Error;i.l(a,(r=\u003e{if(i.o(e,t)\u0026\u0026(0!==(n=e[t])\u0026\u0026(e[t]=void 0),n)){var o=r\u0026\u0026(\"load\"===r.type?\"missing\":r.type),a=r\u0026\u0026r.target\u0026\u0026r.target.src;s.message=\"Loading chunk \"+t+\" failed.\\n(\"+o+\": \"+a+\")\",s.name=\"ChunkLoadError\",s.type=o,s.request=a,n[1](s)}}),\"chunk-\"+t,t)}};var t=(t,r)=\u003e{var n,o,[a,s,c]=r,u=0;if(a.some((t=\u003e0!==e[t]))){for(n in s)i.o(s,n)\u0026\u0026(i.m[n]=s[n]);if(c)c(i)}for(t\u0026\u0026t(r);u\u003ca.length;u++)o=a[u],i.o(e,o)\u0026\u0026e[o]\u0026\u0026e[o][0](),e[o]=0},r=self[\"webpackChunk:NRBA-1.274.0.PROD\"]=self[\"webpackChunk:NRBA-1.274.0.PROD\"]||[];r.forEach(t.bind(null,0)),r.push=t.bind(null,r.push.bind(r))})(),(()=\u003e{\"use strict\";i(8374);var e=i(944),t=i(6344),r=i(9566);class n{agentIdentifier;constructor(e=(0,r.LA)(16)){this.agentIdentifier=e}#e(t,...r){if(\"function\"==typeof this.api?.[t])return this.api[t](...r);(0,e.R)(35,t)}addPageAction(e,t){return this.#e(\"addPageAction\",e,t)}setPageViewName(e,t){return this.#e(\"setPageViewName\",e,t)}setCustomAttribute(e,t,r){return this.#e(\"setCustomAttribute\",e,t,r)}noticeError(e,t){return this.#e(\"noticeError\",e,t)}setUserId(e){return this.#e(\"setUserId\",e)}setApplicationVersion(e){return this.#e(\"setApplicationVersion\",e)}setErrorHandler(e){return this.#e(\"setErrorHandler\",e)}addRelease(e,t){return this.#e(\"addRelease\",e,t)}log(e,t){return this.#e(\"log\",e,t)}}class o extends n{#e(t,...r){if(\"function\"==typeof this.api?.[t])return this.api[t](...r);(0,e.R)(35,t)}start(){return this.#e(\"start\")}finished(e){return this.#e(\"finished\",e)}recordReplay(){return this.#e(t.G4.RECORD)}pauseReplay(){return this.#e(t.G4.PAUSE)}addToTrace(e){return this.#e(\"addToTrace\",e)}setCurrentRouteName(e){return this.#e(\"setCurrentRouteName\",e)}interaction(){return this.#e(\"interaction\")}wrapLogger(e,t,r){return this.#e(\"wrapLogger\",e,t,r)}}var a=i(860),s=i(9417);const c=Object.values(a.K7);function u(e){const t={};return c.forEach((r=\u003e{t[r]=function(e,t){return!0===(0,s.gD)(t,\"\".concat(e,\".enabled\"))}(r,e)})),t}var d=i(425);var l=i(1687),f=i(4234),h=i(5289),p=i(6154),g=i(5270),m=i(7767),v=i(6389);class b extends f.W{constructor(e,t,r=!0){super(e.agentIdentifier,t),this.auto=r,this.abortHandler=void 0,this.featAggregate=void 0,this.onAggregateImported=void 0,!1===e.init[this.featureName].autoStart\u0026\u0026(this.auto=!1),this.auto?(0,l.Ak)(e.agentIdentifier,t):this.ee.on(\"manual-start-all\",(0,v.J)((()=\u003e{(0,l.Ak)(e.agentIdentifier,this.featureName),this.auto=!0,this.importAggregator(e)})))}importAggregator(t,r={}){if(this.featAggregate||!this.auto)return;let n;this.onAggregateImported=new Promise((e=\u003e{n=e}));const o=async()=\u003e{let o;try{if((0,m.V)(this.agentIdentifier)){const{setupAgentSession:e}=await i.e(478).then(i.bind(i,6526));o=e(t)}}catch(t){(0,e.R)(20,t),this.ee.emit(\"internal-error\",[t]),this.featureName===a.K7.sessionReplay\u0026\u0026this.abortHandler?.()}try{if(t.sharedAggregator)await t.sharedAggregator;else{t.sharedAggregator=i.e(478).then(i.bind(i,9337));const{EventAggregator:e}=await t.sharedAggregator;t.sharedAggregator=new e}if(!this.#t(this.featureName,o))return(0,l.Ze)(this.agentIdentifier,this.featureName),void n(!1);const{lazyFeatureLoader:e}=await i.e(478).then(i.bind(i,6103)),{Aggregate:a}=await e(this.featureName,\"aggregate\");this.featAggregate=new a(t,r),n(!0)}catch(t){(0,e.R)(34,t),this.abortHandler?.(),(0,l.Ze)(this.agentIdentifier,this.featureName,!0),n(!1),this.ee\u0026\u0026this.ee.abort()}};p.RI?(0,h.GG)((()=\u003eo()),!0):o()}#t(e,t){switch(e){case a.K7.sessionReplay:return(0,g.SR)(this.agentIdentifier)\u0026\u0026!!t;case a.K7.sessionTrace:return!!t;default:return!0}}}var y=i(6630);class w extends b{static featureName=y.T;constructor(e,t=!0){super(e,y.T,t),this.importAggregator(e)}}var R=i(384);var x=i(9908),T=i(2843),A=i(3878),E=i(782),S=i(1863);class N extends b{static featureName=E.T;constructor(e,t=!0){super(e,E.T,t),p.RI\u0026\u0026((0,T.u)((()=\u003e(0,x.p)(\"docHidden\",[(0,S.t)()],void 0,E.T,this.ee)),!0),(0,A.sp)(\"pagehide\",(()=\u003e(0,x.p)(\"winPagehide\",[(0,S.t)()],void 0,E.T,this.ee))),this.importAggregator(e))}}var O=i(3969);class _ extends b{static featureName=O.TZ;constructor(e,t=!0){super(e,O.TZ,t),this.importAggregator(e)}}var I=i(6774),j=i(3304);class P{constructor(e,t,r,n,i){this.name=\"UncaughtError\",this.message=\"string\"==typeof e?e:(0,j.A)(e),this.sourceURL=t,this.line=r,this.column=n,this.__newrelic=i}}function C(e){return H(e)?e:new P(void 0!==e?.message?e.message:e,e?.filename||e?.sourceURL,e?.lineno||e?.line,e?.colno||e?.col,e?.__newrelic)}function k(e){const t=\"Unhandled Promise Rejection\";if(!e?.reason)return;if(H(e.reason))try{return e.reason.message=t+\": \"+e.reason.message,C(e.reason)}catch(t){return C(e.reason)}const r=C(e.reason);return r.message=t+\": \"+r?.message,r}function L(e){if(e.error instanceof SyntaxError\u0026\u0026!/:\\d+$/.test(e.error.stack?.trim())){const t=new P(e.message,e.filename,e.lineno,e.colno,e.error.__newrelic);return t.name=SyntaxError.name,t}return H(e.error)?e.error:C(e)}function H(e){return e instanceof Error\u0026\u0026!!e.stack}class D extends b{static featureName=I.T;#r=!1;constructor(e,r=!0){super(e,I.T,r);try{this.removeOnAbort=new AbortController}catch(e){}this.ee.on(\"internal-error\",(e=\u003e{this.abortHandler\u0026\u0026(0,x.p)(\"ierr\",[C(e),(0,S.t)(),!0,{},this.#r],void 0,this.featureName,this.ee)})),this.ee.on(t.G4.REPLAY_RUNNING,(e=\u003e{this.#r=e})),p.gm.addEventListener(\"unhandledrejection\",(e=\u003e{this.abortHandler\u0026\u0026(0,x.p)(\"err\",[k(e),(0,S.t)(),!1,{unhandledPromiseRejection:1},this.#r],void 0,this.featureName,this.ee)}),(0,A.jT)(!1,this.removeOnAbort?.signal)),p.gm.addEventListener(\"error\",(e=\u003e{this.abortHandler\u0026\u0026(0,x.p)(\"err\",[L(e),(0,S.t)(),!1,{},this.#r],void 0,this.featureName,this.ee)}),(0,A.jT)(!1,this.removeOnAbort?.signal)),this.abortHandler=this.#n,this.importAggregator(e)}#n(){this.removeOnAbort?.abort(),this.abortHandler=void 0}}var M=i(8990);let K=1;const U=\"nr@id\";function V(e){const t=typeof e;return!e||\"object\"!==t\u0026\u0026\"function\"!==t?-1:e===p.gm?0:(0,M.I)(e,U,(function(){return K++}))}function G(e){if(\"string\"==typeof e\u0026\u0026e.length)return e.length;if(\"object\"==typeof e){if(\"undefined\"!=typeof ArrayBuffer\u0026\u0026e instanceof ArrayBuffer\u0026\u0026e.byteLength)return e.byteLength;if(\"undefined\"!=typeof Blob\u0026\u0026e instanceof Blob\u0026\u0026e.size)return e.size;if(!(\"undefined\"!=typeof FormData\u0026\u0026e instanceof FormData))try{return(0,j.A)(e).length}catch(e){return}}}var F=i(8139),B=i(7836),W=i(3434);const z={},q=[\"open\",\"send\"];function Z(t){var r=t||B.ee;const n=function(e){return(e||B.ee).get(\"xhr\")}(r);if(z[n.debugId]++)return n;z[n.debugId]=1,(0,F.u)(r);var i=(0,W.YM)(n),o=p.gm.XMLHttpRequest,a=p.gm.MutationObserver,s=p.gm.Promise,c=p.gm.setInterval,u=\"readystatechange\",d=[\"onload\",\"onerror\",\"onabort\",\"onloadstart\",\"onloadend\",\"onprogress\",\"ontimeout\"],l=[],f=p.gm.XMLHttpRequest=function(t){const r=new o(t),a=n.context(r);try{n.emit(\"new-xhr\",[r],a),r.addEventListener(u,(s=a,function(){var e=this;e.readyState\u003e3\u0026\u0026!s.resolved\u0026\u0026(s.resolved=!0,n.emit(\"xhr-resolved\",[],e)),i.inPlace(e,d,\"fn-\",y)}),(0,A.jT)(!1))}catch(t){(0,e.R)(15,t);try{n.emit(\"internal-error\",[t])}catch(e){}}var s;return r};function h(e,t){i.inPlace(t,[\"onreadystatechange\"],\"fn-\",y)}if(function(e,t){for(var r in e)t[r]=e[r]}(o,f),f.prototype=o.prototype,i.inPlace(f.prototype,q,\"-xhr-\",y),n.on(\"send-xhr-start\",(function(e,t){h(e,t),function(e){l.push(e),a\u0026\u0026(g?g.then(b):c?c(b):(m=-m,v.data=m))}(t)})),n.on(\"open-xhr-start\",h),a){var g=s\u0026\u0026s.resolve();if(!c\u0026\u0026!s){var m=1,v=document.createTextNode(m);new a(b).observe(v,{characterData:!0})}}else r.on(\"fn-end\",(function(e){e[0]\u0026\u0026e[0].type===u||b()}));function b(){for(var e=0;e\u003cl.length;e++)h(0,l[e]);l.length\u0026\u0026(l=[])}function y(e,t){return t}return n}var Y=\"fetch-\",X=Y+\"body-\",J=[\"arrayBuffer\",\"blob\",\"json\",\"text\",\"formData\"],Q=p.gm.Request,ee=p.gm.Response,te=\"prototype\";const re={};function ne(e){const t=function(e){return(e||B.ee).get(\"fetch\")}(e);if(!(Q\u0026\u0026ee\u0026\u0026p.gm.fetch))return t;if(re[t.debugId]++)return t;function r(e,r,n){var i=e[r];\"function\"==typeof i\u0026\u0026(e[r]=function(){var e,r=[...arguments],o={};t.emit(n+\"before-start\",[r],o),o[B.P]\u0026\u0026o[B.P].dt\u0026\u0026(e=o[B.P].dt);var a=i.apply(this,r);return t.emit(n+\"start\",[r,e],a),a.then((function(e){return t.emit(n+\"end\",[null,e],a),e}),(function(e){throw t.emit(n+\"end\",[e],a),e}))})}return re[t.debugId]=1,J.forEach((e=\u003e{r(Q[te],e,X),r(ee[te],e,X)})),r(p.gm,\"fetch\",Y),t.on(Y+\"end\",(function(e,r){var n=this;if(r){var i=r.headers.get(\"content-length\");null!==i\u0026\u0026(n.rxSize=i),t.emit(Y+\"done\",[null,r],n)}else t.emit(Y+\"done\",[e],n)})),t}var ie=i(7485),oe=i(5603);class ae{constructor(e){this.agentIdentifier=e}generateTracePayload(e){if(!this.shouldGenerateTrace(e))return null;var t=(0,oe.o)(this.agentIdentifier);if(!t)return null;var n=(t.accountID||\"\").toString()||null,i=(t.agentID||\"\").toString()||null,o=(t.trustKey||\"\").toString()||null;if(!n||!i)return null;var a=(0,r.ZF)(),s=(0,r.el)(),c=Date.now(),u={spanId:a,traceId:s,timestamp:c};return(e.sameOrigin||this.isAllowedOrigin(e)\u0026\u0026this.useTraceContextHeadersForCors())\u0026\u0026(u.traceContextParentHeader=this.generateTraceContextParentHeader(a,s),u.traceContextStateHeader=this.generateTraceContextStateHeader(a,c,n,i,o)),(e.sameOrigin\u0026\u0026!this.excludeNewrelicHeader()||!e.sameOrigin\u0026\u0026this.isAllowedOrigin(e)\u0026\u0026this.useNewrelicHeaderForCors())\u0026\u0026(u.newrelicHeader=this.generateTraceHeader(a,s,c,n,i,o)),u}generateTraceContextParentHeader(e,t){return\"00-\"+t+\"-\"+e+\"-01\"}generateTraceContextStateHeader(e,t,r,n,i){return i+\"@nr=0-1-\"+r+\"-\"+n+\"-\"+e+\"----\"+t}generateTraceHeader(e,t,r,n,i,o){if(!(\"function\"==typeof p.gm?.btoa))return null;var a={v:[0,1],d:{ty:\"Browser\",ac:n,ap:i,id:e,tr:t,ti:r}};return o\u0026\u0026n!==o\u0026\u0026(a.d.tk=o),btoa((0,j.A)(a))}shouldGenerateTrace(e){return this.isDtEnabled()\u0026\u0026this.isAllowedOrigin(e)}isAllowedOrigin(e){var t=!1,r={};if((0,s.gD)(this.agentIdentifier,\"distributed_tracing\")\u0026\u0026(r=(0,s.D0)(this.agentIdentifier).distributed_tracing),e.sameOrigin)t=!0;else if(r.allowed_origins instanceof Array)for(var n=0;n\u003cr.allowed_origins.length;n++){var i=(0,ie.D)(r.allowed_origins[n]);if(e.hostname===i.hostname\u0026\u0026e.protocol===i.protocol\u0026\u0026e.port===i.port){t=!0;break}}return t}isDtEnabled(){var e=(0,s.gD)(this.agentIdentifier,\"distributed_tracing\");return!!e\u0026\u0026!!e.enabled}excludeNewrelicHeader(){var e=(0,s.gD)(this.agentIdentifier,\"distributed_tracing\");return!!e\u0026\u0026!!e.exclude_newrelic_header}useNewrelicHeaderForCors(){var e=(0,s.gD)(this.agentIdentifier,\"distributed_tracing\");return!!e\u0026\u0026!1!==e.cors_use_newrelic_header}useTraceContextHeadersForCors(){var e=(0,s.gD)(this.agentIdentifier,\"distributed_tracing\");return!!e\u0026\u0026!!e.cors_use_tracecontext_headers}}var se=i(9300),ce=i(7295),ue=[\"load\",\"error\",\"abort\",\"timeout\"],de=ue.length,le=(0,R.dV)().o.REQ,fe=(0,R.dV)().o.XHR;class he extends b{static featureName=se.T;constructor(e,t=!0){super(e,se.T,t),this.dt=new ae(e.agentIdentifier),this.handler=(e,t,r,n)=\u003e(0,x.p)(e,t,r,n,this.ee);try{const e={xmlhttprequest:\"xhr\",fetch:\"fetch\",beacon:\"beacon\"};p.gm?.performance?.getEntriesByType(\"resource\").forEach((t=\u003e{if(t.initiatorType in e\u0026\u00260!==t.responseStatus){const r={status:t.responseStatus},n={rxSize:t.transferSize,duration:Math.floor(t.duration),cbTime:0};pe(r,t.name),this.handler(\"xhr\",[r,n,t.startTime,t.responseEnd,e[t.initiatorType]],void 0,a.K7.ajax)}}))}catch(e){}ne(this.ee),Z(this.ee),function(e,t,r,n){function i(e){var t=this;t.totalCbs=0,t.called=0,t.cbTime=0,t.end=R,t.ended=!1,t.xhrGuids={},t.lastSize=null,t.loadCaptureCalled=!1,t.params=this.params||{},t.metrics=this.metrics||{},e.addEventListener(\"load\",(function(r){T(t,e)}),(0,A.jT)(!1)),p.lR||e.addEventListener(\"progress\",(function(e){t.lastSize=e.loaded}),(0,A.jT)(!1))}function o(e){this.params={method:e[0]},pe(this,e[1]),this.metrics={}}function s(t,r){e.loader_config.xpid\u0026\u0026this.sameOrigin\u0026\u0026r.setRequestHeader(\"X-NewRelic-ID\",e.loader_config.xpid);var i=n.generateTracePayload(this.parsedOrigin);if(i){var o=!1;i.newrelicHeader\u0026\u0026(r.setRequestHeader(\"newrelic\",i.newrelicHeader),o=!0),i.traceContextParentHeader\u0026\u0026(r.setRequestHeader(\"traceparent\",i.traceContextParentHeader),i.traceContextStateHeader\u0026\u0026r.setRequestHeader(\"tracestate\",i.traceContextStateHeader),o=!0),o\u0026\u0026(this.dt=i)}}function c(e,r){var n=this.metrics,i=e[0],o=this;if(n\u0026\u0026i){var a=G(i);a\u0026\u0026(n.txSize=a)}this.startTime=(0,S.t)(),this.body=i,this.listener=function(e){try{\"abort\"!==e.type||o.loadCaptureCalled||(o.params.aborted=!0),(\"load\"!==e.type||o.called===o.totalCbs\u0026\u0026(o.onloadCalled||\"function\"!=typeof r.onload)\u0026\u0026\"function\"==typeof o.end)\u0026\u0026o.end(r)}catch(e){try{t.emit(\"internal-error\",[e])}catch(e){}}};for(var s=0;s\u003cde;s++)r.addEventListener(ue[s],this.listener,(0,A.jT)(!1))}function u(e,t,r){this.cbTime+=e,t?this.onloadCalled=!0:this.called+=1,this.called!==this.totalCbs||!this.onloadCalled\u0026\u0026\"function\"==typeof r.onload||\"function\"!=typeof this.end||this.end(r)}function d(e,t){var r=\"\"+V(e)+!!t;this.xhrGuids\u0026\u0026!this.xhrGuids[r]\u0026\u0026(this.xhrGuids[r]=!0,this.totalCbs+=1)}function l(e,t){var r=\"\"+V(e)+!!t;this.xhrGuids\u0026\u0026this.xhrGuids[r]\u0026\u0026(delete this.xhrGuids[r],this.totalCbs-=1)}function f(){this.endTime=(0,S.t)()}function h(e,r){r instanceof fe\u0026\u0026\"load\"===e[0]\u0026\u0026t.emit(\"xhr-load-added\",[e[1],e[2]],r)}function g(e,r){r instanceof fe\u0026\u0026\"load\"===e[0]\u0026\u0026t.emit(\"xhr-load-removed\",[e[1],e[2]],r)}function m(e,t,r){t instanceof fe\u0026\u0026(\"onload\"===r\u0026\u0026(this.onload=!0),(\"load\"===(e[0]\u0026\u0026e[0].type)||this.onload)\u0026\u0026(this.xhrCbStart=(0,S.t)()))}function v(e,r){this.xhrCbStart\u0026\u0026t.emit(\"xhr-cb-time\",[(0,S.t)()-this.xhrCbStart,this.onload,r],r)}function b(e){var t,r=e[1]||{};if(\"string\"==typeof e[0]?0===(t=e[0]).length\u0026\u0026p.RI\u0026\u0026(t=\"\"+p.gm.location.href):e[0]\u0026\u0026e[0].url?t=e[0].url:p.gm?.URL\u0026\u0026e[0]\u0026\u0026e[0]instanceof URL?t=e[0].href:\"function\"==typeof e[0].toString\u0026\u0026(t=e[0].toString()),\"string\"==typeof t\u0026\u00260!==t.length){t\u0026\u0026(this.parsedOrigin=(0,ie.D)(t),this.sameOrigin=this.parsedOrigin.sameOrigin);var i=n.generateTracePayload(this.parsedOrigin);if(i\u0026\u0026(i.newrelicHeader||i.traceContextParentHeader))if(e[0]\u0026\u0026e[0].headers)s(e[0].headers,i)\u0026\u0026(this.dt=i);else{var o={};for(var a in r)o[a]=r[a];o.headers=new Headers(r.headers||{}),s(o.headers,i)\u0026\u0026(this.dt=i),e.length\u003e1?e[1]=o:e.push(o)}}function s(e,t){var r=!1;return t.newrelicHeader\u0026\u0026(e.set(\"newrelic\",t.newrelicHeader),r=!0),t.traceContextParentHeader\u0026\u0026(e.set(\"traceparent\",t.traceContextParentHeader),t.traceContextStateHeader\u0026\u0026e.set(\"tracestate\",t.traceContextStateHeader),r=!0),r}}function y(e,t){this.params={},this.metrics={},this.startTime=(0,S.t)(),this.dt=t,e.length\u003e=1\u0026\u0026(this.target=e[0]),e.length\u003e=2\u0026\u0026(this.opts=e[1]);var r,n=this.opts||{},i=this.target;\"string\"==typeof i?r=i:\"object\"==typeof i\u0026\u0026i instanceof le?r=i.url:p.gm?.URL\u0026\u0026\"object\"==typeof i\u0026\u0026i instanceof URL\u0026\u0026(r=i.href),pe(this,r);var o=(\"\"+(i\u0026\u0026i instanceof le\u0026\u0026i.method||n.method||\"GET\")).toUpperCase();this.params.method=o,this.body=n.body,this.txSize=G(n.body)||0}function w(e,t){if(this.endTime=(0,S.t)(),this.params||(this.params={}),(0,ce.iW)(this.params))return;let n;this.params.status=t?t.status:0,\"string\"==typeof this.rxSize\u0026\u0026this.rxSize.length\u003e0\u0026\u0026(n=+this.rxSize);const i={txSize:this.txSize,rxSize:n,duration:(0,S.t)()-this.startTime};r(\"xhr\",[this.params,i,this.startTime,this.endTime,\"fetch\"],this,a.K7.ajax)}function R(e){const t=this.params,n=this.metrics;if(!this.ended){this.ended=!0;for(let t=0;t\u003cde;t++)e.removeEventListener(ue[t],this.listener,!1);t.aborted||(0,ce.iW)(t)||(n.duration=(0,S.t)()-this.startTime,this.loadCazptureCalled||4!==e.readyState?null==t.status\u0026\u0026(t.status=0):T(this,e),n.cbTime=this.cbTime,r(\"xhr\",[t,n,this.startTime,this.endTime,\"xhr\"],this,a.K7.ajax))}}function T(e,r){e.params.status=r.status;var n=function(e,t){var r=e.responseType;return\"json\"===r\u0026\u0026null!