CINXE.COM
DR Technology
<!DOCTYPE html><html lang="en"><head><meta charSet="utf-8"/><meta name="viewport" content="width=device-width,initial-scale=1"/><meta name="robots" content="max-image-preview:large"/><title>DR Technology</title><meta name="description" content="DR Technology"/><meta property="og:title" content="DR Technology"/><meta property="og:description" content="DR Technology"/><meta property="og:url" content="https://www.darkreading.com/program/dr-technology"/><meta property="og:type" content="website"/><meta property="og:image" content="https://www.darkreading.com/build/_assets/darkreading-DSJITCUD.ico"/><meta property="og:site_name" content="Dark Reading"/><link rel="canonical" href="https://www.darkreading.com/program/dr-technology"/><script type="application/ld+json">{"@context":"https://schema.org","@type":"BreadcrumbList","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https://www.darkreading.com"},{"@type":"ListItem","position":2,"name":"DR Technology","item":"https://www.darkreading.com/program/dr-technology"}]}</script><meta property="twitter:card" content="summary"/><script type="text/javascript">window.NREUM||(NREUM={});NREUM.init={distributed_tracing:{enabled:true},privacy:{cookies_enabled:true},ajax:{deny_list:["bam.eu01.nr-data.net"]}}; ;NREUM.loader_config={accountID:"3936348",trustKey:"3288925",agentID:"538600199",licenseKey:"NRJS-26ae6a3b09493bbcc87",applicationID:"538600199"}; ;NREUM.info={beacon:"bam.eu01.nr-data.net",errorBeacon:"bam.eu01.nr-data.net",licenseKey:"NRJS-26ae6a3b09493bbcc87",applicationID:"538600199",sa:1}; ;/*! For license information please see nr-loader-spa-1.274.0.min.js.LICENSE.txt */ (()=>{var e,t,r={8122:(e,t,r)=>{"use strict";r.d(t,{a:()=>i});var n=r(944);function i(e,t){try{if(!e||"object"!=typeof e)return(0,n.R)(3);if(!t||"object"!=typeof t)return(0,n.R)(4);const r=Object.create(Object.getPrototypeOf(t),Object.getOwnPropertyDescriptors(t)),o=0===Object.keys(r).length?e:r;for(let a in o)if(void 0!==e[a])try{if(null===e[a]){r[a]=null;continue}Array.isArray(e[a])&&Array.isArray(t[a])?r[a]=Array.from(new Set([...e[a],...t[a]])):"object"==typeof e[a]&&"object"==typeof t[a]?r[a]=i(e[a],t[a]):r[a]=e[a]}catch(e){(0,n.R)(1,e)}return r}catch(e){(0,n.R)(2,e)}}},2555:(e,t,r)=>{"use strict";r.d(t,{Vp:()=>c,fn:()=>s,x1:()=>u});var n=r(384),i=r(8122);const o={beacon:n.NT.beacon,errorBeacon:n.NT.errorBeacon,licenseKey:void 0,applicationID:void 0,sa:void 0,queueTime:void 0,applicationTime:void 0,ttGuid:void 0,user:void 0,account:void 0,product:void 0,extra:void 0,jsAttributes:{},userAttributes:void 0,atts:void 0,transactionName:void 0,tNamePlain:void 0},a={};function s(e){try{const t=c(e);return!!t.licenseKey&&!!t.errorBeacon&&!!t.applicationID}catch(e){return!1}}function c(e){if(!e)throw new Error("All info objects require an agent identifier!");if(!a[e])throw new Error("Info for ".concat(e," was never set"));return a[e]}function u(e,t){if(!e)throw new Error("All info objects require an agent identifier!");a[e]=(0,i.a)(t,o);const r=(0,n.nY)(e);r&&(r.info=a[e])}},9417:(e,t,r)=>{"use strict";r.d(t,{D0:()=>h,gD:()=>g,xN:()=>p});var n=r(993);const i=e=>{if(!e||"string"!