==t?t:\"arraybuffer\"===r||\"blob\"===r||\"json\"===r?G(e.response):\"text\"===r||\"\"===r||void 0===r?G(e.responseText):void 0}(r,e.lastSize);if(n\u0026\u0026(e.metrics.rxSize=n),e.sameOrigin){var i=r.getResponseHeader(\"X-NewRelic-App-Data\");i\u0026\u0026((0,x.p)(O.rs,[\"Ajax/CrossApplicationTracing/Header/Seen\"],void 0,a.K7.metrics,t),e.params.cat=i.split(\", \").pop())}e.loadCaptureCalled=!0}t.on(\"new-xhr\",i),t.on(\"open-xhr-start\",o),t.on(\"open-xhr-end\",s),t.on(\"send-xhr-start\",c),t.on(\"xhr-cb-time\",u),t.on(\"xhr-load-added\",d),t.on(\"xhr-load-removed\",l),t.on(\"xhr-resolved\",f),t.on(\"addEventListener-end\",h),t.on(\"removeEventListener-end\",g),t.on(\"fn-end\",v),t.on(\"fetch-before-start\",b),t.on(\"fetch-start\",y),t.on(\"fn-start\",m),t.on(\"fetch-done\",w)}(e,this.ee,this.handler,this.dt),this.importAggregator(e)}}function pe(e,t){var r=(0,ie.D)(t),n=e.params||e;n.hostname=r.hostname,n.port=r.port,n.protocol=r.protocol,n.host=r.hostname+\":\"+r.port,n.pathname=r.pathname,e.parsedOrigin=r,e.sameOrigin=r.sameOrigin}const ge={},me=[\"pushState\",\"replaceState\"];function ve(e){const t=function(e){return(e||B.ee).get(\"history\")}(e);return!p.RI||ge[t.debugId]++||(ge[t.debugId]=1,(0,W.YM)(t).inPlace(window.history,me,\"-\")),t}var be=i(3738);const{He:ye,bD:we,d3:Re,Kp:xe,TZ:Te,Lc:Ae,uP:Ee,Rz:Se}=be;class Ne extends b{static featureName=Te;constructor(e,t=!0){super(e,Te,t);if(!(0,m.V)(this.agentIdentifier))return void this.deregisterDrain();const r=this.ee;let n;ve(r),this.eventsEE=(0,F.u)(r),this.eventsEE.on(Ee,(function(e,t){this.bstStart=(0,S.t)()})),this.eventsEE.on(Ae,(function(e,t){(0,x.p)(\"bst\",[e[0],t,this.bstStart,(0,S.t)()],void 0,a.K7.sessionTrace,r)})),r.on(Se+Re,(function(e){this.time=(0,S.t)(),this.startPath=location.pathname+location.hash})),r.on(Se+xe,(function(e){(0,x.p)(\"bstHist\",[location.pathname+location.hash,this.startPath,this.time],void 0,a.K7.sessionTrace,r)}));try{n=new PerformanceObserver((e=\u003e{const t=e.getEntries();(0,x.p)(ye,[t],void 0,a.K7.sessionTrace,r)})),n.observe({type:we,buffered:!0})}catch(e){}this.importAggregator(e,{resourceObserver:n})}}var Oe=i(2614);class _e extends b{static featureName=t.TZ;#i;#o;constructor(e,r=!0){let n;super(e,t.TZ,r),this.replayRunning=!1,this.#o=e;try{n=JSON.parse(localStorage.getItem(\"\".concat(Oe.H3,\"_\").concat(Oe.uh)))}catch(e){}(0,g.SR)(e.agentIdentifier)\u0026\u0026this.ee.on(t.G4.RECORD,(()=\u003ethis.#a())),this.#s(n)?(this.#i=n?.sessionReplayMode,this.#c()):this.importAggregator(e),this.ee.on(\"err\",(e=\u003e{this.replayRunning\u0026\u0026(this.errorNoticed=!0,(0,x.p)(t.G4.ERROR_DURING_REPLAY,[e],void 0,this.featureName,this.ee))})),this.ee.on(t.G4.REPLAY_RUNNING,(e=\u003e{this.replayRunning=e}))}#s(e){return e\u0026\u0026(e.sessionReplayMode===Oe.g.FULL||e.sessionReplayMode===Oe.g.ERROR)||(0,g.Aw)(this.agentIdentifier)}#u=!1;async#c(e){if(!this.#u){this.#u=!0;try{const{Recorder:t}=await Promise.all([i.e(478),i.e(249)]).then(i.bind(i,8589));this.recorder??=new t({mode:this.#i,agentIdentifier:this.agentIdentifier,trigger:e,ee:this.ee}),this.recorder.startRecording(),this.abortHandler=this.recorder.stopRecording}catch(e){}this.importAggregator(this.#o,{recorder:this.recorder,errorNoticed:this.errorNoticed})}}#a(){this.featAggregate?this.featAggregate.mode!==Oe.g.FULL\u0026\u0026this.featAggregate.initializeRecording(Oe.g.FULL,!0):(this.#i=Oe.g.FULL,this.#c(t.Qb.API),this.recorder\u0026\u0026this.recorder.parent.mode!==Oe.g.FULL\u0026\u0026(this.recorder.parent.mode=Oe.g.FULL,this.recorder.stopRecording(),this.recorder.startRecording(),this.abortHandler=this.recorder.stopRecording))}}var Ie=i(3962);class je extends b{static featureName=Ie.TZ;constructor(e,t=!0){if(super(e,Ie.TZ,t),!p.RI||!(0,R.dV)().o.MO)return;const r=ve(this.ee);Ie.tC.forEach((e=\u003e{(0,A.sp)(e,(e=\u003e{a(e)}),!0)}));const n=()=\u003e(0,x.p)(\"newURL\",[(0,S.t)(),\"\"+window.location],void 0,this.featureName,this.ee);r.on(\"pushState-end\",n),r.on(\"replaceState-end\",n);try{this.removeOnAbort=new AbortController}catch(e){}(0,A.sp)(\"popstate\",(e=\u003e(0,x.p)(\"newURL\",[e.timeStamp,\"\"+window.location],void 0,this.featureName,this.ee)),!0,this.removeOnAbort?.signal);let i=!1;const o=new((0,R.dV)().o.MO)(((e,t)=\u003e{i||(i=!0,requestAnimationFrame((()=\u003e{(0,x.p)(\"newDom\",[(0,S.t)()],void 0,this.featureName,this.ee),i=!1})))})),a=(0,v.s)((e=\u003e{(0,x.p)(\"newUIEvent\",[e],void 0,this.featureName,this.ee),o.observe(document.body,{attributes:!0,childList:!0,subtree:!0,characterData:!0})}),100,{leading:!0});this.abortHandler=function(){this.removeOnAbort?.abort(),o.disconnect(),this.abortHandler=void 0},this.importAggregator(e,{domObserver:o})}}var Pe=i(7378);const Ce={},ke=[\"appendChild\",\"insertBefore\",\"replaceChild\"];function Le(e){const t=function(e){return(e||B.ee).get(\"jsonp\")}(e);if(!p.RI||Ce[t.debugId])return t;Ce[t.debugId]=!0;var r=(0,W.YM)(t),n=/[?\u0026](?:callback|cb)=([^\u0026#]+)/,i=/(.*)\\.([^.]+)/,o=/^(\\w+)(\\.|$)(.*)$/;function a(e,t){if(!e)return t;const r=e.match(o),n=r[1];return a(r[3],t[n])}return r.inPlace(Node.prototype,ke,\"dom-\"),t.on(\"dom-start\",(function(e){!function(e){if(!e||\"string\"!=typeof e.nodeName||\"script\"!==e.nodeName.toLowerCase())return;if(\"function\"!=typeof e.addEventListener)return;var o=(s=e.src,c=s.match(n),c?c[1]:null);var s,c;if(!o)return;var u=function(e){var t=e.match(i);if(t\u0026\u0026t.length\u003e=3)return{key:t[2],parent:a(t[1],window)};return{key:e,parent:window}}(o);if(\"function\"!=typeof u.parent[u.key])return;var d={};function l(){t.emit(\"jsonp-end\",[],d),e.removeEventListener(\"load\",l,(0,A.jT)(!1)),e.removeEventListener(\"error\",f,(0,A.jT)(!1))}function f(){t.emit(\"jsonp-error\",[],d),t.emit(\"jsonp-end\",[],d),e.removeEventListener(\"load\",l,(0,A.jT)(!1)),e.removeEventListener(\"error\",f,(0,A.jT)(!1))}r.inPlace(u.parent,[u.key],\"cb-\",d),e.addEventListener(\"load\",l,(0,A.jT)(!1)),e.addEventListener(\"error\",f,(0,A.jT)(!1)),t.emit(\"new-jsonp\",[e.src],d)}(e[0])})),t}const He={};function De(e){const t=function(e){return(e||B.ee).get(\"promise\")}(e);if(He[t.debugId])return t;He[t.debugId]=!0;var r=t.context,n=(0,W.YM)(t),i=p.gm.Promise;return i\u0026\u0026function(){function e(r){var o=t.context(),a=n(r,\"executor-\",o,null,!1);const s=Reflect.construct(i,[a],e);return t.context(s).getCtx=function(){return o},s}p.gm.Promise=e,Object.defineProperty(e,\"name\",{value:\"Promise\"}),e.toString=function(){return i.toString()},Object.setPrototypeOf(e,i),[\"all\",\"race\"].forEach((function(r){const n=i[r];e[r]=function(e){let i=!1;[...e||[]].forEach((e=\u003e{this.resolve(e).then(a(\"all\"===r),a(!1))}));const o=n.apply(this,arguments);return o;function a(e){return function(){t.emit(\"propagate\",[null,!i],o,!1,!1),i=i||!e}}}})),[\"resolve\",\"reject\"].forEach((function(r){const n=i[r];e[r]=function(e){const r=n.apply(this,arguments);return e!==r\u0026\u0026t.emit(\"propagate\",[e,!0],r,!1,!1),r}})),e.prototype=i.prototype;const o=i.prototype.then;i.prototype.then=function(...e){var i=this,a=r(i);a.promise=i,e[0]=n(e[0],\"cb-\",a,null,!1),e[1]=n(e[1],\"cb-\",a,null,!1);const s=o.apply(this,e);return a.nextPromise=s,t.emit(\"propagate\",[i,!0],s,!1,!1),s},i.prototype.then[W.Jt]=o,t.on(\"executor-start\",(function(e){e[0]=n(e[0],\"resolve-\",this,null,!1),e[1]=n(e[1],\"resolve-\",this,null,!1)})),t.on(\"executor-err\",(function(e,t,r){e[1](r)})),t.on(\"cb-end\",(function(e,r,n){t.emit(\"propagate\",[n,!0],this.nextPromise,!1,!1)})),t.on(\"propagate\",(function(e,r,n){this.getCtx\u0026\u0026!r||(this.getCtx=function(){if(e instanceof Promise)var r=t.context(e);return r\u0026\u0026r.getCtx?r.getCtx():this})}))}(),t}const Me={},Ke=\"setTimeout\",Ue=\"setInterval\",Ve=\"clearTimeout\",Ge=\"-start\",Fe=[Ke,\"setImmediate\",Ue,Ve,\"clearImmediate\"];function Be(e){const t=function(e){return(e||B.ee).get(\"timer\")}(e);if(Me[t.debugId]++)return t;Me[t.debugId]=1;var r=(0,W.YM)(t);return r.inPlace(p.gm,Fe.slice(0,2),Ke+\"-\"),r.inPlace(p.gm,Fe.slice(2,3),Ue+\"-\"),r.inPlace(p.gm,Fe.slice(3),Ve+\"-\"),t.on(Ue+Ge,(function(e,t,n){e[0]=r(e[0],\"fn-\",null,n)})),t.on(Ke+Ge,(function(e,t,n){this.method=n,this.timerDuration=isNaN(e[1])?0:+e[1],e[0]=r(e[0],\"fn-\",this,n)})),t}const We={};function ze(e){const t=function(e){return(e||B.ee).get(\"mutation\")}(e);if(!p.RI||We[t.debugId])return t;We[t.debugId]=!0;var r=(0,W.YM)(t),n=p.gm.MutationObserver;return n\u0026\u0026(window.MutationObserver=function(e){return this instanceof n?new n(r(e,\"fn-\")):n.apply(this,arguments)},MutationObserver.prototype=n.prototype),t}const{TZ:qe,d3:Ze,Kp:Ye,$p:Xe,wW:Je,e5:Qe,tH:$e,uP:et,rw:tt,Lc:rt}=Pe;class nt extends b{static featureName=qe;constructor(e,t=!0){if(super(e,qe,t),!p.RI)return;try{this.removeOnAbort=new AbortController}catch(e){}let r,n=0;const i=this.ee.get(\"tracer\"),o=Le(this.ee),a=De(this.ee),s=Be(this.ee),c=Z(this.ee),u=this.ee.get(\"events\"),d=ne(this.ee),l=ve(this.ee),f=ze(this.ee);function h(e,t){l.emit(\"newURL\",[\"\"+window.location,t])}function g(){n++,r=window.location.hash,this[et]=(0,S.t)()}function m(){n--,window.location.hash!==r\u0026\u0026h(0,!0);var e=(0,S.t)();this[Qe]=~~this[Qe]+e-this[et],this[rt]=e}function v(e,t){e.on(t,(function(){this[t]=(0,S.t)()}))}this.ee.on(et,g),a.on(tt,g),o.on(tt,g),this.ee.on(rt,m),a.on(Je,m),o.on(Je,m),this.ee.on(\"fn-err\",((...t)=\u003e{t[2]?.__newrelic?.[e.agentIdentifier]||(0,x.p)(\"function-err\",[...t],void 0,this.featureName,this.ee)})),this.ee.buffer([et,rt,\"xhr-resolved\"],this.featureName),u.buffer([et],this.featureName),s.buffer([\"setTimeout\"+Ye,\"clearTimeout\"+Ze,et],this.featureName),c.buffer([et,\"new-xhr\",\"send-xhr\"+Ze],this.featureName),d.buffer([$e+Ze,$e+\"-done\",$e+Xe+Ze,$e+Xe+Ye],this.featureName),l.buffer([\"newURL\"],this.featureName),f.buffer([et],this.featureName),a.buffer([\"propagate\",tt,Je,\"executor-err\",\"resolve\"+Ze],this.featureName),i.buffer([et,\"no-\"+et],this.featureName),o.buffer([\"new-jsonp\",\"cb-start\",\"jsonp-error\",\"jsonp-end\"],this.featureName),v(d,$e+Ze),v(d,$e+\"-done\"),v(o,\"new-jsonp\"),v(o,\"jsonp-end\"),v(o,\"cb-start\"),l.on(\"pushState-end\",h),l.on(\"replaceState-end\",h),window.addEventListener(\"hashchange\",h,(0,A.jT)(!0,this.removeOnAbort?.signal)),window.addEventListener(\"load\",h,(0,A.jT)(!0,this.removeOnAbort?.signal)),window.addEventListener(\"popstate\",(function(){h(0,n\u003e1)}),(0,A.jT)(!0,this.removeOnAbort?.signal)),this.abortHandler=this.#n,this.importAggregator(e)}#n(){this.removeOnAbort?.abort(),this.abortHandler=void 0}}var it=i(3333);class ot extends b{static featureName=it.TZ;constructor(e,t=!0){super(e,it.TZ,t);const r=[e.init.page_action.enabled,e.init.performance.capture_marks,e.init.performance.capture_measures,e.init.user_actions.enabled];p.RI\u0026\u0026e.init.user_actions.enabled\u0026\u0026(it.Zp.forEach((e=\u003e(0,A.sp)(e,(e=\u003e(0,x.p)(\"ua\",[e],void 0,this.featureName,this.ee)),!0))),it.qN.forEach((e=\u003e(0,A.sp)(e,(e=\u003e(0,x.p)(\"ua\",[e],void 0,this.featureName,this.ee)))))),r.some((e=\u003ee))?this.importAggregator(e):this.deregisterDrain()}}var at=i(993),st=i(3785);class ct extends b{static featureName=at.TZ;constructor(e,t=!0){super(e,at.TZ,t);const r=this.ee;this.ee.on(\"wrap-logger-end\",(function([e]){const{level:t,customAttributes:n}=this;(0,st.R)(r,e,n,t)})),this.importAggregator(e)}}new class extends o{constructor(t,r){super(r),p.gm?(this.features={},(0,R.bQ)(this.agentIdentifier,this),this.desiredFeatures=new Set(t.features||[]),this.desiredFeatures.add(w),this.runSoftNavOverSpa=[...this.desiredFeatures].some((e=\u003ee.featureName===a.K7.softNav)),(0,d.j)(this,t,t.loaderType||\"agent\"),this.run()):(0,e.R)(21)}get config(){return{info:this.info,init:this.init,loader_config:this.loader_config,runtime:this.runtime}}run(){try{const t=u(this.agentIdentifier),r=[...this.desiredFeatures];r.sort(((e,t)=\u003ea.P3[e.featureName]-a.P3[t.featureName])),r.forEach((r=\u003e{if(!t[r.featureName]\u0026\u0026r.featureName!==a.K7.pageViewEvent)return;if(this.runSoftNavOverSpa\u0026\u0026r.featureName===a.K7.spa)return;if(!this.runSoftNavOverSpa\u0026\u0026r.featureName===a.K7.softNav)return;const n=function(e){switch(e){case a.K7.ajax:return[a.K7.jserrors];case a.K7.sessionTrace:return[a.K7.ajax,a.K7.pageViewEvent];case a.K7.sessionReplay:return[a.K7.sessionTrace];case a.K7.pageViewTiming:return[a.K7.pageViewEvent];default:return[]}}(r.featureName).filter((e=\u003e!(e in this.features)));n.length\u003e0\u0026\u0026(0,e.R)(36,{targetFeature:r.featureName,missingDependencies:n}),this.features[r.featureName]=new r(this)}))}catch(t){(0,e.R)(22,t);for(const e in this.features)this.features[e].abortHandler?.();const r=(0,R.Zm)();delete r.initializedAgents[this.agentIdentifier]?.api,delete r.initializedAgents[this.agentIdentifier]?.features,delete this.sharedAggregator;return r.ee.get(this.agentIdentifier).abort(),!1}}}({features:[he,w,N,Ne,_e,_,D,ot,ct,je,nt],loaderType:\"spa\"})})()})();\n","testAutomationFlags":{"disableAds":false,"disableIirisAuth":false,"disableWelcomeAd":false,"disableBigskyAd":false,"disableIirisRecommend":false,"disableDcts":false,"disableWeatherWidget":false,"disableCashGrainWidget":false,"disableCommoditiesWidget":false,"disableCaptcha":false,"disableCookieBanner":false,"overrideBrandStyling":"","overrideThemeStyling":""},"configState":{"font":{"primary":{"name":"Inter","url":"https://fonts.googleapis.com/css2?family=Inter:wght@100;200;300;400;500;600;700;800;900\u0026display=swap"},"secondary":{"name":"Inter","url":"https://fonts.googleapis.com/css2?family=Inter:wght@100;200;300;400;500;600;700;800;900\u0026display=swap"}},"theme":"theme1","uiBrand":"darkreading","isMarketsDivision":false,"image":{"brand":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/bltc94608acf452fd67/655cf371ab171e040a838b2a/329050_DR23_Graphics_Website_V5_Default_Image_v1.png","contributor":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt171e20ac163e523a/65004ec08c754b16dd16303c/Contributor_Avatar.png"},"media":{"brightcoveAccountId":"1568176135"},"newsletterSignupPromo":{"unbounceURL":"https://dr-resources.darkreading.com/free/w_defa3135/prgm.cgi"},"isOneTrustLoaded":false}},"routes/_index":{"modules":[{"type":"module_top_featured","uid":"blt1a57ccf20f8fc920","data":{"title":"Home Page Featured","features":[{"variant":"normal","contentType":"Article","thumbnail":{"src":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt3317719ff4b0bbee/6747152ee2b6b17ae587bdee/cardskimming_Kim_Kuperkova_shutterstock.jpg","alt":"A blue credit card on a fish hook being dangled above a computer keyboard"},"articleName":"Sneaky Skimmer Malware Targets Magento Sites Ahead of Black Friday","articleUrl":"/application-security/sneaky-skimmer-malware-magento-sites-black-friday","listPageUrl":"/application-security/sneaky-skimmer-malware-magento-sites-black-friday","linkAttrs":{},"mobileHeadline":"Sneaky Skimmer Malware Targets Magento Sites Ahead of Black Friday","date":"2024-11-27T17:19:41.000Z","webinarStartTime":"","categoryName":"Application Security","categoryUrl":"/application-security","contributors":[{"name":"Elizabeth Montalbano, Contributing Writer","link":"/author/elizabeth-montalbano","avatar":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt3a8c7badad2ca168/64f15cd2b4c236805e4fddad/ElizabethMontalbano.jpg","role":""}],"timeRead":3,"articleSummary":"A stealthy JavaScript injection attack steals data from the checkout page of sites, either by creating a fake credit card form or extracting data directly from payment fields.","paidGating":{"paidContent":false,"paidProductTaxonomy":[]}},{"variant":"normal","contentType":"Article","thumbnail":{"src":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt2a398059c351b556/67475250f8c46b7f032fc959/russia_PHOTOCREO_Michal_Bednarek_shutterstock.jpg","alt":"The Russian flag covered by code on a laptop screen"},"articleName":"'Operation Undercut' Adds to Russia Malign Influence Campaigns","articleUrl":"/cybersecurity-operations/operation-undercut-russia-malign-influence-campaigns","listPageUrl":"/cybersecurity-operations/operation-undercut-russia-malign-influence-campaigns","linkAttrs":{},"mobileHeadline":"'Operation Undercut' Adds to Russia Malign Influence Campaigns","date":"2024-11-27T18:36:56.000Z","webinarStartTime":"","categoryName":"Cybersecurity Operations","categoryUrl":"/cybersecurity-operations","contributors":[{"name":"Jai Vijayan, Contributing Writer","link":"/author/jai-vijayan","avatar":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt1a674355ce57f27b/64f14f228727730c7f926217/Jai-Vijayan.jpeg","role":""}],"timeRead":3,"articleSummary":"Just like Russia's Doppelgänger effort, the goal is to spread misinformation about Ukraine and Western efforts to help Ukraine in its war with Russia.","paidGating":{"paidContent":false,"paidProductTaxonomy":[]}},{"variant":"normal","contentType":"Article","thumbnail":{"src":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/bltd9544fe544dde688/674635c9fde1977e265db529/matrix_Kundra_shutterstock.jpg","alt":"Vector green digital code rain in a Matrix inspired futuristic style"},"articleName":"Russian Script Kiddie Assembles Massive DDoS Botnet","articleUrl":"/cyberattacks-data-breaches/russian-script-kiddie-assembles-massive-ddos-botnet","listPageUrl":"/cyberattacks-data-breaches/russian-script-kiddie-assembles-massive-ddos-botnet","linkAttrs":{},"mobileHeadline":"Russian Script Kiddie Assembles Massive DDoS Botnet","date":"2024-11-27T14:00:00.000Z","webinarStartTime":"","categoryName":"Cyberattacks \u0026 Data Breaches","categoryUrl":"/cyberattacks-data-breaches","contributors":[{"name":"Jai Vijayan, Contributing Writer","link":"/author/jai-vijayan","avatar":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt1a674355ce57f27b/64f14f228727730c7f926217/Jai-Vijayan.jpeg","role":""}],"timeRead":4,"articleSummary":"Over the past year, \"Matrix\" has used publicly available malware tools and exploit scripts to target weakly secured IoT devices — and enterprise servers.","paidGating":{"paidContent":false,"paidProductTaxonomy":[]}},{"variant":"normal","contentType":"Article","thumbnail":{"src":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt223c311856315d20/6744e00a9d8a1dee88068814/lyftoffice-Askar_Karimullin-alamy.jpg","alt":"Lyft Signage Logo on Top of Glass Building. Workplace Transport Company Office lit by pink sunset."},"articleName":"How AI Is Enhancing Security in Ridesharing","articleUrl":"/vulnerabilities-threats/ai-enhancing-ridesharing-security","listPageUrl":"/vulnerabilities-threats/ai-enhancing-ridesharing-security","linkAttrs":{},"mobileHeadline":"How AI Is Enhancing Security in Ridesharing","date":"2024-11-29T17:00:00.000Z","webinarStartTime":"","categoryName":"Vulnerabilities \u0026 Threats","categoryUrl":"/vulnerabilities-threats","contributors":[{"name":"Rachita Naik","link":"/author/rachita-naik","avatar":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt11960a1d49ec8b9e/6744c98e6614f6544ddb3b49/naik.jfif","role":"Machine Learning Engineer"}],"timeRead":5,"articleSummary":"Whether it's detecting fraudulent activity, preventing phishing, or protecting sensitive data, AI is transforming cybersecurity in ridesharing.","paidGating":{"paidContent":false,"paidProductTaxonomy":[]}},{"variant":"normal","contentType":"Article","thumbnail":{"src":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt6a62663944a43a13/674629fa4b6244f51f919947/TippaPatt-software-development-shutterstock.jpg","alt":"Two hands typing on a laptop's keyboard, with a digital overlay"},"articleName":"Ransomware Gangs Seek Pen Testers to Boost Quality","articleUrl":"/threat-intelligence/ransomware-gangs-seek-pen-testers-boost-professionalism","listPageUrl":"/threat-intelligence/ransomware-gangs-seek-pen-testers-boost-professionalism","linkAttrs":{},"mobileHeadline":"Ransomware Gangs Seek Pen Testers to Boost Quality","date":"2024-11-29T14:00:00.000Z","webinarStartTime":"","categoryName":"Threat Intelligence","categoryUrl":"/threat-intelligence","contributors":[{"name":"Robert Lemos, Contributing Writer","link":"/author/robert-lemos","avatar":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt28d2c260c33375ea/64f14ff471df6264a382aaa0/Robert-Lemos.png","role":""}],"timeRead":4,"articleSummary":"Qualified applicants must be able to test ransomware encryption and find bugs that might enable defenders to jailbreak the malware.","paidGating":{"paidContent":false,"paidProductTaxonomy":[]}}],"latestNews":[{"variant":"normal","contentType":"Article","thumbnail":{"src":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt665c5e44e3b036f8/6706f434d8c4923c6a1a9e28/mundissima-windows-11-photo-shutterstock.jpg","alt":"A screen showing the Windows 11 logo"},"articleName":"Microsoft Finally Releases Recall as Part of Windows Insider Preview","articleUrl":"/endpoint-security/microsoft-releases-recall-windows-insider-preview","listPageUrl":"/endpoint-security/microsoft-releases-recall-windows-insider-preview","linkAttrs":{},"mobileHeadline":"Microsoft Previews Recall in Windows Insider","date":"Nov 27, 2024","categoryName":"Endpoint Security","categoryUrl":"/endpoint-security","contributors":[],"timeRead":3,"paidGating":{"paidContent":false,"paidProductTaxonomy":[]}},{"variant":"normal","contentType":"Article","thumbnail":{"src":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/bltf45aedac7f619d1e/6744f4c5df95885d64555b94/thinkhubstudio-investment-security-shutterstock.jpg","alt":"Hands holing and working a tablet, overlaid with charts"},"articleName":"Israel Defies VC Downturn With More Cybersecurity Investments","articleUrl":"/application-security/israel-defies-downturn-security-funding","listPageUrl":"/application-security/israel-defies-downturn-security-funding","linkAttrs":{},"mobileHeadline":"Israel Defies VC Downturn With More Cybersecurity Investments","date":"Nov 27, 2024","categoryName":"Application Security","categoryUrl":"/application-security","contributors":[{"name":"Robert Lemos, Contributing Writer","link":"/author/robert-lemos","avatar":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt28d2c260c33375ea/64f14ff471df6264a382aaa0/Robert-Lemos.png","role":""}],"timeRead":5,"paidGating":{"paidContent":false,"paidProductTaxonomy":[]}},{"variant":"normal","contentType":"Article","thumbnail":{"src":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/bltc9acc4a7101bc8ec/673fa7e4f660e142d02588e0/Clare_Louise_Jackson-water-treatment-plant-shutterstock.jpg","alt":"Water treatment plant viewed from above"},"articleName":"Leaky Cybersecurity Holes Put Water Systems at Risk","articleUrl":"/vulnerabilities-threats/leaky-cybersecurity-holes-water-systems-risk","listPageUrl":"/vulnerabilities-threats/leaky-cybersecurity-holes-water-systems-risk","linkAttrs":{},"mobileHeadline":"Leaky Cybersecurity Holes Put Water Systems at Risk","date":"Nov 22, 2024","categoryName":"Vulnerabilities \u0026 Threats","categoryUrl":"/vulnerabilities-threats","contributors":[{"name":"Robert Lemos, Contributing Writer","link":"/author/robert-lemos","avatar":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt28d2c260c33375ea/64f14ff471df6264a382aaa0/Robert-Lemos.png","role":""}],"timeRead":4,"paidGating":{"paidContent":false,"paidProductTaxonomy":[]}},{"variant":"normal","contentType":"Article","thumbnail":{"src":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt593e199726732cfa/6740a79dd3998bae66dc9f80/Secure_by_Demand_(1800)_Science_Photo_Library_Alamyo.jpg","alt":"Red padlock on top of a shield shape, with circuit board imagery superimposed; background is orange-yellow"},"articleName":"Going Beyond Secure by Demand","articleUrl":"/vulnerabilities-threats/going-beyond-secure-by-demand","listPageUrl":"/vulnerabilities-threats/going-beyond-secure-by-demand","linkAttrs":{},"mobileHeadline":"Going Beyond Secure by Demand ","date":"Nov 22, 2024","categoryName":"Vulnerabilities \u0026 Threats","categoryUrl":"/vulnerabilities-threats","contributors":[{"name":"Saša Zdjelar","link":"/author/sa-a-zdjelar","avatar":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt72f244ca7124b703/673e4e9471136097dd20e7bb/Zdjelar-Family-173.jpg","role":"Chief Trust Officer, ReversingLabs"}],"timeRead":5,"paidGating":{"paidContent":false,"paidProductTaxonomy":[]}}],"variant":"recent","recentLabel":"CISO Corner","ctaButton":"More Articles for CISOs","ctaButtonLink":"/keyword/ciso-corner","dateDisplay":"show","adPosition":"right","rectangleAdPos":"300_1v","trackGtmUid":"module_featured"}},{"type":"module_newsletter_promo","uid":"bltdcb90f81b445a744","data":{"title":"Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.","message":"","newsletterId":"bltdcb90f81b445a744","buttonText":"Subscribe","variant":"vertical","mode":"dark","isOnHomepage":true}},{"type":"module_content_spotlight","uid":"blt4beb9e93ba690253","data":{"variant":"reversed","moduleDesign":"standard","mode":"light","textAlignment":"center","content":{"articleUrl":"/cyber-risk/dark-reading-confidential-quantum","keywords":[{"title":"CISO Corner","url":"/keyword/ciso-corner"}],"image":{"url":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt0469f94bd17817ff/6642699959fdc64aa5f9c5fa/dark-reading-confidential-logo-sq.jpg","altText":"Black background and white text saying Dark Reading Confidential"},"articleSummary":"Episode #4: NIST's new post-quantum cryptography standards are here, so what comes next? This episode of Dark Reading Confidential digs into the world of quantum computing from a cybersecurity practitioner's point of view — with guests Matthew McFadden, vice president, Cyber, General Dynamics Information Technology (GDIT) and Thomas Scanlon, professor, Heinz College, Carnegie Mellon University. \n \n","summary":"PODCAST","heading":"Dark Reading Confidential: Quantum Has Landed, So Now What?","mobileHeading":"Dark Reading Confidential: Quantum Has Landed, So Now What?","body":"Episode #4: NIST's new post-quantum cryptography standards are here, so what comes next? This episode of Dark Reading Confidential digs into the world of quantum computing from a cybersecurity practitioner's point of view — with guests Matthew McFadden, vice president, Cyber, General Dynamics Information Technology (GDIT) and Thomas Scanlon, professor, Heinz College, Carnegie Mellon University. \n \n","articleBody":[{"type":"paragraph","attrs":{"textAlign":"left"},"content":[{"type":"text","marks":[{"type":"bold"}],"text":"Becky Bracken, senior editor, Dark Reading"}]},{"type":"paragraph","attrs":{"textAlign":"left"},"content":[{"type":"text","text":"Hello and welcome to Dark Reading Confidential. It's a podcast from the editors of Dark Reading focused on bringing you real world stories from inside the cyber trenches. My name is Becky Bracken. I'm an editor with Dark Reading. And today I am joined by Dark Reading's editor-in-chief, Kelly Jackson Higgins for our new episode, “Quantum Has Landed: So Now What?”"}]},{"type":"paragraph","attrs":{"textAlign":"left"},"content":[{"type":"text","text":" Hello, Kelly."}]},{"type":"paragraph","attrs":{"textAlign":"left"}},{"type":"paragraph","attrs":{"textAlign":"left"},"content":[{"type":"text","marks":[{"type":"bold"}],"text":"Kelly Jackson Higgins, editor-in-chief, Dark Reading "}]},{"type":"paragraph","attrs":{"textAlign":"left"},"content":[{"type":"text","text":"Hi, Becky. Thank you."}]},{"type":"paragraph","attrs":{"textAlign":"left"}},{"type":"paragraph","attrs":{"textAlign":"left"},"content":[{"type":"text","marks":[{"type":"bold"}],"text":"Becky Bracken"}]},{"type":"paragraph","attrs":{"textAlign":"left"},"content":[{"type":"text","text":"So why don't you give us just a little overview? We've had many discussions in developing this concept. Tell us why you think that this is important for us to talk about right now."}]},{"type":"paragraph","attrs":{"textAlign":"left"}},{"type":"paragraph","attrs":{"textAlign":"left"},"content":[{"type":"text","marks":[{"type":"bold"}],"text":"Kelly Jackson Higgins"}]},{"type":"paragraph","attrs":{"textAlign":"left"},"content":[{"type":"text","text":"Absolutely, it is really important we take on this topic right now."}]},{"type":"paragraph","attrs":{"textAlign":"left"},"content":[{"type":"text","text":"Even though quantum computing itself isn't really a reality yet in most organizations, obviously, but there are concerns in the cybersecurity community about how cyber criminals, nation states could sort of abuse the technology down the pike to crack today's encryption algorithms that we use for email, VPNs, digital certificates, et cetera, or even to crack stolen encrypted data later time using quantum technology."}]},{"type":"paragraph","attrs":{"textAlign":"left"},"content":[{"type":"text","text":"Albeit futuristic sounding, we still think it's really important issue and there seems to be this sort of rare opportunity for defenders to kind of get ahead of the threat for once. So rather being reactive, being more proactive. I'm really looking forward to our discussion today and kind of digging into that."}]},{"type":"paragraph","attrs":{"textAlign":"left"}},{"type":"paragraph","attrs":{"textAlign":"left"},"content":[{"type":"text","marks":[{"type":"bold"}],"text":"Becky Bracken"}]},{"type":"paragraph","attrs":{"textAlign":"left"},"content":[{"type":"text","text":"I think that it's important for us to note that when we were prepping for this discussion, we were hunting high and low for a practitioner who was really actively working on this, and we came up empty handed. So, part of the issue I think is that the cyber community isn't really yet comfortable talking about quantum. It's not easy to understand. It's not really very easy to explain. And this is particularly true in shops that are constantly dealing with threats that are happening today rather than threats that may happen down the line."}]},{"type":"paragraph","attrs":{"textAlign":"left"},"content":[{"type":"text","text":"So, this month we want to break this down to basics for cyber security practitioners, what you should be doing to prepare for quantum, and its promise to completely pummel our current cryptography standards. This month we are thrilled to welcome Dr. Matthew McFadden. He's vice president of cyber at GDIT and Thomas Scanlon who's professor at Heinz College at Carnegie Mellon University. Welcome to both of you."}]},{"type":"paragraph","attrs":{"textAlign":"left"}},{"type":"paragraph","attrs":{"textAlign":"left"},"content":[{"type":"text","marks":[{"type":"bold"}],"text":"Matthew McFadden, vice president, Cyber, General Dynamics Information Technology (GDIT)"}]},{"type":"paragraph","attrs":{"textAlign":"left"},"content":[{"type":"text","text":"Hey everyone, thanks for being here."}]},{"type":"paragraph","attrs":{"textAlign":"left"}},{"type":"paragraph","attrs":{"textAlign":"left"},"content":[{"type":"text","marks":[{"type":"bold"}],"text":"Thomas Scanlon, professor, Heinz College, Carnegie Mellon University"}]},{"type":"paragraph","attrs":{"textAlign":"left"},"content":[{"type":"text","text":"Hi, great to be here."}]},{"type":"paragraph","attrs":{"textAlign":"left"}},{"type":"paragraph","attrs":{"textAlign":"left"},"content":[{"type":"text","marks":[{"type":"bold"}],"text":"Becky Bracken"}]},{"type":"paragraph","attrs":{"textAlign":"left"},"content":[{"type":"text","text":"Thank you, thank you so much."}]},{"type":"paragraph","attrs":{"textAlign":"left"},"content":[{"type":"text","text":"Okay now, before we turn Matt and Thomas loose on this issue, we have Jim Donahue, our managing editor of Copy Desk and Commentary. He is going to walk us through just a basic primer on quantum and why we care. Most of us know this, but I think it's worth a refresher. I could constantly use one myself."}]},{"type":"paragraph","attrs":{"textAlign":"left"},"content":[{"type":"text","text":"So, Jim, you help us out with that?"}]},{"type":"paragraph","attrs":{"textAlign":"left"}},{"type":"paragraph","attrs":{"textAlign":"left"},"content":[{"type":"text","marks":[{"type":"bold"}],"text":"Jim Donahue, managing editor, commentary and copy desk, Dark Reading"}]},{"type":"paragraph","attrs":{"textAlign":"left"},"content":[{"type":"text","text":"Sure. Thank you, Becky."}]},{"type":"paragraph","attrs":{"textAlign":"left"},"content":[{"type":"text","text":"Quantum computers are currently being developed by teams of computer scientists, physicists, mathematicians, hardware and application developers across the globe with the intent to deliver on the promise of solving even the most complex problems in a fraction of the time of current classic computers. But what's the difference? Well, here it is in very basic terms."}]},{"type":"paragraph","attrs":{"textAlign":"left"},"content":[{"type":"text","text":"Classic computers perform calculations with bits, which are processed as either 0 or 1. It's binary. Quantum computing uses something called qubits, which can process information as both zeros and ones simultaneously to very quickly calculate every possible outcome."}]},{"type":"paragraph","attrs":{"textAlign":"left"},"content":[{"type":"text","text":"So, the current problem is that qubits are incredibly difficult to create, and they require lab conditions. In addition to something like a magnet or laser pulses to bounce those bits so quickly back and forth, they can start existing at both the zero and one position at the same time. Now, once it's pinging so hard, its position is indiscernible, the qubit is defined as being in “superposition.”"}]},{"type":"paragraph","attrs":{"textAlign":"left"},"content":[{"type":"text","text":"Scientists still haven't figured out a reliable way, though, to make those qubits or a way to keep them from flaming out very quickly once they've achieved superposition, but they are working on it, of course. Quantum promises to be a very powerful predictor of the best answer to the most complex problems. This quantum computing power will be used to smooth out supply chains, create life-saving drugs, and yeah, unfortunately, to break cryptographic algorithms."}]},{"type":"paragraph","attrs":{"textAlign":"left"},"content":[{"type":"text","text":"In fact, quantum computing will be able to crack the foundational public key infrastructure upon which information security is built, including ECC and RSA, used to protect the security of every HTTPS protocol website."