=typeof e)return!1;try{document.createDocumentFragment().querySelector(e)}catch{return!1}return!0};var o=r(2614),a=r(944),s=r(384),c=r(8122);const u="[data-nr-mask]",d=()=>{const e={mask_selector:"*",block_selector:"[data-nr-block]",mask_input_options:{color:!1,date:!1,"datetime-local":!1,email:!1,month:!1,number:!1,range:!1,search:!1,tel:!1,text:!1,time:!1,url:!1,week:!1,textarea:!1,select:!1,password:!0}};return{ajax:{deny_list:void 0,block_internal:!0,enabled:!0,harvestTimeSeconds:10,autoStart:!0},distributed_tracing:{enabled:void 0,exclude_newrelic_header:void 0,cors_use_newrelic_header:void 0,cors_use_tracecontext_headers:void 0,allowed_origins:void 0},feature_flags:[],generic_events:{enabled:!0,harvestTimeSeconds:30,autoStart:!0},harvest:{tooManyRequestsDelay:60},jserrors:{enabled:!0,harvestTimeSeconds:10,autoStart:!0},logging:{enabled:!0,harvestTimeSeconds:10,autoStart:!0,level:n.p_.INFO},metrics:{enabled:!0,autoStart:!0},obfuscate:void 0,page_action:{enabled:!0},page_view_event:{enabled:!0,autoStart:!0},page_view_timing:{enabled:!0,harvestTimeSeconds:30,autoStart:!0},performance:{capture_marks:!1,capture_measures:!1},privacy:{cookies_enabled:!0},proxy:{assets:void 0,beacon:void 0},session:{expiresMs:o.wk,inactiveMs:o.BB},session_replay:{autoStart:!0,enabled:!1,harvestTimeSeconds:60,preload:!1,sampling_rate:10,error_sampling_rate:100,collect_fonts:!1,inline_images:!1,fix_stylesheets:!0,mask_all_inputs:!0,get mask_text_selector(){return e.mask_selector},set mask_text_selector(t){i(t)?e.mask_selector="".concat(t,",").concat(u):""===t||null===t?e.mask_selector=u:(0,a.R)(5,t)},get block_class(){return"nr-block"},get ignore_class(){return"nr-ignore"},get mask_text_class(){return"nr-mask"},get block_selector(){return e.block_selector},set block_selector(t){i(t)?e.block_selector+=",".concat(t):""!==t&&(0,a.R)(6,t)},get mask_input_options(){return e.mask_input_options},set mask_input_options(t){t&&"object"==typeof t?e.mask_input_options={...t,password:!0}:(0,a.R)(7,t)}},session_trace:{enabled:!0,harvestTimeSeconds:10,autoStart:!0},soft_navigations:{enabled:!0,harvestTimeSeconds:10,autoStart:!0},spa:{enabled:!0,harvestTimeSeconds:10,autoStart:!0},ssl:void 0,user_actions:{enabled:!0}}},l={},f="All configuration objects require an agent identifier!";function h(e){if(!e)throw new Error(f);if(!l[e])throw new Error("Configuration for ".concat(e," was never set"));return l[e]}function p(e,t){if(!e)throw new Error(f);l[e]=(0,c.a)(t,d());const r=(0,s.nY)(e);r&&(r.init=l[e])}function g(e,t){if(!e)throw new Error(f);var r=h(e);if(r){for(var n=t.split("."),i=0;i<n.length-1;i++)if("object"!=typeof(r=r[n[i]]))return;r=r[n[n.length-1]]}return r}},5603:(e,t,r)=>{"use strict";r.d(t,{a:()=>c,o:()=>s});var n=r(384),i=r(8122);const o={accountID:void 0,trustKey:void 0,agentID:void 0,licenseKey:void 0,applicationID:void 0,xpid:void 0},a={};function s(e){if(!e)throw new Error("All loader-config objects require an agent identifier!");if(!a[e])throw new Error("LoaderConfig for ".concat(e," was never set"));return a[e]}function c(e,t){if(!e)throw new Error("All loader-config objects require an agent identifier!");a[e]=(0,i.a)(t,o);const r=(0,n.nY)(e);r&&(r.loader_config=a[e])}},3371:(e,t,r)=>{"use strict";r.d(t,{V:()=>f,f:()=>l});var n=r(8122),i=r(384),o=r(6154),a=r(9324);let s=0;const c={buildEnv:a.F3,distMethod:a.Xs,version:a.xv,originTime:o.WN},u={customTransaction:void 0,disabled:!1,isolatedBacklog:!1,loaderType:void 0,maxBytes:3e4,onerror:void 0,ptid:void 0,releaseIds:{},appMetadata:{},session:void 0,denyList:void 0,timeKeeper:void 0,obfuscator:void 0},d={};function l(e){if(!e)throw new Error("All runtime objects require an agent identifier!");if(!d[e])throw new Error("Runtime for ".concat(e," was never set"));return d[e]}function f(e,t){if(!e)throw new Error("All runtime objects require an agent identifier!");d[e]={...