}]},{"type":"paragraph","attrs":{"textAlign":"left"},"content":[{"type":"text","text":"So that leaves every instance of cryptography used in every instance, in every organization across the world, vulnerable to post quantum computing. And it all needs to be updated to new quantum resistant cryptography standards, recently released by the National Institute of Standards and Technology."}]},{"type":"paragraph","attrs":{"textAlign":"left"},"content":[{"type":"text","text":"And this of course is a very simplified overview of an incredibly complex computing revolution. But I turn things over to our guests, Thomas and Matt, and do you want to correct anything that I said here or add to the basic understanding of quantum computing?"}]},{"type":"paragraph","attrs":{"textAlign":"left"}},{"type":"paragraph","attrs":{"textAlign":"left"},"content":[{"type":"text","marks":[{"type":"bold"}],"text":"Matthew McFadden"}]},{"type":"paragraph","attrs":{"textAlign":"left"},"content":[{"type":"text","text":"Yeah, Jim, I guess a couple things, right?"}]},{"type":"paragraph","attrs":{"textAlign":"left"},"content":[{"type":"text","text":"So, you know, I think part of this is, you know, the algorithm's been that quantum computers use, right? I think the one that we typically have mentioned is Shor's algorithm, which is, I think was created in 1994. So, there's a little bit of optimization there. We don't know necessarily how adversaries have optimized the algorithms to be able to essentially crack those current encryption methods, such as RSA. So, there's an optimization challenge."}]},{"type":"paragraph","attrs":{"textAlign":"left"},"content":[{"type":"text","text":"The other piece is quantum computers are here now. So, part of talking a little bit about the qubits, right? There is somewhere of an estimate of, they're going to need about 10,000 qubits to really be able to crack current encryption methods. Some of the latest quantum computers out right now are, are about 1,000 or so. But then again, it goes back to optimization. Do they really need 10,000, or do they need a thousand or five hundred? So, there's a lot of unknowns out there."}]},{"type":"paragraph","attrs":{"textAlign":"left"},"content":[{"type":"text","text":"There's been a couple of recent articles showing where adversaries and researchers have been going through and actually doing proof of concepts of showing basically the cracking most recently with 22 bit. But the best practice standard right now is 2048 bits for RSA. So, there's a lot of, I guess, stuff that we don't know yet, but I think it expresses the urgency of why this is so important, why we need to migrate quickly."}]},{"type":"paragraph","attrs":{"textAlign":"left"}},{"type":"paragraph","attrs":{"textAlign":"left"},"content":[{"type":"text","marks":[{"type":"bold"}],"text":"Thomas Scanlon"}]},{"type":"paragraph","attrs":{"textAlign":"left"},"content":[{"type":"text","text":"Yeah, great points, Matt. I also like to highlight as we get into availability of quantum compute, is getting nearer, there's both threats and opportunities. And so, there's things the organizations need to do in terms of getting ready for post quantum crypto, which is we're going to talk about today. But organizations should also be laying out like quantum use cases. And what could I do with a quantum computer? How would I solve those?"}]},{"type":"paragraph","attrs":{"textAlign":"left"},"content":[{"type":"text","text":"challenges in medicine and pharmaceuticals that Becky mentioned in the open. You don't want the capability to be there and you're not ready for it. So now is a great time to start road mapping. What would I do for good with a quantum computer to help my business or help my organization?"}]},{"type":"paragraph","attrs":{"textAlign":"left"}},{"type":"paragraph","attrs":{"textAlign":"left"},"content":[{"type":"text","marks":[{"type":"bold"}],"text":"Kelly Jackson Higgins"}]},{"type":"paragraph","attrs":{"textAlign":"left"},"content":[{"type":"text","text":"Yeah, let's jump into this a little bit for our listeners who typically are the security operations folks out there trying to figure out how to make sense of all this. I think, you know, really the catalyst to this whole conversation has kind of been the federal government, the US government's kind of forward thinking of how we handle this problem right down the future. And of course, this new post quantum crypto standards that were announced a few weeks ago, you know, more in a full not no longer just a draft."}]},{"type":"paragraph","attrs":{"textAlign":"left"},"content":[{"type":"text","text":"Starting with Matt, Matthew, how would you kind of characterize for cybersecurity teams what they need to know about the standards and then just sort of how do they decide how they roll them out or how they plan to roll them out, that kind of thing? I'm hearing things about like hybrid approaches some organizations are taking, you know, how would you kind of help folks navigate that?"}]},{"type":"paragraph","attrs":{"textAlign":"left"}},{"type":"paragraph","attrs":{"textAlign":"left"},"content":[{"type":"text","marks":[{"type":"bold"}],"text":"Matthew McFadden"}]},{"type":"paragraph","attrs":{"textAlign":"left"},"content":[{"type":"text","text":"So, this is a multi-threading question. So being a, you know, GDIT, you know, we're very focused, very focused on the implementation. You know, we support a lot of different agencies in that migration. So, one of the, one of the efforts I lead is our R\u0026D around what's called our title, post-quantum cryptography, a digital accelerator. So, you know, we foresaw this coming."}]},{"type":"paragraph","attrs":{"textAlign":"left"},"content":[{"type":"text","text":"We wanted to make sure that we could help accelerate agencies as quickly as possible to this. But the reality, right, is I think Jim or Tom mentioned, right, the standards just came online, right? So, the final standards were just approved in August. So, you know, they weren't quite there to implement. Most of the hybrid approaches were, hey, you know, they're going to use Crystals Kyber, and they developed a hybrid implementation of that — not necessarily the ML chem standard that was approved as part of FITS."}]},{"type":"paragraph","attrs":{"textAlign":"left"},"content":[{"type":"text","text":"So, I think it's part of the, you know, there's a big importance of driving education, not only to like CISOs and CIOs, but I mean, broader system owners and understanding, okay, there are new standards out there. This is the risk. And this is how we need to go about the migration."}]},{"type":"paragraph","attrs":{"textAlign":"left"},"content":[{"type":"text","text":"I think one of the things that at least I try to do with conversations is just having them understand like this now becomes part of compliance, right? It's part of the FIPS (federal information processing standards certification), you know, 203, 204, 205 standards to get a, you know, an ATO (authorization to operate), you know, we have to go through and begin to migrate. But I think it goes back to there. There's this much broader industry challenge where even if you wanted to migrate, you can't necessarily because basically the industry hardware and software has to basically retool their entire ecosystem —back to the question like hybrid, right?"}]},{"type":"paragraph","attrs":{"textAlign":"left"},"content":[{"type":"text","text":"Like you may have seen like where Google, you know, as part of Chrome, they implemented a hybrid implementation. Well, now ML chem got approved, and now they're working to, you know, take that standard and put it back into the browser, which isn't there yet. It's coming in the next few weeks."}]},{"type":"paragraph","attrs":{"textAlign":"left"}},{"type":"paragraph","attrs":{"textAlign":"left"},"content":[{"type":"text","marks":[{"type":"bold"}],"text":"Thomas Scanlon"}]},{"type":"paragraph","attrs":{"textAlign":"left"},"content":[{"type":"text","text":"Yeah, I think the good news is there's a bit of a blueprint for organizations how to approach this and I'm going to go back a quarter century, but there's some parallels to the Y2K problem, right?"}]},{"type":"paragraph","attrs":{"textAlign":"left"},"content":[{"type":"text","text":"And so, you had these Y2K calculations in disparate systems and pieces of code all over the place. And you had to go through and exercise as an organization to inventory them and decide which ones you wanted to change and which ones you're going to let go and exceed up the risk and those types of decisions."}]},{"type":"paragraph","attrs":{"textAlign":"left"},"content":[{"type":"text","text":"That's reflective of the guidance from both NIST and DHS (Department of Homeland Security) on how to approach post-quantum crypto. They start with inventorying all the places you're using crypto and then doing some type of triaging step where you determine what are the high value things that you have to change either because they're just high value systems for you or they have sensitive data in there, maybe the rather classified data or PII or some other type of sensitive data."}]},{"type":"paragraph","attrs":{"textAlign":"left"},"content":[{"type":"text","text":"And so, the sort of recipe, the procedures are fairly straightforward from this in DHS. Like most things though, the devil is in the details as Matt was just illuminating on. You can decide you want to change the crypto in a certain system, but you may not be able to because the hardware, the firmware doesn't support it. It could be that changing to the post quantum crypto algorithm changes the compute timing. And if you're in an area where you need real time responsiveness."}]},{"type":"paragraph","attrs":{"textAlign":"left"},"content":[{"type":"text","text":"And now the algorithm is more complex. It may affect the timing of your compute. It may also be that your business partners aren't migrating. So, there's a lot of factors that go in. And it's easy to say inventory your stuff, decide what you need to change and change it. It's not that straightforward at all."}]},{"type":"paragraph","attrs":{"textAlign":"left"}},{"type":"paragraph","attrs":{"textAlign":"left"},"content":[{"type":"text","marks":[{"type":"bold"}],"text":"Kelly Jackson Higgins"}]},{"type":"paragraph","attrs":{"textAlign":"left"},"content":[{"type":"text","text":"So, it is sort of like a cyber risk analysis type thing you have to do, is that right? Would you kind of characterize it that way?"}]},{"type":"paragraph","attrs":{"textAlign":"left"}},{"type":"paragraph","attrs":{"textAlign":"left"},"content":[{"type":"text","marks":[{"type":"bold"}],"text":"Thomas Scanlon"}]},{"type":"paragraph","attrs":{"textAlign":"left"},"content":[{"type":"text","text":"I say that's definitely part of it."}]},{"type":"paragraph","attrs":{"textAlign":"left"},"content":[{"type":"text","text":"And so if you're in large organizations, be it in government or industry, where you're going to put a team on this, you definitely need people in the team that understand quantum or quantum experts, but you probably want some traditional software or cyber engineers and some cyber risk folks, because at some point you're going to have to make a decision such as, okay, we can't upgrade this thing we want to because the vendor is not cooperating."}]},{"type":"paragraph","attrs":{"textAlign":"left"}},{"type":"paragraph","attrs":{"textAlign":"left"},"content":[{"type":"text","text":"Do we accept the risk and just use it with the RSA and not upgrade it? Or do we replace it and buy a whole new, which could be a costly decision, switch vendors and things like that. So, there are going to be business and risk decisions as part of this equation. It's not all just technical."}]},{"type":"paragraph","attrs":{"textAlign":"left"}},{"type":"paragraph","attrs":{"textAlign":"left"},"content":[{"type":"text","marks":[{"type":"bold"}],"text":"Becky Bracken"}]},{"type":"paragraph","attrs":{"textAlign":"left"},"content":[{"type":"text","text":"You're talking about all of this layer of complexity on top of the complexity of quantum itself and it's kind of making my head hurt a little bit. Is that maybe why we're having a hard time finding cyber shops that are working on this in real time? Is it just a difficult thing to even wrap your head around, much less get actualized, or what is going on inside enterprise cyber teams right now with relation to this? Matt, we'll start with you and then get Thomas's thoughts."}]},{"type":"paragraph","attrs":{"textAlign":"left"}},{"type":"paragraph","attrs":{"textAlign":"left"},"content":[{"type":"text","marks":[{"type":"bold"}],"text":"Matthew McFadden"}]},{"type":"paragraph","attrs":{"textAlign":"left"},"content":[{"type":"text","text":"Sure, so I think one of the things that you're seeing is the emphasis on really having a cohesive strategy. And I think governance is a key piece of that, like what we've seen with the zero-trust implementations."}]},{"type":"paragraph","attrs":{"textAlign":"left"},"content":[{"type":"text","text":"So, I mean, if you're a large organization, you're a CISO or CIO, right? I mean you could have hundreds of thousands of systems. A lot of times they are decentralized. You have different sub-agencies and components. There's a lot of coordination to understand, well, where should I migrate first?"}]},{"type":"paragraph","attrs":{"textAlign":"left"},"content":[{"type":"text","text":"So, one of the things that we've seen in government with some of the OMB (US Office of Management and Budget) requirements is basically, hey, you must conduct a systems inventory. And generally, that inventory has been very manual, right? And it's been focused on, hey, here are my high value assets or systems, right? So, the reality, right, is there's that risk equation to this where ... you know, not everything's going to migrate at once."}]},{"type":"paragraph","attrs":{"textAlign":"left"},"content":[{"type":"text","text":"You know, we must make a risk-based decision. What is the highest priority? So, you know, that could be, you know, high risk system, national security system, you know, let's, let's focus on those first. But with that, right, there's a lot of different complexities."}]},{"type":"paragraph","attrs":{"textAlign":"left"},"content":[{"type":"text","text":"Like it sounds easy. yeah, just, you know, replace this encryption or certificate. But the reality that I found is like, I mean, there's so many different relationships between these different types of certificates and the different algorithms that they use, there's a lot of complexity to it. You may have vulnerable algorithms in identity, in your devices, in your network, as part of your applications, even as part of the source code that you're developing. We've seen a mixed strategy, where, you know, even as part of discovery, leveraging a certain set of core tools to help with that inventory and then even looking at, you know, more specialized tools."}]},{"type":"paragraph","attrs":{"textAlign":"left"},"content":[{"type":"text","text":"So, one of the examples, right, we just did a research study where we surveyed 200 agency decision makers. And I think they found about 44 % of those were looking to leverage vulnerability management tools to at least begin to assess, you know, where their vulnerable algorithms are. And I would say most of that has been focused on like TLS (transport layer security), which is like web servers, websites. So, there's, I would say there's a lot of gaps and a lot of things that are missing."}]},{"type":"paragraph","attrs":{"textAlign":"left"}},{"type":"paragraph","attrs":{"textAlign":"left"},"content":[{"type":"text","marks":[{"type":"bold"}],"text":"Thomas Scanlon"}]},{"type":"paragraph","attrs":{"textAlign":"left"},"content":[{"type":"text","text":"Yeah, and I get a lot of inquiries. We mentioned there's not a lot of people practicing right now in doing this, but there is a lot of chatter and discussion. And so, I do get a lot of inquiries here at the university from different organizations, both industry and government, about what they should be thinking about, what they should be doing."}]},{"type":"paragraph","attrs":{"textAlign":"left"},"content":[{"type":"text","text":"And I think part of what's holding some of them back is they're kind of waiting for others to go first."}]},{"type":"paragraph","attrs":{"textAlign":"left"},"content":[{"type":"text","text":"And so, while we have this high-level guidance from NIST and then I mentioned DHS also has some about what you should do, we're not to the level yet where we have like best practices and lessons learned and these types of things."}]},{"type":"paragraph","attrs":{"textAlign":"left"},"content":[{"type":"text","text":"And so, when you do get into those more in the weeds decisions that Matt and I talked about earlier, what types of dispositions do you have? What should you do? It's a lot easier to lean on a vendor to make a change when there's other organizations also leading on the vendor."}]},{"type":"paragraph","attrs":{"textAlign":"left"},"content":[{"type":"text","text":"Even someone with as much buying power as US government, it's hard to lean on a vendor if they're the only one. But if they're leading on it and half of the Fortune 500 companies are leaning on them, then you get change. And so, I think some folks are a little hesitant to be the first ones out in front of this."}]},{"type":"paragraph","attrs":{"textAlign":"left"}},{"type":"paragraph","attrs":{"textAlign":"left"},"content":[{"type":"text","marks":[{"type":"bold"}],"text":"Becky Bracken"}]},{"type":"paragraph","attrs":{"textAlign":"left"},"content":[{"type":"text","text":"But someone's going to have to be (first). And so, who do we think that is? Are we going to reach sort of a maximum capacity where everybody (makes the transition); is there going to be a big breach? Like what do you think is going to be the catalyst of these sectors moving and which sectors do you think will move first? I'm thinking banking. They're usually out in front. I don't know."}]},{"type":"paragraph","attrs":{"textAlign":"left"}},{"type":"paragraph","attrs":{"textAlign":"left"},"content":[{"type":"text","marks":[{"type":"bold"}],"text":"Thomas Scanlon"}]},{"type":"paragraph","attrs":{"textAlign":"left"},"content":[{"type":"text","text":"Yeah, banking is a good call because they are usually on the front of cyber. They're under attack 24 seven, right?"}]},{"type":"paragraph","attrs":{"textAlign":"left"},"content":[{"type":"text","text":"But I think that's a good question you raise. You know, it may take some type of provable breach to be the catalyst to spark everyone out of fear, right? So right now, they can still keep it at arms distance and say, well, quantum's not really a threat yet. It's out in the future. Until something happens to somebody else, I'm not worried about it, right? And so, it could be even something proved in a lab or we haven't talked yet about what cyber criminals are doing today, which is harvesting data to break the encryption audit in the future, even though they know they can't break it now. Maybe some harvested data gets broken or something like that. I think some event that gets a lot of publicity and when puts a scare into folks will kind of be a catalyst."}]},{"type":"paragraph","attrs":{"textAlign":"left"}},{"type":"paragraph","attrs":{"textAlign":"left"},"content":[{"type":"text","marks":[{"type":"bold"}],"text":"Becky Bracken"}]},{"type":"paragraph","attrs":{"textAlign":"left"},"content":[{"type":"text","text":"Is that your assessment as well, Matthew?"}]},{"type":"paragraph","attrs":{"textAlign":"left"}},{"type":"paragraph","attrs":{"textAlign":"left"},"content":[{"type":"text","marks":[{"type":"bold"}],"text":"Matthew McFadden"}]},{"type":"paragraph","attrs":{"textAlign":"left"},"content":[{"type":"text","text":"Yeah, like, I don't know, I think I'm going back to the original, right?"}]},{"type":"paragraph","attrs":{"textAlign":"left"},"content":[{"type":"text","text":"Compliance, I think, is a big driving factor to this now. there's ML Chem as a standard as part of FIPS, 203, 204, 205. Now to get as part of the accreditation, they have to go through this process. I would say generally, industry begins to adopt those standards. So really, that is the forcing function. Not to say whenever we have a significant event, that's always a driving force."}]},{"type":"paragraph","attrs":{"textAlign":"left"},"content":[{"type":"text","text":"Then again, you know, I think net folks are at least aware, it's part of compliance. They're trying to work through that. I think one of the things we didn't talk as much about is like even in acquisition, like the hardware and software supply chain is even key with that. So, we may want to select vendors that are more likely going to meet these standards in the future."}]},{"type":"paragraph","attrs":{"textAlign":"left"}},{"type":"paragraph","attrs":{"textAlign":"left"},"content":[{"type":"text","marks":[{"type":"bold"}],"text":"Kelly Jackson Higgins"}]},{"type":"paragraph","attrs":{"textAlign":"left"},"content":[{"type":"text","text":"Thomas, you brought up something I was going to ask about, and that was this whole concern about adversaries that have or will already have or will download encrypted data today that they've stolen and be able to crack it in the future. Talk about that a little bit. Is that something that might spark some more activity from organizations or more, guess, I can't think of the word I'm spark some movement, I think, by organizations from the top to say, “this is something we need to worry about soon rather than later?”"}]},{"type":"paragraph","attrs":{"textAlign":"left"}},{"type":"paragraph","attrs":{"textAlign":"left"},"content":[{"type":"text","marks":[{"type":"bold"}],"text":"Thomas Scanlon"}]},{"type":"paragraph","attrs":{"textAlign":"left"},"content":[{"type":"text","text":"Yeah, unfortunately, I would say I guess not. I say that because it's definitely happening today that folks are harvesting data to encrypt later. It's not like a theoretical thing. It's fairly well documented and understood. So, folks are doing that. And that hasn't triggered the kind of reaction that we've been talking about on this podcast."}]},{"type":"paragraph","attrs":{"textAlign":"left"},"content":[{"type":"text","text":"I think part of the thing you need to think about when folks are harvesting that data to decrypt it in the future, a lot of that data probably won't have value when the time comes. And it's not like as soon as the decrypting capability becomes available that it's going to be ubiquitous and everyone's going to be able to decrypt everything. It's going to be expensive. It's still going to be a limited resource on these computers. And so it's going to be the most valuable data that they're going to go after decrypting first."}]},{"type":"paragraph","attrs":{"textAlign":"left"},"content":[{"type":"text","text":"And so, it's gonna be a highly valued and limited resource, just like any other breakthrough in computing, it'll scale up over time. But all this harvested data, a lot of it's just never going to get decrypted, I don't think."}]},{"type":"paragraph","attrs":{"textAlign":"left"}},{"type":"paragraph","attrs":{"textAlign":"left"},"content":[{"type":"text","marks":[{"type":"bold"}],"text":"Kelly Jackson Higgins"}]},{"type":"paragraph","attrs":{"textAlign":"left"},"content":[{"type":"text","text":"What do you think, Matthew, on that topic?"}]},{"type":"paragraph","attrs":{"textAlign":"left"}},{"type":"paragraph","attrs":{"textAlign":"left"},"content":[{"type":"text","marks":[{"type":"bold"}],"text":"Matthew McFadden"}]},{"type":"paragraph","attrs":{"textAlign":"left"},"content":[{"type":"text","text":"Yeah, well, it's like back to we don't know what we don't know, right? So, I think part of that strategy is why we're really trying to prioritize that highly sensitive data first. The other piece is, you know, there's some systems that we won't be able to migrate, right? There's a lot of legacy systems out there. I know in our research study, I think we found that, you know, for 40% (of cyber professional surveyed by GDIT) it was a big concern."}]},{"type":"paragraph","attrs":{"textAlign":"left"},"content":[{"type":"text","text":"So, it's like, well, what do you do with those systems, right? Do you completely retool those and that’s a significant cost, you know, time and money, or, you know, is there some type of bolt-on solution that we can implement? I think the good thing is this conversation is really driving awareness. And I think that's what we need to continue to do."}]},{"type":"paragraph","attrs":{"textAlign":"left"},"content":[{"type":"text","text":"At the same time, I think organizations need to drive that top-down strategy and it's not necessarily just the technical solution, right? It's having people, it’s having teams, and it's having a budget to allocate the resources to support that large-scale migration."}]},{"type":"paragraph","attrs":{"textAlign":"left"}},{"type":"paragraph","attrs":{"textAlign":"left"},"content":[{"type":"text","marks":[{"type":"bold"}],"text":"Kelly Jackson Higgins"}]},{"type":"paragraph","attrs":{"textAlign":"left"},"content":[{"type":"text","text":"I can think of so many challenges to the sum of things you both talked about. You know, we're already terrible at IT resource inventory and visibility, right? That's a huge problem, even more so now with the cloud and IoT. And it just seems like this is one of the things you must get visibility for. And it seems like it would be easier to wait since it's a narrower slice, but I don't know. Correct me if I'm wrong, is this an easier thing to get a full picture of or not of what you have out there in terms of encryption?"}]},{"type":"paragraph","attrs":{"textAlign":"left"}},{"type":"paragraph","attrs":{"textAlign":"left"},"content":[{"type":"text","marks":[{"type":"bold"}],"text":"Matthew McFadden"}]},{"type":"paragraph","attrs":{"textAlign":"left"},"content":[{"type":"text","text":"No, but I think it's been a forcing function once again, because it's driving the importance of encryption. And I go back to the foundations, right? The most fundamental aspect of cybersecurity is encryption, right? We can't do zero trust and all those other great things of securing data in transit or at rest without encryption. So, we better get that right."}]},{"type":"paragraph","attrs":{"textAlign":"left"},"content":[{"type":"text","text":"But now we really have to understand how it's being managed, where is it located, you know, what hardware and software is a part of it, and do we really have the right tools to provide that visibility and situational awareness? Most of the time, you know, most agencies and organizations, I don't think are quite there. But that's where we're working to help drive and understand, okay, how can we leverage a lot of their existing investments or their SOC tools or things and then supplement with specialized tooling where it makes sense."}]},{"type":"paragraph","attrs":{"textAlign":"left"}},{"type":"paragraph","attrs":{"textAlign":"left"},"content":[{"type":"text","marks":[{"type":"bold"}],"text":"Thomas Scanlon"}]},{"type":"paragraph","attrs":{"textAlign":"left"},"content":[{"type":"text","text":"Yeah, I going to say it may seem narrow at first blush, but a Matt hits on some of these points. In the cybersecurity world, we've been pushing encryption for years, encrypt your data at rest, use HTTPS, do full disk encryption, encryption, encryption, encryption is everywhere. And so, we've talked about RSA on this call, there's other encryptions too, right? And so, encryption is everywhere, and they will all be vulnerable in the future. so, that's why we’ve kind of come full circle now. That's why it is like a business risk decision to some degree because some of the places where you use encryption are going to have to wait. They're just going to have to. And so, you want to make sure you hit those high value places first."}]},{"type":"paragraph","attrs":{"textAlign":"left"}},{"type":"paragraph","attrs":{"textAlign":"left"},"content":[{"type":"text","marks":[{"type":"bold"}],"text":"Kelly Jackson Higgins"}]},{"type":"paragraph","attrs":{"textAlign":"left"},"content":[{"type":"text","text":"I keep thinking about how long it took for like, you know, SSH and TLS to be fully updated across systems. It just takes time, right? And that's going to be, it seems like another example of a new, you know, better technology challenge, but it won't happen overnight by any means."}]},{"type":"paragraph","attrs":{"textAlign":"left"},"content":[{"type":"text","text":"So, I know we've talked about a lot of things. I kind of want to circle back to what you would recommend right now. The first thing that someone that organization should be doing right now, I think."}]},{"type":"paragraph","attrs":{"textAlign":"left"},"content":[{"type":"text","text":"You touched on Matthew that compliance is going to force federal agencies, defense contractors, other folks who are regulatory driven a little more quickly than others. For those that may not have that pressure right now, what would you recommend that they start doing like to get the ball rolling?"}]},{"type":"paragraph","attrs":{"textAlign":"left"}},{"type":"paragraph","attrs":{"textAlign":"left"},"content":[{"type":"text","marks":[{"type":"bold"}],"text":"Matthew McFadden"}]},{"type":"paragraph","attrs":{"textAlign":"left"},"content":[{"type":"text","text":"Sure. So, a couple things. I know one of things that we've been working on is like, what does a maturity model look like? And we broke it up into kind of three areas of: discovery, assessment and management. So, if you could do those three effectively, we're trying to move agencies towards what's called crypto agility. So, if any new standards come out in the future, and guess what? There are these are just the first three, we can be ready to change out those algorithms."}]},{"type":"paragraph","attrs":{"textAlign":"left"},"content":[{"type":"text","text":"So, I would say a couple of things that we've learned. One, you should formalize your strategy and your governance from the top down. The second piece is really strengthening that technology foundation. So once again, you have to have the right tools to manage and understand that visibility. The third thing is workforce, right?"}]},{"type":"paragraph","attrs":{"textAlign":"left"},"content":[{"type":"text","text":"So, us cyber folks are talking about this. Those other system owners and businesspeople don't necessarily understand that risk and challenge. So, education is key. The fourth thing is it's about prioritization. It's not all going to happen at once. It's you know, it's how do you prioritize the high-risk high risk first."}]},{"type":"paragraph","attrs":{"textAlign":"left"},"content":[{"type":"text","text":"And then the last thing is what we're really trying to get to is a better cryptography management. So, some of the organizations I've dealt with, they realize that if I can manage the issuance of these secure certificates and algorithms, lest I have to migrate down the line. So, let's really focus on the management using KSM (key management systems) and HSMs (hardware security models) that support some of this stuff. But anyway, back to really, it's the discovery, assessment, and management that really helps achieve that crypto agility."}]},{"type":"paragraph","attrs":{"textAlign":"left"}},{"type":"paragraph","attrs":{"textAlign":"left"},"content":[{"type":"text","marks":[{"type":"bold"}],"text":"Thomas Scanlon"}]},{"type":"paragraph","attrs":{"textAlign":"left"},"content":[{"type":"text","text":"Yeah, picking up on what said, in my experience, very few organizations have crypto management or view crypto as an asset that way. So normally you get to the crypto by looking at some other type of asset management. So, people know they have this hardware, these software systems, and then you say, okay, well, which crypto is it using? But they don't have a worldview that starts with crypto. Here's all the crypto my organization wanted to use."}]},{"type":"paragraph","attrs":{"textAlign":"left"},"content":[{"type":"text","text":"But as far as things organizations should do now, I guess maybe I have two things. So, one is for sure, at least understand your attack surface, if you will, do some threat modeling. Even if you don't get to the triaging and prioritization phase, you should be able to understand all the places you're vulnerable for crypto attacks, where crypto is used, which algorithms are being used and things like that. At least understand that's something organizations can do now, like within a calendar year, is understand their attack surface and what they're vulnerable to. And then that can lead to filling out the triaging and the prioritization of what we're actually going to do."}]},{"type":"paragraph","attrs":{"textAlign":"left"},"content":[{"type":"text","text":"The second thing is I would start paying attention now to contract language, putting in with your vendors in your supply chain language about their adoption and their plans for post-quantum crypto, maybe in some ways limiting your liability, but also just making sure that the folks you deal with have an understanding that this is a problem, that they also have a plan. It would be great if they had concrete plans, but they may not yet either, right? And so, you don't want to hold them to that, you ever get a contract done but have contract language in there talking about post-quantum crypto."}]},{"type":"paragraph","attrs":{"textAlign":"left"},"content":[{"type":"text","text":"In the government space, we can create seed rules and things which are standard contract language that government agencies can use. This has been done for other areas of cyber and software engineering, where there's standard seed rules that can go into contracts. On the industry side, they have similar types of things. They don't call them seed rules, but standard template contract language. Start working on that now to see what you want to put in your agreements. So, in the future, when you call on those business partners you can make sure you kind of have a leg to stand on."