(0,n.a)(t,u),...c},Object.hasOwnProperty.call(d[e],"harvestCount")||Object.defineProperty(d[e],"harvestCount",{get:()=>++s});const r=(0,i.nY)(e);r&&(r.runtime=d[e])}},9324:(e,t,r)=>{"use strict";r.d(t,{F3:()=>i,Xs:()=>o,Yq:()=>a,xv:()=>n});const n="1.274.0",i="PROD",o="CDN",a="^2.0.0-alpha.17"},6154:(e,t,r)=>{"use strict";r.d(t,{A4:()=>s,OF:()=>d,RI:()=>i,WN:()=>h,bv:()=>o,gm:()=>a,lR:()=>f,m:()=>u,mw:()=>c,sb:()=>l});var n=r(1863);const i="undefined"!=typeof window&&!!window.document,o="undefined"!=typeof WorkerGlobalScope&&("undefined"!=typeof self&&self instanceof WorkerGlobalScope&&self.navigator instanceof WorkerNavigator||"undefined"!=typeof globalThis&&globalThis instanceof WorkerGlobalScope&&globalThis.navigator instanceof WorkerNavigator),a=i?window:"undefined"!=typeof WorkerGlobalScope&&("undefined"!=typeof self&&self instanceof WorkerGlobalScope&&self||"undefined"!=typeof globalThis&&globalThis instanceof WorkerGlobalScope&&globalThis),s="complete"===a?.document?.readyState,c=Boolean("hidden"===a?.document?.visibilityState),u=""+a?.location,d=/iPad|iPhone|iPod/.test(a.navigator?.userAgent),l=d&&"undefined"==typeof SharedWorker,f=(()=>{const e=a.navigator?.userAgent?.match(/Firefox[/\s](\d+\.\d+)/);return Array.isArray(e)&&e.length>=2?+e[1]:0})(),h=Date.now()-(0,n.t)()},7295:(e,t,r)=>{"use strict";r.d(t,{Xv:()=>a,gX:()=>i,iW:()=>o});var n=[];function i(e){if(!e||o(e))return!1;if(0===n.length)return!0;for(var t=0;t<n.length;t++){var r=n[t];if("*"===r.hostname)return!1;if(s(r.hostname,e.hostname)&&c(r.pathname,e.pathname))return!1}return!0}function o(e){return void 0===e.hostname}function a(e){if(n=[],e&&e.length)for(var t=0;t<e.length;t++){let r=e[t];if(!r)continue;0===r.indexOf("http://")?r=r.substring(7):0===r.indexOf("https://")&&(r=r.substring(8));const i=r.indexOf("/");let o,a;i>0?(o=r.substring(0,i),a=r.substring(i)):(o=r,a="");let[s]=o.split(":");n.push({hostname:s,pathname:a})}}function s(e,t){return!(e.length>t.length)&&t.indexOf(e)===t.length-e.length}function c(e,t){return 0===e.indexOf("/")&&(e=e.substring(1)),0===t.indexOf("/")&&(t=t.substring(1)),""===e||e===t}},1687:(e,t,r)=>{"use strict";r.d(t,{Ak:()=>c,Ze:()=>l,x3:()=>u});var n=r(7836),i=r(3606),o=r(860),a=r(2646);const s={};function c(e,t){const r={staged:!1,priority:o.P3[t]||0};d(e),s[e].get(t)||s[e].set(t,r)}function u(e,t){e&&s[e]&&(s[e].get(t)&&s[e].delete(t),h(e,t,!1),s[e].size&&f(e))}function d(e){if(!e)throw new Error("agentIdentifier required");s[e]||(s[e]=new Map)}function l(e="",t="feature",r=!1){if(d(e),!e||!s[e].get(t)||r)return h(e,t);s[e].get(t).staged=!0,f(e)}function f(e){const t=Array.from(s[e]);t.every((([e,t])=>t.staged))&&(t.sort(((e,t)=>e[1].priority-t[1].priority)),t.forEach((([t])=>{s[e].delete(t),h(e,t)})))}function h(e,t,r=!0){const o=e?n.ee.get(e):n.ee,s=i.i.handlers;if(!o.aborted&&o.backlog&&s){if(r){const e=o.backlog[t],r=s[t];if(r){for(let t=0;e&&t<e.length;++t)p(e[t],r);Object.entries(r).forEach((([e,t])=>{Object.values(t||{}).forEach((t=>{t[0]?.on&&t[0]?.context()instanceof a.y&&t[0].on(e,t[1])}))}))}}o.isolatedBacklog||delete s[t],o.backlog[t]=null,o.emit("drain-"+t,[])}}function p(e,t){var r=e[1];Object.values(t[r]||{}).forEach((t=>{var r=e[0];if(t[0]===r){var n=t[1],i=e[3],o=e[2];n.apply(i,o)}}))}},7836:(e,t,r)=>{"use strict";r.d(t,{P:()=>c,ee:()=>u});var n=r(384),i=r(8990),o=r(3371),a=r(2646),s=r(5607);const c="nr@context:".concat(s.W),u=function e(t,r){var n={},s={},d={},l=!1;try{l=16===r.length&&(0,o.f)(r).isolatedBacklog}catch(e){}var f={on:p,addEventListener:p,removeEventListener:function(e,t){var r=n[e];if(!r)return;for(var i=0;i<r.length;i++)r[i]===t&&r.splice(i,1)},emit:function(e,r,n,i,o){!1!