}]},{"type":"paragraph","attrs":{"textAlign":"left"}},{"type":"paragraph","attrs":{"textAlign":"left"},"content":[{"type":"text","marks":[{"type":"bold"}],"text":"Kelly Jackson Higgins"}]},{"type":"paragraph","attrs":{"textAlign":"left"},"content":[{"type":"text","text":"Okay, I know this is a hard problem, but I feel better about it now. After hearing from you guys. Thank you."}]},{"type":"paragraph","attrs":{"textAlign":"left"}},{"type":"paragraph","attrs":{"textAlign":"left"},"content":[{"type":"text","marks":[{"type":"bold"}],"text":"Becky Bracken"}]},{"type":"paragraph","attrs":{"textAlign":"left"},"content":[{"type":"text","text":"I was going to say I feel the exact same way. I started out getting a little panicked, but they talked me back down with some practicalities. I want to thank you both, Matthew McFadden and Thomas Scanlon, so much for your time today and your deep expertise. I hope that our audience's blood pressure went down along with mine as you guys spoke about this."}]},{"type":"paragraph","attrs":{"textAlign":"left"},"content":[{"type":"text","text":"Speaking of our audience, we want to thank you all for joining this month's episode of Dark Reading Confidential, “Quantum Has Landed: So Now What?” On behalf of Kelly, Jim, and the entire Dark Reading team, we hope you'll join us next time for another episode of Dark Reading Confidential. It's a podcast from the editors of Dark Reading focused on telling real world stories straight from the cyber trenches. Thank you all and see you next time."}]},{"type":"paragraph","attrs":{"textAlign":"left"}}],"callToAction":{"text":"LISTEN TO THE EPISODE","url":"/cyber-risk/dark-reading-confidential-quantum"},"categoryName":"Cyber Risk","categoryUrl":"/cyber-risk","date":"2024-11-05T14:10:00.000Z","linkAttrs":{},"timeRead":31,"paidGating":{"paidContent":false,"paidProductTaxonomy":[]}},"title":"Podcast HP Promo","contentType":"Podcast","listPageUrl":"/podcasts"}},{"type":"module_latest_and_featured","uid":"blt874dc58dc2bd766c","data":{"title":"Latest Content","leftColumnData":{"title":"Latest News","contents":[{"type":"contentPreview","data":{"thumbnail":{"alt":"Two hands typing on a laptop's keyboard, with a digital overlay","src":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt6a62663944a43a13/674629fa4b6244f51f919947/TippaPatt-software-development-shutterstock.jpg"},"articleName":"Ransomware Gangs Seek Pen Testers to Boost Quality","mobileHeadline":"Ransomware Gangs Seek Pen Testers to Boost Quality","articleUrl":"/threat-intelligence/ransomware-gangs-seek-pen-testers-boost-professionalism","listPageUrl":"/threat-intelligence/ransomware-gangs-seek-pen-testers-boost-professionalism","linkAttrs":{},"contentType":"Article","date":"Nov 29, 2024","webinarStartTime":"","categoryName":"Threat Intelligence","categoryUrl":"/threat-intelligence","variant":"small","contributors":[{"name":"Robert Lemos, Contributing Writer","link":"/author/robert-lemos","avatar":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt28d2c260c33375ea/64f14ff471df6264a382aaa0/Robert-Lemos.png","title":"","role":""}],"timeRead":4,"paidGating":{"paidContent":false,"paidProductTaxonomy":[]}}},{"type":"contentPreview","data":{"thumbnail":{"alt":"The Russian flag covered by code on a laptop screen","src":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt2a398059c351b556/67475250f8c46b7f032fc959/russia_PHOTOCREO_Michal_Bednarek_shutterstock.jpg"},"articleName":"'Operation Undercut' Adds to Russia Malign Influence Campaigns","mobileHeadline":"'Operation Undercut' Adds to Russia Malign Influence Campaigns","articleUrl":"/cybersecurity-operations/operation-undercut-russia-malign-influence-campaigns","listPageUrl":"/cybersecurity-operations/operation-undercut-russia-malign-influence-campaigns","linkAttrs":{},"contentType":"Article","date":"Nov 27, 2024","webinarStartTime":"","categoryName":"Cybersecurity Operations","categoryUrl":"/cybersecurity-operations","variant":"small","contributors":[{"name":"Jai Vijayan, Contributing Writer","link":"/author/jai-vijayan","avatar":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt1a674355ce57f27b/64f14f228727730c7f926217/Jai-Vijayan.jpeg","title":"","role":""}],"timeRead":3,"paidGating":{"paidContent":false,"paidProductTaxonomy":[]}}},{"type":"ad","data":{"pos":"native_latestleft_1v"}},{"type":"contentPreview","data":{"thumbnail":{"alt":"A blue credit card on a fish hook being dangled above a computer keyboard","src":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt3317719ff4b0bbee/6747152ee2b6b17ae587bdee/cardskimming_Kim_Kuperkova_shutterstock.jpg"},"articleName":"Sneaky Skimmer Malware Targets Magento Sites Ahead of Black Friday","mobileHeadline":"Sneaky Skimmer Malware Targets Magento Sites Ahead of Black Friday","articleUrl":"/application-security/sneaky-skimmer-malware-magento-sites-black-friday","listPageUrl":"/application-security/sneaky-skimmer-malware-magento-sites-black-friday","linkAttrs":{},"contentType":"Article","date":"Nov 27, 2024","webinarStartTime":"","categoryName":"Application Security","categoryUrl":"/application-security","variant":"small","contributors":[{"name":"Elizabeth Montalbano, Contributing Writer","link":"/author/elizabeth-montalbano","avatar":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt3a8c7badad2ca168/64f15cd2b4c236805e4fddad/ElizabethMontalbano.jpg","title":"","role":""}],"timeRead":3,"paidGating":{"paidContent":false,"paidProductTaxonomy":[]}}},{"type":"contentPreview","data":{"thumbnail":{"alt":"Vector green digital code rain in a Matrix inspired futuristic style","src":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/bltd9544fe544dde688/674635c9fde1977e265db529/matrix_Kundra_shutterstock.jpg"},"articleName":"Russian Script Kiddie Assembles Massive DDoS Botnet","mobileHeadline":"Russian Script Kiddie Assembles Massive DDoS Botnet","articleUrl":"/cyberattacks-data-breaches/russian-script-kiddie-assembles-massive-ddos-botnet","listPageUrl":"/cyberattacks-data-breaches/russian-script-kiddie-assembles-massive-ddos-botnet","linkAttrs":{},"contentType":"Article","date":"Nov 27, 2024","webinarStartTime":"","categoryName":"Cyberattacks \u0026 Data Breaches","categoryUrl":"/cyberattacks-data-breaches","variant":"small","contributors":[{"name":"Jai Vijayan, Contributing Writer","link":"/author/jai-vijayan","avatar":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt1a674355ce57f27b/64f14f228727730c7f926217/Jai-Vijayan.jpeg","title":"","role":""}],"timeRead":4,"paidGating":{"paidContent":false,"paidProductTaxonomy":[]}}},{"type":"contentPreview","data":{"thumbnail":{"alt":"A screen showing the Windows 11 logo","src":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt665c5e44e3b036f8/6706f434d8c4923c6a1a9e28/mundissima-windows-11-photo-shutterstock.jpg"},"articleName":"Microsoft Finally Releases Recall as Part of Windows Insider Preview","mobileHeadline":"Microsoft Previews Recall in Windows Insider","articleUrl":"/endpoint-security/microsoft-releases-recall-windows-insider-preview","listPageUrl":"/endpoint-security/microsoft-releases-recall-windows-insider-preview","linkAttrs":{},"contentType":"Article","date":"Nov 27, 2024","webinarStartTime":"","categoryName":"Endpoint Security","categoryUrl":"/endpoint-security","variant":"small","contributors":[],"timeRead":3,"paidGating":{"paidContent":false,"paidProductTaxonomy":[]}}},{"type":"contentPreview","data":{"thumbnail":{"alt":"Hands holing and working a tablet, overlaid with charts","src":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/bltf45aedac7f619d1e/6744f4c5df95885d64555b94/thinkhubstudio-investment-security-shutterstock.jpg"},"articleName":"Israel Defies VC Downturn With More Cybersecurity Investments","mobileHeadline":"Israel Defies VC Downturn With More Cybersecurity Investments","articleUrl":"/application-security/israel-defies-downturn-security-funding","listPageUrl":"/application-security/israel-defies-downturn-security-funding","linkAttrs":{},"contentType":"Article","date":"Nov 27, 2024","webinarStartTime":"","categoryName":"Application Security","categoryUrl":"/application-security","variant":"small","contributors":[{"name":"Robert Lemos, Contributing Writer","link":"/author/robert-lemos","avatar":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt28d2c260c33375ea/64f14ff471df6264a382aaa0/Robert-Lemos.png","title":"","role":""}],"timeRead":5,"paidGating":{"paidContent":false,"paidProductTaxonomy":[]}}},{"type":"contentPreview","data":{"thumbnail":{"alt":"A still from the famous orgasm scene in \"When Harry Met Sally\"","src":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt3dd452fdf8cf8240/6746324022170842162612ed/When_Harry_Met_Sally-Collection_Christophel-Alamy.jpg"},"articleName":"'RomCom' APT Mounts Zero-Day, Zero-Click Browser Escapes in Firefox, Tor","mobileHeadline":"'RomCom' APT Mounts Zero-Day, Zero-Click Browser Escapes","articleUrl":"/application-security/romcom-apt-zero-day-zero-click-browser-escapes-firefox-tor","listPageUrl":"/application-security/romcom-apt-zero-day-zero-click-browser-escapes-firefox-tor","linkAttrs":{},"contentType":"Article","date":"Nov 26, 2024","webinarStartTime":"","categoryName":"Application Security","categoryUrl":"/application-security","variant":"small","contributors":[{"name":"Nate Nelson, Contributing Writer","link":"/author/nate-nelson","avatar":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt00df7fa701809c8c/64f15c901c6887515143a4d1/Nate-Nelson_(1).jpg","title":"","role":""}],"timeRead":4,"paidGating":{"paidContent":false,"paidProductTaxonomy":[]}}},{"type":"ad","data":{"pos":"native_latestleft_2v"}},{"type":"contentPreview","data":{"thumbnail":{"alt":"Woman holding a red penalty card","src":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt09426f45a36f3ccb/6746316c6b0aab7078f2116d/red_penalty_card_Phanie_-_Sipa_Press_Alamy.jpg"},"articleName":"Geico, Travelers Fined $11.3M for Lax Data Security","mobileHeadline":"Geico, Travelers Fined $11.3M for Lax Data Security","articleUrl":"/cybersecurity-operations/geico-travelers-fined-lax-data-security","listPageUrl":"/cybersecurity-operations/geico-travelers-fined-lax-data-security","linkAttrs":{},"contentType":"Article","date":"Nov 26, 2024","webinarStartTime":"","categoryName":"Cybersecurity Operations","categoryUrl":"/cybersecurity-operations","variant":"small","contributors":[{"name":"Dark Reading Staff","link":"/author/dark-reading-staff","avatar":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt99b391f0439c1434/64f179af7de67f4e4300e517/285801_DR23_Graphics_Website_Author_Logo_0.jpg","title":"Dark Reading","role":"Dark Reading"}],"timeRead":2,"paidGating":{"paidContent":false,"paidProductTaxonomy":[]}}},{"type":"contentPreview","data":{"thumbnail":{"alt":"Hooded figures on the Chinese flag cover with code","src":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt969f0c750ba3ee59/6744e5923d9773026cc63c90/Chinese_hackers-3D_generator-Alamy.jpg"},"articleName":"Salt Typhoon Builds Out Malware Arsenal With GhostSpider","mobileHeadline":"Salt Typhoon Builds Out Malware Arsenal With GhostSpider","articleUrl":"/application-security/salt-typhoon-malware-arsenal-ghostspider","listPageUrl":"/application-security/salt-typhoon-malware-arsenal-ghostspider","linkAttrs":{},"contentType":"Article","date":"Nov 26, 2024","webinarStartTime":"","categoryName":"Application Security","categoryUrl":"/application-security","variant":"small","contributors":[{"name":"Nate Nelson, Contributing Writer","link":"/author/nate-nelson","avatar":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt00df7fa701809c8c/64f15c901c6887515143a4d1/Nate-Nelson_(1).jpg","title":"","role":""}],"timeRead":4,"paidGating":{"paidContent":false,"paidProductTaxonomy":[]}}},{"type":"contentPreview","data":{"thumbnail":{"alt":"AWS logo against a black background.","src":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt6b376a9ebdf9876f/674616ddfbdcfd40f7ec33c3/AWS-GK_Images-Alamy.jpg"},"articleName":"AWS Rolls Out Updates to Amazon Cognito","mobileHeadline":"AWS Rolls Out Updates to Amazon Cognito","articleUrl":"/identity-access-management-security/aws-rolls-out-updates-to-amazon-cognito","listPageUrl":"/identity-access-management-security/aws-rolls-out-updates-to-amazon-cognito","linkAttrs":{},"contentType":"Article","date":"Nov 26, 2024","webinarStartTime":"","categoryName":"Identity \u0026 Access Management Security","categoryUrl":"/cybersecurity-operations/identity-access-management-security","variant":"small","contributors":[{"name":"Jennifer Lawinski","link":"/author/jennifer-lawinski","avatar":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt64edbfe42402bf03/660b3a58f5fc7993e5562490/jennifer-lawinski.jpg","title":"Contributing Writer","role":"Contributing Writer"}],"timeRead":1,"paidGating":{"paidContent":false,"paidProductTaxonomy":[]}}}],"moreContent":{"title":"More News","url":"/latest-news"}},"rightColumnData":{"title":"Latest Commentary","contents":[{"type":"contentPreview","data":{"thumbnail":{"alt":"Small plane flying in a blue sky, viewed from below","src":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/bltd1b27d91afb9a538/674730efd030641d366d7e36/Plane_(1800)_Stanislav_Duben_Alamy.jpg"},"articleName":"How Learning to Fly Made Me a Better Cybersecurity CEO","mobileHeadline":"How Learning to Fly Made Me a Better Cybersecurity CEO ","articleUrl":"/cybersecurity-operations/how-learning-fly-made-better-cybersecurity-ceo","listPageUrl":"/cybersecurity-operations/how-learning-fly-made-better-cybersecurity-ceo","linkAttrs":{},"contentType":"Article","date":"Nov 27, 2024","webinarStartTime":"","categoryName":"Cybersecurity Operations","categoryUrl":"/cybersecurity-operations","variant":"contributor-focused","contributors":[{"name":"Yochai Corem","link":"/author/yochai-corem","avatar":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blta3b7bc01b57064f1/6744e937fba932022fb82943/Yochai_Corem_-_Headshot_Square.jpg","title":"CEO, Cyberint","role":"CEO, Cyberint"}],"timeRead":5,"paidGating":{"paidContent":false,"paidProductTaxonomy":[]}}},{"type":"contentPreview","data":{"thumbnail":{"alt":"Male hand holding a tablet, with a car floating above it; black background","src":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/bltf2d78357b4572e8e/6745da95120ebce5499c0ce6/Car_(1800)_santoelia_Alamy.jpg"},"articleName":"My Car Knows My Secrets, and I'm (Mostly) OK With That","mobileHeadline":"My Car Knows My Secrets, and I'm (Mostly) OK With That","articleUrl":"/vulnerabilities-threats/my-car-knows-my-secrets","listPageUrl":"/vulnerabilities-threats/my-car-knows-my-secrets","linkAttrs":{},"contentType":"Article","date":"Nov 26, 2024","webinarStartTime":"","categoryName":"Vulnerabilities \u0026 Threats","categoryUrl":"/vulnerabilities-threats","variant":"contributor-focused","contributors":[{"name":"Kyle Hanslovan","link":"/author/kyle-hanslovan","avatar":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt07db825f66e79b6d/6740e48f804c6d0fcc0a0569/image.png","title":"CEO \u0026 Co-Founder, Huntress","role":"CEO \u0026 Co-Founder, Huntress"}],"timeRead":5,"paidGating":{"paidContent":false,"paidProductTaxonomy":[]}}},{"type":"ad","data":{"pos":"native_latestright_1v"}},{"type":"contentPreview","data":{"thumbnail":{"alt":"Crowd of wooden figures and color figures","src":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/bltd79d0141619f6a12/67448dba0b465e76dbc64274/Diversity_(1800)_designer491_Alamy.jpg"},"articleName":"Closing the Cybersecurity Career Diversity Gap","mobileHeadline":"Closing the Cybersecurity Career Diversity Gap ","articleUrl":"/cybersecurity-operations/closing-cybersecurity-career-diversity-gap","listPageUrl":"/cybersecurity-operations/closing-cybersecurity-career-diversity-gap","linkAttrs":{},"contentType":"Article","date":"Nov 25, 2024","webinarStartTime":"","categoryName":"Cybersecurity Operations","categoryUrl":"/cybersecurity-operations","variant":"contributor-focused","contributors":[{"name":"Theresa Payton","link":"/author/theresa-payton","avatar":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt20ee1170850d5dd0/6744a031e0c37144153e8b99/payton.jpg","title":"Former White House CIO, and CEO, Fortalice Solutions, LLC","role":"Former White House CIO, and CEO, Fortalice Solutions, LLC"}],"timeRead":6,"paidGating":{"paidContent":false,"paidProductTaxonomy":[]}}},{"type":"ad","data":{"pos":"native_latestright_2v"}},{"type":"contentPreview","data":{"thumbnail":{"alt":"Red padlock on top of a shield shape, with circuit board imagery superimposed; background is orange-yellow","src":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt593e199726732cfa/6740a79dd3998bae66dc9f80/Secure_by_Demand_(1800)_Science_Photo_Library_Alamyo.jpg"},"articleName":"Going Beyond Secure by Demand","mobileHeadline":"Going Beyond Secure by Demand ","articleUrl":"/vulnerabilities-threats/going-beyond-secure-by-demand","listPageUrl":"/vulnerabilities-threats/going-beyond-secure-by-demand","linkAttrs":{},"contentType":"Article","date":"Nov 22, 2024","webinarStartTime":"","categoryName":"Vulnerabilities \u0026 Threats","categoryUrl":"/vulnerabilities-threats","variant":"contributor-focused","contributors":[{"name":"Saša Zdjelar","link":"/author/sa-a-zdjelar","avatar":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt72f244ca7124b703/673e4e9471136097dd20e7bb/Zdjelar-Family-173.jpg","title":"Chief Trust Officer, ReversingLabs","role":"Chief Trust Officer, ReversingLabs"}],"timeRead":5,"paidGating":{"paidContent":false,"paidProductTaxonomy":[]}}},{"type":"contentPreview","data":{"thumbnail":{"alt":"Hand reaching from bottom of image, disturbing 1s and 0s","src":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt15c2853fa69a58ba/673f45b5df958859a25544ab/Breach_(1800)_Brain_light_Alamy.jpg"},"articleName":"Cybersecurity Is Critical, but Breaches Don't Have to Be Disasters","mobileHeadline":"Cybersecurity Is Critical, but Breaches Don't Have to Be Disasters","articleUrl":"/cyberattacks-data-breaches/cybersecurity-critical-breaches-disasters","listPageUrl":"/cyberattacks-data-breaches/cybersecurity-critical-breaches-disasters","linkAttrs":{},"contentType":"Article","date":"Nov 21, 2024","webinarStartTime":"","categoryName":"Cyberattacks \u0026 Data Breaches","categoryUrl":"/cyberattacks-data-breaches","variant":"contributor-focused","contributors":[{"name":"Akhil Mittal","link":"/author/akhil-mittal","avatar":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt3446f06358b4db95/66fc440c97272d3e8e205cb0/IMG_3766.jpg","title":"Senior Manager, Black Duck Software","role":"Senior Manager, Black Duck Software"}],"timeRead":6,"paidGating":{"paidContent":false,"paidProductTaxonomy":[]}}},{"type":"contentPreview","data":{"thumbnail":{"alt":"Earth, viewed from space, with cybersecurity symbols floating around it","src":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt554adda1d371f224/673df913f449ce5a206c9e6a/Cyersecurity_globe_1800_Skorzewiak_Alamy.jpg"},"articleName":"Small US Cyber Agencies Are Underfunded \u0026 That's a Problem","mobileHeadline":"Small US Cyber Agencies Are Underfunded \u0026 That's a Problem","articleUrl":"/vulnerabilities-threats/us-cyber-agencies-underfunded-problem","listPageUrl":"/vulnerabilities-threats/us-cyber-agencies-underfunded-problem","linkAttrs":{},"contentType":"Article","date":"Nov 20, 2024","webinarStartTime":"","categoryName":"Vulnerabilities \u0026 Threats","categoryUrl":"/vulnerabilities-threats","variant":"contributor-focused","contributors":[{"name":"Michael Daniel","link":"/author/michael-daniel","avatar":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/bltfa5d99e15abba65a/64f14ed523c23947c322b3a8/Michael_Daniel.jpg","title":"President \u0026 CEO, Cyber Threat Alliance","role":"President \u0026 CEO, Cyber Threat Alliance"}],"timeRead":5,"paidGating":{"paidContent":false,"paidProductTaxonomy":[]}}}],"moreContent":{"title":"More Commentary","url":"/latest-commentary"}},"displayAds":{"position":"right","pos":"300_2v"}},"adConfig":{"displayAdOption":"right","nativeAdOption":true}},{"type":"module_contents_card","uid":"blt16bbdd34cce8ad32","data":{"title":"Startup Alley","moduleLabel":"Startup Alley","link":{"href":"/program/dr-emerging-technology","label":"Read More Startup Launches"},"variant":"horizontal","contents":[{"type":"contentPreview","data":{"contentType":"Article","variant":"card-horizontal","layoutVariant":"horizontal","thumbnail":{"src":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt13bf1affe8923637/67350f06072cb331ecd50aea/cloud-connections_Zoonar_GmbH_Alamy_Stock_Photo.jpg","alt":"Scene of blue skiy with wispy clouds"},"articleName":"DeepTempo Launches AI-Based Security App for Snowflake","mobileHeadline":"DeepTempo Launches AI-Based Security App for Snowflake","articleUrl":"/cybersecurity-operations/untitled","listPageUrl":"/cybersecurity-operations/untitled","linkAttrs":{},"date":"Nov 20, 2024","webinarStartTime":"","categoryName":"Cybersecurity Operations","categoryUrl":"/cybersecurity-operations","contributors":[{"name":"Dark Reading Staff","link":"/author/dark-reading-staff","avatar":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt99b391f0439c1434/64f179af7de67f4e4300e517/285801_DR23_Graphics_Website_Author_Logo_0.jpg"}],"timeRead":2,"paidGating":{"paidContent":false,"paidProductTaxonomy":[]}}},{"type":"contentPreview","data":{"contentType":"Article","variant":"card-horizontal","layoutVariant":"horizontal","thumbnail":{"src":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt2e083f08865b175c/66f2c37003ecc04ce5a19432/Risk(1800)-Olekcii_Mach_Alamy.jpg","alt":"A keyboard with a red key marked RISK"},"articleName":"RIIG Launches With Risk Intelligence Solutions","mobileHeadline":"RIIG Launches With Risk Intelligence Solutions ","articleUrl":"/cyber-risk/riig-launches-risk-intelligence-solutions","listPageUrl":"/cyber-risk/riig-launches-risk-intelligence-solutions","linkAttrs":{},"date":"Nov 20, 2024","webinarStartTime":"","categoryName":"Cyber Risk","categoryUrl":"/cyber-risk","contributors":[{"name":"Dark Reading Staff","link":"/author/dark-reading-staff","avatar":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt99b391f0439c1434/64f179af7de67f4e4300e517/285801_DR23_Graphics_Website_Author_Logo_0.jpg"}],"timeRead":1,"paidGating":{"paidContent":false,"paidProductTaxonomy":[]}}},{"type":"ad","data":{"pos":"native_related_1v"}},{"type":"contentPreview","data":{"contentType":"Article","variant":"card-horizontal","layoutVariant":"horizontal","thumbnail":{"src":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt25563b5d5c98516a/66f475229441d64a76fe188c/trophy1800_Zoonar_GmbH_alamy.jpg","alt":"a brass two-handled trophy against a red curtain in the background."},"articleName":"Frenos Takes Home the Prize at 2024 DataTribe Challenge","mobileHeadline":"Frenos Takes Home the Prize at 2024 DataTribe Challenge","articleUrl":"/ics-ot-security/frenos-takes-home-prize-2024-datatribe-challenge","listPageUrl":"/ics-ot-security/frenos-takes-home-prize-2024-datatribe-challenge","linkAttrs":{},"date":"Nov 14, 2024","webinarStartTime":"","categoryName":"ICS/OT Security","categoryUrl":"/ics-ot-security","contributors":[{"name":"Jennifer Lawinski","link":"/author/jennifer-lawinski","avatar":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt64edbfe42402bf03/660b3a58f5fc7993e5562490/jennifer-lawinski.jpg"}],"timeRead":2,"paidGating":{"paidContent":false,"paidProductTaxonomy":[]}}},{"type":"contentPreview","data":{"contentType":"Article","variant":"card-horizontal","layoutVariant":"horizontal","thumbnail":{"src":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt8b8a660bebae6ed7/672cc09ee6bed3d9186e0e5d/coding-Kirbyphoto-iStock_86724133_SMALL.jpg","alt":"A screen full of code that has already been written"},"articleName":"Symbiotic Security Launches Scanning Tool to Help Fix Flaws in Code","mobileHeadline":"Symbiotic Security Launches Scanning Tool to Fix Flaws in Code","articleUrl":"/application-security/symbiotic-code-security-tool-fix-flaws","listPageUrl":"/application-security/symbiotic-code-security-tool-fix-flaws","linkAttrs":{},"date":"Nov 7, 2024","webinarStartTime":"","categoryName":"Application Security","categoryUrl":"/application-security","contributors":[{"name":"Fahmida Y. Rashid","link":"/author/fahmida-y-rashid","avatar":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blta4695bcb7a96b293/64f0c7c615ed143d78ad5df7/fahmida.png"}],"timeRead":2,"paidGating":{"paidContent":false,"paidProductTaxonomy":[]}}}],"displayAd":{"position":"right","pos":"300_3v"},"dateDisplay":"show","contributorDisplay":"hide"},"adConfig":{"displayAdOption":"right","nativeAdOption":true}},{"type":"module_featured_series_content","uid":"bltb521a97d4b633331","data":{"title":"Section Promo The Edge 2","logoPosition":"Right","backgroundImage":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blte79004b68482621f/64f15091672f87c70214bb2d/109803_DR21_DREdge_Widget.jpg","logoSrc":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt8e8148e5c072c2a4/653a7169d1bf76040a77cfc5/Dark_Reading_Logo_TheEdge_4C_rev.png","logoAlt":"The Edge logo for Dark Reading, without the name of the sponsor.","description":"Cybersecurity Features In-Depth: On security strategy, latest trends, and people to know. Brought to you by Mandiant.","btnCTAText":"Go to The Edge","btnCTALink":"/program/the-edge","btnCoverageText":"","btnCoverageLink":"","listItem":[{"articleUrl":"/cybersecurity-operations/phishing-prevention-framework-reduces-incidents-by-half","listPageUrl":"/cybersecurity-operations/phishing-prevention-framework-reduces-incidents-by-half","linkAttrs":{},"title":"Phishing Prevention Framework Reduces Incidents by Half","description":"The anti-fraud plan calls for companies to create a pipeline for compiling attack information, along with formal processes to disseminate that intelligence across business groups.","keyword":{"title":"Cybersecurity Operations","url":"/cybersecurity-operations"},"readTime":"5","publishDate":"2024-11-25T21:40:27.000Z","webinarStartDate":"","webinarStartTime":"","variant":"variant1","contentType":"Article","isSponsored":false,"paidGating":{"paidContent":false,"paidProductTaxonomy":[]}},{"articleUrl":"/cybersecurity-operations/hiring-gap-not-talent-gap","listPageUrl":"/cybersecurity-operations/hiring-gap-not-talent-gap","linkAttrs":{},"title":"What Talent Gap? Hiring Practices Are the Real Problem","description":"While the need for cybersecurity talent still exists, the budget may not. Here's how to maximize security staff despite hiring freezes.","keyword":{"title":"Cybersecurity Operations","url":"/cybersecurity-operations"},"readTime":"6","publishDate":"2024-11-22T19:05:01.000Z","webinarStartDate":"","webinarStartTime":"","variant":"variant1","contentType":"Article","isSponsored":false,"paidGating":{"paidContent":false,"paidProductTaxonomy":[]}},{"articleUrl":"/endpoint-security/how-a-mental-health-non-profit-secure-systems-for-compassionate-care","listPageUrl":"/endpoint-security/how-a-mental-health-non-profit-secure-systems-for-compassionate-care","linkAttrs":{},"title":"How a Mental Health Nonprofit Secures Endpoints for Compassionate Care","description":"Consolidating endpoint management boosts cybersecurity while keeping an Oklahoma-based nonprofit focused on community mental health.","keyword":{"title":"Endpoint Security","url":"/endpoint-security"},"readTime":"3","publishDate":"2024-11-21T18:16:08.000Z","webinarStartDate":"","webinarStartTime":"","variant":"variant1","contentType":"Article","isSponsored":false,"paidGating":{"paidContent":false,"paidProductTaxonomy":[]}}],"variant":"variant1"}},{"type":"module_featured_series_content","uid":"bltb6e7460bf12268b9","data":{"title":"Section Promo DR Tech","logoPosition":"Left","backgroundImage":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt9c889327f44205d2/64f15090b3a30f6dca781e9c/109803_DR21_DRTechnology_Widget.jpg","logoSrc":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/bltc85414f028de9f36/653a7145cd6cfe040a2bae61/Dark_Reading_Logo_Technology_4C_rev.png","logoAlt":"DR Technology Logo","description":"Security Technology: Featuring news, news analysis, and commentary on the latest technology trends. ","btnCTAText":"Go to DR Technology","btnCTALink":"/program/dr-technology","btnCoverageText":"","btnCoverageLink":"","listItem":[{"articleUrl":"/endpoint-security/microsoft-releases-recall-windows-insider-preview","listPageUrl":"/endpoint-security/microsoft-releases-recall-windows-insider-preview","linkAttrs":{},"title":"Microsoft Finally Releases Recall as Part of Windows Insider Preview","description":"The preview version now includes multiple security-focused additions Microsoft had promised to add, such as SecureBoot, BitLocker, and Windows Hello.","keyword":{"title":"Endpoint Security","url":"/endpoint-security"},"readTime":"3","publishDate":"2024-11-27T13:06:15.000Z","webinarStartDate":"","webinarStartTime":"","variant":"variant1","contentType":"Article","isSponsored":false,"paidGating":{"paidContent":false,"paidProductTaxonomy":[]}},{"articleUrl":"/identity-access-management-security/aws-rolls-out-updates-to-amazon-cognito","listPageUrl":"/identity-access-management-security/aws-rolls-out-updates-to-amazon-cognito","linkAttrs":{},"title":"AWS Rolls Out Updates to Amazon Cognito","description":"Amazon Web Services' identity and access management platform has added new features that help developers implement secure, scalable, and customizable authentication solutions for their applications. ","keyword":{"title":"Identity \u0026 Access Management Security","url":"/cybersecurity-operations/identity-access-management-security"},"readTime":"1","publishDate":"2024-11-26T19:02:53.000Z","webinarStartDate":"","webinarStartTime":"","variant":"variant1","contentType":"Article","isSponsored":false,"paidGating":{"paidContent":false,"paidProductTaxonomy":[]}},{"articleUrl":"/cybersecurity-operations/phishing-prevention-framework-reduces-incidents-by-half","listPageUrl":"/cybersecurity-operations/phishing-prevention-framework-reduces-incidents-by-half","linkAttrs":{},"title":"Phishing Prevention Framework Reduces Incidents by Half","description":"The anti-fraud plan calls for companies to create a pipeline for compiling attack information, along with formal processes to disseminate that intelligence across business groups.","keyword":{"title":"Cybersecurity Operations","url":"/cybersecurity-operations"},"readTime":"5","publishDate":"2024-11-25T21:40:27.000Z","webinarStartDate":"","webinarStartTime":"","variant":"variant1","contentType":"Article","isSponsored":false,"paidGating":{"paidContent":false,"paidProductTaxonomy":[]}}],"variant":"variant1"}},{"type":"module_featured_series_content","uid":"blt468f9a542690bfdb","data":{"title":"DR Global","logoPosition":"Right","backgroundImage":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/bltb1db702ecb19a9df/655e23f4344e35040757bf35/DR_Global.png","logoSrc":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt15692fbdc8091019/654e0d604ac254040aba8f01/Dark_Reading_Logo_Global_0.png","logoAlt":"DR Global White on Black background","description":"Breaking cybersecurity news, news analysis, commentary, and other content from around the world.","btnCTAText":"Go to DR Global","btnCTALink":"/program/dr-global","btnCoverageText":"","btnCoverageLink":"","listItem":[{"articleUrl":"/application-security/israel-defies-downturn-security-funding","listPageUrl":"/application-security/israel-defies-downturn-security-funding","linkAttrs":{},"title":"Israel Defies VC Downturn With More Cybersecurity Investments","description":"With a focus on creating technologies for other markets, Israel continues to be a valued destination for venture capital in cybersecurity outside the US and Europe.","keyword":{"title":"Application Security","url":"/application-security"},"readTime":"5","publishDate":"2024-11-27T07:00:00.000Z","webinarStartDate":"","webinarStartTime":"","variant":"variant1","contentType":"Article","isSponsored":false,"paidGating":{"paidContent":false,"paidProductTaxonomy":[]}},{"articleUrl":"/cyberattacks-data-breaches/yakuza-victim-data-leaked-japanese-attack","listPageUrl":"/cyberattacks-data-breaches/yakuza-victim-data-leaked-japanese-attack","linkAttrs":{},"title":"Yakuza Victim Data Leaked in Japanese Agency Attack","description":"A local government resource for helping Japanese citizens cut ties with organized crime was successfully phished in a tech support scam, and could have dangerous consequences.","keyword":{"title":"Cyberattacks \u0026 Data Breaches","url":"/cyberattacks-data-breaches"},"readTime":"1","publishDate":"2024-11-22T19:43:26.000Z","webinarStartDate":"","webinarStartTime":"","variant":"variant1","contentType":"Article","isSponsored":false,"paidGating":{"paidContent":false,"paidProductTaxonomy":[]}},{"articleUrl":"/cybersecurity-operations/endace-establishes-middle-east-regional-headquarters-in-saudi-arabia","listPageUrl":"/cybersecurity-operations/endace-establishes-middle-east-regional-headquarters-in-saudi-arabia","linkAttrs":{},"title":"Endace Establishes Middle East Regional Headquarters in Saudi Arabia","description":" ","keyword":{"title":"Cybersecurity Operations","url":"/cybersecurity-operations"},"readTime":"2","publishDate":"2024-11-21T22:33:56.000Z","webinarStartDate":"","webinarStartTime":"","variant":"variant1","contentType":"Article","isSponsored":false,"paidGating":{"paidContent":false,"paidProductTaxonomy":[]}}],"variant":"variant1"}},{"type":"module_contents_card","uid":"bltc8f6bf4a95df071d","data":{"title":"Press Releases","moduleLabel":"","link":{"href":"/latest-press-release","label":"See all"},"variant":"vertical","contents":[{"type":"contentPreview","data":{"contentType":"Article","variant":"card-vertical","layoutVariant":"vertical","thumbnail":{"src":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt850556f866500627/654a5a8e05eb4d040a046894/325351_DR23_Graphics_General_Large_Text_v1.png","alt":"PR logo"},"articleName":"CyberRatings.org Announces Test Results for Cloud Service Provider Native Firewalls","mobileHeadline":"CyberRatings.org Announces Test Results for Cloud Service Provider Native