==o&&(o=!0);if(u.aborted&&!i)return;t&&o&&t.emit(e,r,n);for(var a=h(n),c=g(e),d=c.length,l=0;l<d;l++)c[l].apply(a,r);var p=v()[s[e]];p&&p.push([f,e,r,a]);return a},get:m,listeners:g,context:h,buffer:function(e,t){const r=v();if(t=t||"feature",f.aborted)return;Object.entries(e||{}).forEach((([e,n])=>{s[n]=t,t in r||(r[t]=[])}))},abort:function(){f._aborted=!0,Object.keys(f.backlog).forEach((e=>{delete f.backlog[e]}))},isBuffering:function(e){return!!v()[s[e]]},debugId:r,backlog:l?{}:t&&"object"==typeof t.backlog?t.backlog:{},isolatedBacklog:l};return Object.defineProperty(f,"aborted",{get:()=>{let e=f._aborted||!1;return e||(t&&(e=t.aborted),e)}}),f;function h(e){return e&&e instanceof a.y?e:e?(0,i.I)(e,c,(()=>new a.y(c))):new a.y(c)}function p(e,t){n[e]=g(e).concat(t)}function g(e){return n[e]||[]}function m(t){return d[t]=d[t]||e(f,t)}function v(){return f.backlog}}(void 0,"globalEE"),d=(0,n.Zm)();d.ee||(d.ee=u)},2646:(e,t,r)=>{"use strict";r.d(t,{y:()=>n});class n{constructor(e){this.contextId=e}}},9908:(e,t,r)=>{"use strict";r.d(t,{d:()=>n,p:()=>i});var n=r(7836).ee.get("handle");function i(e,t,r,i,o){o?(o.buffer([e],i),o.emit(e,t,r)):(n.buffer([e],i),n.emit(e,t,r))}},3606:(e,t,r)=>{"use strict";r.d(t,{i:()=>o});var n=r(9908);o.on=a;var i=o.handlers={};function o(e,t,r,o){a(o||n.d,i,e,t,r)}function a(e,t,r,i,o){o||(o="feature"),e||(e=n.d);var a=t[o]=t[o]||{};(a[r]=a[r]||[]).push([e,i])}},3878:(e,t,r)=>{"use strict";function n(e,t){return{capture:e,passive:!1,signal:t}}function i(e,t,r=!1,i){window.addEventListener(e,t,n(r,i))}function o(e,t,r=!1,i){document.addEventListener(e,t,n(r,i))}r.d(t,{DD:()=>o,jT:()=>n,sp:()=>i})},5607:(e,t,r)=>{"use strict";r.d(t,{W:()=>n});const n=(0,r(9566).bz)()},9566:(e,t,r)=>{"use strict";r.d(t,{LA:()=>s,ZF:()=>c,bz:()=>a,el:()=>u});var n=r(6154);const i="xxxxxxxx-xxxx-4xxx-yxxx-xxxxxxxxxxxx";function o(e,t){return e?15&e[t]:16*Math.random()|0}function a(){const e=n.gm?.crypto||n.gm?.msCrypto;let t,r=0;return e&&e.getRandomValues&&(t=e.getRandomValues(new Uint8Array(30))),i.split("").map((e=>"x"===e?o(t,r++).toString(16):"y"===e?(3&o()|8).toString(16):e)).join("")}function s(e){const t=n.gm?.crypto||n.gm?.msCrypto;let r,i=0;t&&t.getRandomValues&&(r=t.getRandomValues(new Uint8Array(e)));const a=[];for(var s=0;s<e;s++)a.push(o(r,i++).toString(16));return a.join("")}function c(){return s(16)}function u(){return s(32)}},2614:(e,t,r)=>{"use strict";r.d(t,{BB:()=>a,H3:()=>n,g:()=>u,iL:()=>c,tS:()=>s,uh:()=>i,wk:()=>o});const n="NRBA",i="SESSION",o=144e5,a=18e5,s={STARTED:"session-started",PAUSE:"session-pause",RESET:"session-reset",RESUME:"session-resume",UPDATE:"session-update"},c={SAME_TAB:"same-tab",CROSS_TAB:"cross-tab"},u={OFF:0,FULL:1,ERROR:2}},1863:(e,t,r)=>{"use strict";function n(){return Math.floor(performance.now())}r.d(t,{t:()=>n})},7485:(e,t,r)=>{"use strict";r.d(t,{D:()=>i});var n=r(6154);function i(e){if(0===(e||"").indexOf("data:"))return{protocol:"data"};try{const t=new URL(e,location.href),r={port:t.port,hostname:t.hostname,pathname:t.pathname,search:t.search,protocol:t.protocol.slice(0,t.protocol.indexOf(":")),sameOrigin:t.protocol===n.gm?.location?.protocol&&t.host===n.gm?.location?.host};return r.port&&""!==r.port||("http:"===t.protocol&&(r.port="80"),"https:"===t.protocol&&(r.port="443")),r.pathname&&""!==r.pathname?r.pathname.startsWith("/")||(r.pathname="/".concat(r.pathname)):r.pathname="/",r}catch(e){return{}}}},944:(e,t,r)=>{"use strict";function n(e,t){"function"==typeof console.debug&&console.debug("New Relic Warning: https://github.com/newrelic/newrelic-browser-agent/blob/main/docs/warning-codes.md#".concat(e),t)}r.d(t,{R:()=>n})},5284:(e,t,r)=>{"use strict";r.d(t,{t:()=>c,B:()=>s});var n=r(7836),i=r(6154);const o="newrelic";const a=new Set,s={};function c(e,t){const r=n.ee.get(t);s[t]??={},e&&"object"==typeof e&&(a.has(t)||(r.emit("rumresp",[e]),s[t]=e,a.add(t),function(e={}){try{i.gm.dispatchEvent(new CustomEvent(o,{detail:e}))}catch(e){}}({loaded:!0})))}},8990:(e,t,r)=>{"use strict";r.d(t,{I:()=>i});var n=Object.prototype.hasOwnProperty;function i(e,t,r){if(n.call(e,t))return e[t];var i=r();if(Object.defineProperty&&Object.keys)try{return Object.defineProperty(e,t,{value:i,writable:!0,enumerable:!1}),i}catch(e){}return e[t]=i,i}},6389:(e,t,r)=>{"use strict";function n(e,t=500,r={}){const n=r?.leading||!1;let i;return(...r)=>{n&&void 0===i&&(e.apply(this,r),i=setTimeout((()=>{i=clearTimeout(i)}),t)),n||(clearTimeout(i),i=setTimeout((()=>{e.apply(this,r)}),t))}}function i(e){let t=!1;return(...r)=>{t||(t=!0,e.apply(this,r))}}r.d(t,{J:()=>i,s:()=>n})},3304:(e,t,r)=>{"use strict";r.d(t,{A:()=>o});var n=r(7836);const i=()=>{const e=new WeakSet;return(t,r)=>{if("object"==typeof r&&null!==r){if(e.has(r))return;e.add(r)}return r}};function o(e){try{return JSON.stringify(e,i())??""}catch(e){try{n.ee.emit("internal-error",[e])}catch(e){}return""}}},5289:(e,t,r)=>{"use strict";r.d(t,{GG:()=>o,sB:()=>a});var n=r(3878);function i(){return"undefined"==typeof document||"complete"===document.readyState}function o(e,t){if(i())return e();(0,n.sp)("load",e,t)}function a(e){if(i())return e();(0,n.DD)("DOMContentLoaded",e)}},384:(e,t,r)=>{"use strict";r.d(t,{NT:()=>o,US:()=>d,Zm:()=>a,bQ:()=>c,dV:()=>s,nY:()=>u,pV:()=>l});var n=r(6154),i=r(1863);const o={beacon:"bam.nr-data.net",errorBeacon:"bam.nr-data.net"};function a(){return n.gm.NREUM||(n.gm.NREUM={}),void 0===n.gm.newrelic&&(n.gm.newrelic=n.gm.NREUM),n.gm.NREUM}function s(){let e=a();return e.o||(e.o={ST:n.gm.setTimeout,SI:n.gm.setImmediate,CT:n.gm.clearTimeout,XHR:n.gm.XMLHttpRequest,REQ:n.gm.Request,EV:n.gm.Event,PR:n.gm.Promise,MO:n.gm.MutationObserver,FETCH:n.gm.fetch,WS:n.gm.WebSocket}),e}function c(e,t){let r=a();r.initializedAgents??={},t.initializedAt={ms:(0,i.t)(),date:new Date},r.initializedAgents[e]=t}function u(e){let t=a();return t.initializedAgents?.[e]}function d(e,t){a()[e]=t}function l(){return function(){let e=a();const t=e.info||{};e.info={beacon:o.beacon,errorBeacon:o.errorBeacon,...t}}(),function(){let e=a();const t=e.init||{};e.init={...t}}(),s(),function(){let e=a();const t=e.loader_config||{};e.loader_config={...t}}(),a()}},2843:(e,t,r)=>{"use strict";r.d(t,{u:()=>i});var n=r(3878);function i(e,t=!1,r,i){(0,n.DD)("visibilitychange",(function(){if(t)return void("hidden"===document.visibilityState&&e());e(document.visibilityState)}),r,i)}},8139:(e,t,r)=>{"use strict";r.d(t,{u:()=>f});var n=r(7836),i=r(3434),o=r(8990),a=r(6154);const s={},c=a.gm.XMLHttpRequest,u="addEventListener",d="removeEventListener",l="nr@wrapped:".concat(n.P);function f(e){var t=function(e){return(e||n.ee).get("events")}(e);if(s[t.debugId]++)return t;s[t.debugId]=1;var r=(0,i.YM)(t,!0);function f(e){r.inPlace(e,[u,d],"-",p)}function p(e,t){return e[1]}return"getPrototypeOf"in Object&&(a.RI&&h(document,f),h(a.gm,f),h(c.prototype,f)),t.on(u+"-start",(function(e,t){var n=e[1];if(null!==n&&("function"==typeof n||"object"==typeof n)){var i=(0,o.I)(n,l,(function(){var e={object:function(){if("function"!