Firewalls","articleUrl":"/cloud-security/cyberratings-org-announces-test-results-cloud-service-provider-native-firewalls","listPageUrl":"/cloud-security/cyberratings-org-announces-test-results-cloud-service-provider-native-firewalls","linkAttrs":{},"date":"Nov 26, 2024","webinarStartTime":"","categoryName":"Сloud Security","categoryUrl":"/cloud-security","contributors":[],"timeRead":2,"paidGating":{"paidContent":false,"paidProductTaxonomy":[]}}},{"type":"contentPreview","data":{"contentType":"Article","variant":"card-vertical","layoutVariant":"vertical","thumbnail":{"src":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt850556f866500627/654a5a8e05eb4d040a046894/325351_DR23_Graphics_General_Large_Text_v1.png","alt":"PR logo"},"articleName":"CyCognito Report Highlights Rising Cybersecurity Risks in Holiday E-Commerce","mobileHeadline":"CyCognito Report Highlights Rising Cybersecurity Risks in Holiday E-Commerce","articleUrl":"/application-security/cycognito-report-highlights-rising-cybersecurity-risks-holiday-e-commerce","listPageUrl":"/application-security/cycognito-report-highlights-rising-cybersecurity-risks-holiday-e-commerce","linkAttrs":{},"date":"Nov 26, 2024","webinarStartTime":"","categoryName":"Application Security","categoryUrl":"/application-security","contributors":[],"timeRead":2,"paidGating":{"paidContent":false,"paidProductTaxonomy":[]}}},{"type":"contentPreview","data":{"contentType":"Article","variant":"card-vertical","layoutVariant":"vertical","thumbnail":{"src":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt850556f866500627/654a5a8e05eb4d040a046894/325351_DR23_Graphics_General_Large_Text_v1.png","alt":"PR Logo"},"articleName":"Study Finds 76% of Cybersecurity Professionals Believe AI Should Be Heavily Regulated","mobileHeadline":"Study Finds 76% of Cybersecurity Professionals Believe AI Should Be Heavily Regulated","articleUrl":"/cloud-security/study-finds-76-of-cybersecurity-professionals-believe-ai-should-be-heavily-regulated","listPageUrl":"/cloud-security/study-finds-76-of-cybersecurity-professionals-believe-ai-should-be-heavily-regulated","linkAttrs":{},"date":"Nov 21, 2024","webinarStartTime":"","categoryName":"Сloud Security","categoryUrl":"/cloud-security","contributors":[],"timeRead":3,"paidGating":{"paidContent":false,"paidProductTaxonomy":[]}}},{"type":"contentPreview","data":{"contentType":"Article","variant":"card-vertical","layoutVariant":"vertical","thumbnail":{"src":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt850556f866500627/654a5a8e05eb4d040a046894/325351_DR23_Graphics_General_Large_Text_v1.png","alt":"PR Logo"},"articleName":"Endace Establishes Middle East Regional Headquarters in Saudi Arabia","mobileHeadline":"Endace Establishes Middle East Regional Headquarters in Saudi Arabia","articleUrl":"/cybersecurity-operations/endace-establishes-middle-east-regional-headquarters-in-saudi-arabia","listPageUrl":"/cybersecurity-operations/endace-establishes-middle-east-regional-headquarters-in-saudi-arabia","linkAttrs":{},"date":"Nov 21, 2024","webinarStartTime":"","categoryName":"Cybersecurity Operations","categoryUrl":"/cybersecurity-operations","contributors":[],"timeRead":2,"paidGating":{"paidContent":false,"paidProductTaxonomy":[]}}},{"type":"contentPreview","data":{"contentType":"Article","variant":"card-vertical","layoutVariant":"vertical","thumbnail":{"src":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt850556f866500627/654a5a8e05eb4d040a046894/325351_DR23_Graphics_General_Large_Text_v1.png","alt":"PR Logo"},"articleName":"Norton Introduces Small Business Premium for Business-Grade Security","mobileHeadline":"Norton Introduces Small Business Premium for Business-Grade Security","articleUrl":"/endpoint-security/norton-introduces-small-business-premium-for-business-grade-security","listPageUrl":"/endpoint-security/norton-introduces-small-business-premium-for-business-grade-security","linkAttrs":{},"date":"Nov 21, 2024","webinarStartTime":"","categoryName":"Endpoint Security","categoryUrl":"/endpoint-security","contributors":[],"timeRead":3,"paidGating":{"paidContent":false,"paidProductTaxonomy":[]}}},{"type":"contentPreview","data":{"contentType":"Article","variant":"card-vertical","layoutVariant":"vertical","thumbnail":{"src":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt850556f866500627/654a5a8e05eb4d040a046894/325351_DR23_Graphics_General_Large_Text_v1.png","alt":"PR Logo"},"articleName":"Apono Enhances Platform Enabling Permission Revocation and Automated Access","mobileHeadline":"Apono Enhances Platform Enabling Permission Revocation and Automated Access ","articleUrl":"/cloud-security/apono-enhances-platform-enabling-permission-revocation-and-automated-access","listPageUrl":"/cloud-security/apono-enhances-platform-enabling-permission-revocation-and-automated-access","linkAttrs":{},"date":"Nov 21, 2024","webinarStartTime":"","categoryName":"Сloud Security","categoryUrl":"/cloud-security","contributors":[],"timeRead":2,"paidGating":{"paidContent":false,"paidProductTaxonomy":[]}}}],"displayAd":{"position":"none"},"dateDisplay":"show","contributorDisplay":"hide"},"adConfig":{"displayAdOption":"none","nativeAdOption":false}},{"type":"module_contents_card","uid":"blt2121ff89aa28d800","data":{"title":"Partner Perspectives","moduleLabel":"","link":{"href":"/keyword/partner-perspectives","label":"More Partner Perspectives"},"variant":"horizontal","contents":[{"type":"contentPreview","data":{"contentType":"Article","variant":"card-horizontal","layoutVariant":"horizontal","thumbnail":{"src":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt5c68ce2cd5715df5/66552a4009eeb9bc2bffa3a4/meeting-Prostock-studio-AlamyStockPhoto.jpg","alt":"cybersecurity meeting concept"},"articleName":"4 Security Questions to Ask Your Enterprise Generative AI Provider","mobileHeadline":"4 Security Questions to Ask Your Enterprise Generative AI Provider","articleUrl":"/cybersecurity-operations/four-security-questions-to-ask-your-enterprise-generative-ai-provider","listPageUrl":"/cybersecurity-operations/four-security-questions-to-ask-your-enterprise-generative-ai-provider","linkAttrs":{},"date":"May 30, 2024","webinarStartTime":"","categoryName":"Cybersecurity Operations","categoryUrl":"/cybersecurity-operations","contributors":[],"timeRead":3,"paidGating":{"paidContent":false,"paidProductTaxonomy":[]}}},{"type":"contentPreview","data":{"contentType":"Article","variant":"card-horizontal","layoutVariant":"horizontal","thumbnail":{"src":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt07309b91c116606b/65ca5364c31fbf040a5a0761/GenAI_MauriceNorbert_Alamy.jpg","alt":"Generative AI word cloud"},"articleName":"Looking to Leverage Generative AI? Prep for Success With These 4 Tips","mobileHeadline":"Looking to Leverage Generative AI? Prep for Success With These 4 Tips","articleUrl":"/vulnerabilities-threats/looking-to-leverage-generative-ai-prep-for-success-with-these-4-tips","listPageUrl":"/vulnerabilities-threats/looking-to-leverage-generative-ai-prep-for-success-with-these-4-tips","linkAttrs":{},"date":"May 28, 2024","webinarStartTime":"","categoryName":"Vulnerabilities \u0026 Threats","categoryUrl":"/vulnerabilities-threats","contributors":[{"name":"Microsoft Security","link":"/author/microsoft-security","avatar":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/bltf2d2b09142229764/64f1617a3023e840e5f5cbe3/MS-Security_logo.png"}],"timeRead":3,"paidGating":{"paidContent":false,"paidProductTaxonomy":[]}}},{"type":"contentPreview","data":{"contentType":"Article","variant":"card-horizontal","layoutVariant":"horizontal","thumbnail":{"src":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt067891c8ed741073/64f16fb3095a7f672290fc51/Cyberattack_Skorzewiak_Alamy.jpg","alt":"Rows of computer monitors with skulls and crossbones indicating a cyberattack"},"articleName":"Asian Threat Actors Use New Techniques to Attack Familiar Targets","mobileHeadline":"Asian Threat Actors Use New Techniques to Attack Familiar Targets","articleUrl":"/cyberattacks-data-breaches/asian-threat-actors-use-new-techniques-to-attack-familiar-targets","listPageUrl":"/cyberattacks-data-breaches/asian-threat-actors-use-new-techniques-to-attack-familiar-targets","linkAttrs":{},"date":"May 16, 2024","webinarStartTime":"","categoryName":"Cyberattacks \u0026 Data Breaches","categoryUrl":"/cyberattacks-data-breaches","contributors":[{"name":"Microsoft Security","link":"/author/microsoft-security","avatar":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/bltf2d2b09142229764/64f1617a3023e840e5f5cbe3/MS-Security_logo.png"}],"timeRead":3,"paidGating":{"paidContent":false,"paidProductTaxonomy":[]}}},{"type":"contentPreview","data":{"contentType":"Article","variant":"card-horizontal","layoutVariant":"horizontal","thumbnail":{"src":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt2d00b1e77d6b3e2d/64f1702f7de67f048f00e4b5/redteam-josefotograf-alamy.jpg","alt":"blue team against red team representing concept of red teaming using foosball table"},"articleName":"How to Red Team GenAI: Challenges, Best Practices, and Learnings","mobileHeadline":"How to Red Team GenAI: Challenges, Best Practices, and Learnings","articleUrl":"/vulnerabilities-threats/how-to-red-team-genai-challenges-best-practices-and-learnings","listPageUrl":"/vulnerabilities-threats/how-to-red-team-genai-challenges-best-practices-and-learnings","linkAttrs":{},"date":"Apr 29, 2024","webinarStartTime":"","categoryName":"Vulnerabilities \u0026 Threats","categoryUrl":"/vulnerabilities-threats","contributors":[{"name":"Microsoft Security","link":"/author/microsoft-security","avatar":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/bltf2d2b09142229764/64f1617a3023e840e5f5cbe3/MS-Security_logo.png"}],"timeRead":3,"paidGating":null}},{"type":"contentPreview","data":{"contentType":"Article","variant":"card-horizontal","layoutVariant":"horizontal","thumbnail":{"src":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/bltcfccccca39d09213/662acbd7a4c41513c3efd064/5darts-YAY-Media-AS-Alamy-Stock-Photo.jpg","alt":"Five Darts Hit Bulls-Eye on Dart Board Competition. 4 darts are blue and one dart is red."},"articleName":"5 Attack Trends Organizations of All Sizes Should Be Monitoring","mobileHeadline":"5 Attack Trends Organizations of All Sizes Should Be Monitoring","articleUrl":"/threat-intelligence/5-attack-trends-organizations-of-all-sizes-should-be-monitoring","listPageUrl":"/threat-intelligence/5-attack-trends-organizations-of-all-sizes-should-be-monitoring","linkAttrs":{},"date":"Apr 25, 2024","webinarStartTime":"","categoryName":"Threat Intelligence","categoryUrl":"/threat-intelligence","contributors":[{"name":"Microsoft Security","link":"/author/microsoft-security","avatar":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/bltf2d2b09142229764/64f1617a3023e840e5f5cbe3/MS-Security_logo.png"}],"timeRead":3,"paidGating":null}},{"type":"contentPreview","data":{"contentType":"Article","variant":"card-horizontal","layoutVariant":"horizontal","thumbnail":{"src":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt15fb1a33889ad369/661eec0fbbe2ba55868d05dc/cloud-security-padlock-Rasi-Bhadramani-Alamy.jpg","alt":"Blue cloud with yellow closed padlock on technology background"},"articleName":"Why a Native-First Approach Is Key to Cloud Security","mobileHeadline":"Why a Native-First Approach Is Key to Cloud Security","articleUrl":"/cloud-security/why-a-native-first-approach-is-key-to-cloud-security","listPageUrl":"/cloud-security/why-a-native-first-approach-is-key-to-cloud-security","linkAttrs":{},"date":"Apr 17, 2024","webinarStartTime":"","categoryName":"Сloud Security","categoryUrl":"/cloud-security","contributors":[{"name":"Microsoft Security","link":"/author/microsoft-security","avatar":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/bltf2d2b09142229764/64f1617a3023e840e5f5cbe3/MS-Security_logo.png"}],"timeRead":3,"paidGating":null}}],"displayAd":{"position":"none"},"dateDisplay":"show","contributorDisplay":"hide"},"adConfig":{"displayAdOption":"none","nativeAdOption":false}},{"type":"module_resources","uid":"bltad604e58a4e82ba2","data":{"title":"More Insights","linkLists":[{"listOption":"External Feed","listTitle":"Webinars","icon":"ChalkBoard","externalFeed":"https://smartbox.techweb.com/smartbox/externalsmartbox?site_id=162801002\u0026taxonomy_ids=\u0026num_display=5\u0026article_type=upcoming_webinars","ctaButton":{"ctaButtonLink":"/resources?types=Webinar","ctaButtonText":"More Webinars"},"openInNewTab":true,"articles":[{"title":"The Unreasonable Effectiveness of Inside Out Attack Surface Management","publishedDate":"Nov 15, 2024","url":"https://dr-resources.darkreading.com/c/pubRD.mpl?secure=1\u0026sr=pp\u0026_t=pp:\u0026qf=w_runz04\u0026ch=SBX\u0026cid=_upcoming_webinars_8.500001502\u0026_mc=_upcoming_webinars_8.500001502","eventDate":"Dec 04, 2024"}]},{"listOption":"External Feed","listTitle":"Events","icon":"Date","externalFeed":"https://smartbox.techweb.com/smartbox/externalsmartbox?site_id=162801002\u0026taxonomy_ids=\u0026num_display=4\u0026article_type=session","ctaButton":{"ctaButtonLink":"/events","ctaButtonText":"More Events"},"openInNewTab":true,"articles":[{"title":"Cybersecurity Outlook 2025","publishedDate":"Dec 05, 2024","url":"https://darkreading.tradepub.com/c/pubRD.mpl?secure=1\u0026sr=pp\u0026_t=pp:\u0026qf=w_defa7201\u0026ch=SBX\u0026cid=_session_16.500326\u0026_mc=_session_16.500326","eventDate":""}]}],"dateDisplay":"show","variant":"homepage","moduleLocation":"homepage"}}],"seo":{"canonicalUrl":"https://www.darkreading.com","metaDescription":"Dark Reading: Connecting The Cybersecurity Community. ","metaTitle":"Dark Reading | Security | Protect The Business","noIndex":false,"imageUrl":"https://www.darkreading.com/build/_assets/darkreading-DSJITCUD.ico"},"schema":[{"@context":"https://schema.org","@type":"NewsMediaOrganization","name":"Homepage","description":"Dark Reading: Connecting The Cybersecurity Community. ","url":"https://www.darkreading.com","logo":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blte9ead971f13c662e/65437029846d7c040a6e588d/Logo_-_Dark_Reading.svg","publisher":{"@type":["NewsMediaOrganization","Organization","OnlineBusiness"],"identifier":"https://www.darkreading.com","name":"Dark Reading","url":"https://www.darkreading.com","sameAs":["https://twitter.com/DarkReading","https://www.linkedin.com/company/dark-reading/","https://www.facebook.com/darkreadingcom/","https://www.youtube.com/@DarkReadingOfficialYT","https://news.google.com/publications/CAAqBwgKMKmknwswtq63Aw"],"foundingDate":"2006","description":"To challenge community members to think about security by providing strong, even unconventional points of view, backed by hard-nosed reporting, hands-on experience, and the professional knowledge that comes only with years of work in the information security industry.","logo":{"@type":"ImageObject","url":"https://www.darkreading.com/build/_assets/DarkReading-EAU2PZUE.svg","width":{"@type":"QuantitativeValue","value":1008},"height":{"@type":"QuantitativeValue","value":112}}}}],"socialShare":[{"type":"Linkedin","url":"https://www.linkedin.com/sharing/share-offsite/?url=https://www.darkreading.com/"},{"type":"Facebook","url":"http://www.facebook.com/sharer/sharer.php?u=https://www.darkreading.com/"},{"type":"Twitter","url":"http://www.twitter.com/intent/tweet?url=https://www.darkreading.com/"},{"type":"Reddit","url":"https://www.reddit.com/submit?url=https://www.darkreading.com/\u0026title="},{"type":"Email","url":"mailto:?subject=I wanted you to see this site\u0026body=I%20thought%20the%20following%20from%20Dark%20Reading%20might%20interest%20you.%0D%0A%0D%0A%20%0D%0Ahttps%3A%2F%2Fwww.darkreading.com%2F"},{"type":"Print","url":"/"}]}},"actionData":null,"errors":null}};</script><script type="module" async="">import "/build/manifest-A2F38A42.js"; import * as route0 from "/build/root-TPDAOOC5.js"; import * as route1 from "/build/routes/_index-5CINTQR2.js"; window.__remixRouteModules = {"root":route0,"routes/_index":route1}; import("/build/entry.client-SFHSSSEN.js");</script><script async="" defer="" src="https://connect.facebook.net/en_US/sdk.js#xfbml=1&version=v3.2"></script><script async="" defer="" src="https://www.instagram.com/embed.js"></script><script>(function(){function c(){var b=a.contentDocument||a.contentWindow.document;if(b){var d=b.createElement('script');d.innerHTML="window.__CF$cv$params={r:'8eb247121e7c9cff',t:'MTczMzA0NzcyMy4wMDAwMDA='};var a=document.createElement('script');a.nonce='';a.src='/cdn-cgi/challenge-platform/scripts/jsd/main.js';document.getElementsByTagName('head')[0].appendChild(a);";b.getElementsByTagName('head')[0].appendChild(d)}}if(document.body){var a=document.createElement('iframe');a.height=1;a.width=1;a.style.position='absolute';a.style.top=0;a.style.left=0;a.style.border='none';a.style.visibility='hidden';document.body.appendChild(a);if('loading'!==document.readyState)c();else if(window.addEventListener)document.addEventListener('DOMContentLoaded',c);else{var e=document.onreadystatechange||function(){};document.onreadystatechange=function(b){e(b);'loading'!==document.readyState&&(document.onreadystatechange=e,c())}}}})();</script></body></html>