=typeof n.handleEvent)return;return n.handleEvent.apply(n,arguments)},function:n}[typeof n];return e?r(e,"fn-",null,e.name||"anonymous"):n}));this.wrapped=e[1]=i}})),t.on(d+"-start",(function(e){e[1]=this.wrapped||e[1]})),t}function h(e,t,...r){let n=e;for(;"object"==typeof n&&!Object.prototype.hasOwnProperty.call(n,u);)n=Object.getPrototypeOf(n);n&&t(n,...r)}},3434:(e,t,r)=>{"use strict";r.d(t,{Jt:()=>o,YM:()=>c});var n=r(7836),i=r(5607);const o="nr@original:".concat(i.W);var a=Object.prototype.hasOwnProperty,s=!1;function c(e,t){return e||(e=n.ee),r.inPlace=function(e,t,n,i,o){n||(n="");const a="-"===n.charAt(0);for(let s=0;s<t.length;s++){const c=t[s],u=e[c];d(u)||(e[c]=r(u,a?c+n:n,i,c,o))}},r.flag=o,r;function r(t,r,n,s,c){return d(t)?t:(r||(r=""),nrWrapper[o]=t,function(e,t,r){if(Object.defineProperty&&Object.keys)try{return Object.keys(e).forEach((function(r){Object.defineProperty(t,r,{get:function(){return e[r]},set:function(t){return e[r]=t,t}})})),t}catch(e){u([e],r)}for(var n in e)a.call(e,n)&&(t[n]=e[n])}(t,nrWrapper,e),nrWrapper);function nrWrapper(){var o,a,d,l;try{a=this,o=[...arguments],d="function"==typeof n?n(o,a):n||{}}catch(t){u([t,"",[o,a,s],d],e)}i(r+"start",[o,a,s],d,c);try{return l=t.apply(a,o)}catch(e){throw i(r+"err",[o,a,e],d,c),e}finally{i(r+"end",[o,a,l],d,c)}}}function i(r,n,i,o){if(!s||t){var a=s;s=!0;try{e.emit(r,n,i,t,o)}catch(t){u([t,r,n,i],e)}s=a}}}function u(e,t){t||(t=n.ee);try{t.emit("internal-error",e)}catch(e){}}function d(e){return!(e&&"function"==typeof e&&e.apply&&!e[o])}},9300:(e,t,r)=>{"use strict";r.d(t,{T:()=>n});const n=r(860).K7.ajax},3333:(e,t,r)=>{"use strict";r.d(t,{TZ:()=>n,Zp:()=>i,mq:()=>s,nf:()=>a,qN:()=>o});const n=r(860).K7.genericEvents,i=["auxclick","click","copy","keydown","paste","scrollend"],o=["focus","blur"],a=4,s=1e3},6774:(e,t,r)=>{"use strict";r.d(t,{T:()=>n});const n=r(860).K7.jserrors},993:(e,t,r)=>{"use strict";r.d(t,{ET:()=>o,TZ:()=>a,p_:()=>i});var n=r(860);const i={ERROR:"ERROR",WARN:"WARN",INFO:"INFO",DEBUG:"DEBUG",TRACE:"TRACE"},o="log",a=n.K7.logging},3785:(e,t,r)=>{"use strict";r.d(t,{R:()=>c,b:()=>u});var n=r(9908),i=r(1863),o=r(860),a=r(3969),s=r(993);function c(e,t,r={},c=s.p_.INFO){(0,n.p)(a.xV,["API/logging/".concat(c.toLowerCase(),"/called")],void 0,o.K7.metrics,e),(0,n.p)(s.ET,[(0,i.t)(),t,r,c],void 0,o.K7.logging,e)}function u(e){return"string"==typeof e&&Object.values(s.p_).some((t=>t===e.toUpperCase().trim()))}},3969:(e,t,r)=>{"use strict";r.d(t,{TZ:()=>n,XG:()=>s,rs:()=>i,xV:()=>a,z_:()=>o});const n=r(860).K7.metrics,i="sm",o="cm",a="storeSupportabilityMetrics",s="storeEventMetrics"},6630:(e,t,r)=>{"use strict";r.d(t,{T:()=>n});const n=r(860).K7.pageViewEvent},782:(e,t,r)=>{"use strict";r.d(t,{T:()=>n});const n=r(860).K7.pageViewTiming},6344:(e,t,r)=>{"use strict";r.d(t,{BB:()=>d,G4:()=>o,Qb:()=>l,TZ:()=>i,Ug:()=>a,_s:()=>s,bc:()=>u,yP:()=>c});var n=r(2614);const i=r(860).K7.sessionReplay,o={RECORD:"recordReplay",PAUSE:"pauseReplay",REPLAY_RUNNING:"replayRunning",ERROR_DURING_REPLAY:"errorDuringReplay"},a=.12,s={DomContentLoaded:0,Load:1,FullSnapshot:2,IncrementalSnapshot:3,Meta:4,Custom:5},c={[n.g.ERROR]:15e3,[n.g.FULL]:3e5,[n.g.OFF]:0},u={RESET:{message:"Session was reset",sm:"Reset"},IMPORT:{message:"Recorder failed to import",sm:"Import"},TOO_MANY:{message:"429: Too Many Requests",sm:"Too-Many"},TOO_BIG:{message:"Payload was too large",sm:"Too-Big"},CROSS_TAB:{message:"Session Entity was set to OFF on another tab",sm:"Cross-Tab"},ENTITLEMENTS:{message:"Session Replay is not allowed and will not be started",sm:"Entitlement"}},d=5e3,l={API:"api"}},5270:(e,t,r)=>{"use strict";r.d(t,{Aw:()=>c,CT:()=>u,SR:()=>s});var n=r(384),i=r(9417),o=r(7767),a=r(6154);function s(e){return!!(0,n.dV)().o.MO&&(0,o.V)(e)&&!0===(0,i.gD)(e,"session_trace.enabled")}function c(e){return!0===(0,i.gD)(e,"session_replay.preload")&&s(e)}function u(e,t){const r=t.correctAbsoluteTimestamp(e);return{originalTimestamp:e,correctedTimestamp:r,timestampDiff:e-r,originTime:a.WN,correctedOriginTime:t.correctedOriginTime,originTimeDiff:Math.floor(a.WN-t.correctedOriginTime)}}},3738:(e,t,r)=>{"use strict";r.d(t,{He:()=>i,Kp:()=>s,Lc:()=>u,Rz:()=>d,TZ:()=>n,bD:()=>o,d3:()=>a,jx:()=>l,uP:()=>c});const n=r(860).K7.sessionTrace,i="bstResource",o="resource",a="-start",s="-end",c="fn"+a,u="fn"+s,d="pushState",l=1e3},3962:(e,t,r)=>{"use strict";r.d(t,{AM:()=>o,O2:()=>s,Qu:()=>c,TZ:()=>a,ih:()=>u,tC:()=>i});var n=r(860);const i=["click","keydown","submit"],o="api",a=n.K7.softNav,s={INITIAL_PAGE_LOAD:"",ROUTE_CHANGE:1,UNSPECIFIED:2},c={INTERACTION:1,AJAX:2,CUSTOM_END:3,CUSTOM_TRACER:4},u={IP:"in progress",FIN:"finished",CAN:"cancelled"}},7378:(e,t,r)=>{"use strict";r.d(t,{$p:()=>x,BR:()=>b,Kp:()=>R,L3:()=>y,Lc:()=>c,NC:()=>o,SG:()=>d,TZ:()=>i,U6:()=>p,UT:()=>m,d3:()=>w,dT:()=>f,e5:()=>A,gx:()=>v,l9:()=>l,oW:()=>h,op:()=>g,rw:()=>u,tH:()=>E,uP:()=>s,wW:()=>T,xq:()=>a});var n=r(384);const i=r(860).K7.spa,o=["click","submit","keypress","keydown","keyup","change"],a=999,s="fn-start",c="fn-end",u="cb-start",d="api-ixn-",l="remaining",f="interaction",h="spaNode",p="jsonpNode",g="fetch-start",m="fetch-done",v="fetch-body-",b="jsonp-end",y=(0,n.dV)().o.ST,w="-start",R="-end",x="-body",T="cb"+R,A="jsTime",E="fetch"},4234:(e,t,r)=>{"use strict";r.d(t,{W:()=>o});var n=r(7836),i=r(1687);class o{constructor(e,t){this.agentIdentifier=e,this.ee=n.ee.get(e),this.featureName=t,this.blocked=!1}deregisterDrain(){(0,i.x3)(this.agentIdentifier,this.featureName)}}},7767:(e,t,r)=>{"use strict";r.d(t,{V:()=>o});var n=r(9417),i=r(6154);const o=e=>i.RI&&!0===(0,n.gD)(e,"privacy.cookies_enabled")},425:(e,t,r)=>{"use strict";r.d(t,{j:()=>j});var n=r(860),i=r(2555),o=r(3371),a=r(9908),s=r(7836),c=r(1687),u=r(5289),d=r(6154),l=r(944),f=r(3969),h=r(384),p=r(6344);const g=["setErrorHandler","finished","addToTrace","addRelease","addPageAction","setCurrentRouteName","setPageViewName","setCustomAttribute","interaction","noticeError","setUserId","setApplicationVersion","start",p.G4.RECORD,p.G4.PAUSE,"log","wrapLogger"],m=["setErrorHandler","finished","addToTrace","addRelease"];var v=r(1863),b=r(2614),y=r(993),w=r(3785),R=r(2646),x=r(3434);function T(e,t,r,n){if("object"!=typeof t||!t||"string"!=typeof r||!r||"function"!=typeof t[r])return(0,l.R)(29);const i=function(e){return(e||s.ee).get("logger")}(e),o=(0,x.YM)(i),a=new R.y(s.P);return a.level=n.level,a.customAttributes=n.customAttributes,o.inPlace(t,[r],"wrap-logger-",a),i}function A(){const e=(0,h.pV)();g.forEach((t=>{e[t]=(...r)=>function(t,...r){let n=[];return Object.values(e.initializedAgents).forEach((e=>{e&&e.api?e.exposed&&e.api[t]&&n.push(e.api[t](...r)):(0,l.R)(38,t)})),n.length>1?n:n[0]}(t,...r)}))}const E={};var S=r(9417),N=r(5603),O=r(5284);const _=e=>{const t=e.startsWith("http");e+="/",r.p=t?e:"https://"+e};let I=!1;function j(e,t={},g,R){let{init:x,info:j,loader_config:P,runtime:C={},exposed:k=!0}=t;C.loaderType=g;const L=(0,h.pV)();j||(x=L.init,j=L.info,P=L.loader_config),(0,S.xN)(e.agentIdentifier,x||{}),(0,N.a)(e.agentIdentifier,P||{}),j.jsAttributes??={},d.bv&&(j.jsAttributes.isWorker=!0),(0,i.x1)(e.agentIdentifier,j);const H=(0,S.D0)(e.agentIdentifier),D=[j.beacon,j.errorBeacon];I||(H.proxy.assets&&(_(H.proxy.assets),D.push(H.proxy.assets)),H.proxy.beacon&&D.push(H.proxy.beacon),A(),(0,h.US)("activatedFeatures",O.B),e.runSoftNavOverSpa&&=!0===H.soft_navigations.enabled&&H.feature_flags.includes("soft_nav")),C.denyList=[...H.ajax.deny_list||[],...H.ajax.block_internal?D:[]],C.ptid=e.agentIdentifier,(0,o.V)(e.agentIdentifier,C),e.ee=s.ee.get(e.agentIdentifier),void 0===e.api&&(e.api=function(e,t,h=!1){t||(0,c.Ak)(e,"api");const g={};var R=s.ee.get(e),x=R.get("tracer");E[e]=b.g.OFF,R.on(p.G4.REPLAY_RUNNING,(t=>{E[e]=t}));var A="api-",S=A+"ixn-";function N(t,r,n,o){const a=(0,i.Vp)(e);return null===r?delete a.jsAttributes[t]:(0,i.x1)(e,{...a,jsAttributes:{...a.jsAttributes,[t]:r}}),I(A,n,!0,o||null===r?"session":void 0)(t,r)}function O(){}g.log=function(e,{customAttributes:t={},level:r=y.p_.INFO}={}){(0,a.p)(f.xV,["API/log/called"],void 0,n.K7.metrics,R),(0,w.R)(R,e,t,r)},g.wrapLogger=(e,t,{customAttributes:r={},level:i=y.p_.INFO}={})=>{(0,a.p)(f.xV,["API/wrapLogger/called"],void 0,n.K7.metrics,R),T(R,e,t,{customAttributes:r,level:i})},m.forEach((e=>{g[e]=I(A,e,!0,"api")})),g.addPageAction=I(A,"addPageAction",!0,n.K7.genericEvents),g.setPageViewName=function(t,r){if("string"==typeof t)return"/"!==t.charAt(0)&&(t="/"+t),(0,o.f)(e).customTransaction=(r||"http://custom.transaction")+t,I(A,"setPageViewName",!0)()},g.setCustomAttribute=function(e,t,r=!1){if("string"==typeof e){if(["string","number","boolean"].includes(typeof t)||null===t)return N(e,t,"setCustomAttribute",r);(0,l.R)(40,typeof t)}else(0,l.R)(39,typeof e)},g.setUserId=function(e){if("string"==typeof e||null===e)return N("enduser.id",e,"setUserId",!0);(0,l.R)(41,typeof e)},g.setApplicationVersion=function(e){if("string"==typeof e||null===e)return N("application.version",e,"setApplicationVersion",!1);(0,l.R)(42,typeof e)},g.start=()=>{try{(0,a.p)(f.xV,["API/start/called"],void 0,n.K7.metrics,R),R.emit("manual-start-all")}catch(e){(0,l.R)(23,e)}},g[p.G4.RECORD]=function(){(0,a.p)(f.xV,["API/recordReplay/called"],void 0,n.K7.metrics,R),(0,a.p)(p.G4.RECORD,[],void 0,n.K7.sessionReplay,R)},g[p.G4.PAUSE]=function(){(0,a.p)(f.xV,["API/pauseReplay/called"],void 0,n.K7.metrics,R),(0,a.p)(p.G4.PAUSE,[],void 0,n.K7.sessionReplay,R)},g.interaction=function(e){return(new O).get("object"==typeof e?e:{})};const _=O.prototype={createTracer:function(e,t){var r={},i=this,o="function"==typeof t;return(0,a.p)(f.xV,["API/createTracer/called"],void 0,n.K7.metrics,R),h||(0,a.p)(S+"tracer",[(0,v.t)(),e,r],i,n.K7.spa,R),function(){if(x.emit((o?"":"no-")+"fn-start",[(0,v.t)(),i,o],r),o)try{return t.apply(this,arguments)}catch(e){const t="string"==typeof e?new Error(e):e;throw x.emit("fn-err",[arguments,this,t],r),t}finally{x.emit("fn-end",[(0,v.t)()],r)}}}};function I(e,t,r,i){return function(){return(0,a.p)(f.xV,["API/"+t+"/called"],void 0,n.K7.metrics,R),i&&(0,a.p)(e+t,[(0,v.t)(),...arguments],r?null:this,i,R),r?void 0:this}}function j(){r.e(478).then(r.bind(r,8778)).then((({setAPI:t})=>{t(e),(0,c.Ze)(e,"api")})).catch((e=>{(0,l.R)(27,e),R.abort()}))}return["actionText","setName","setAttribute","save","ignore","onEnd","getContext","end","get"].forEach((e=>{_[e]=I(S,e,void 0,h?n.K7.softNav:n.K7.spa)})),g.setCurrentRouteName=h?I(S,"routeName",void 0,n.K7.softNav):I(A,"routeName",!0,n.K7.spa),g.noticeError=function(t,r){"string"==typeof t&&(t=new Error(t)),(0,a.p)(f.xV,["API/noticeError/called"],void 0,n.K7.metrics,R),(0,a.p)("err",[t,(0,v.t)(),!1,r,!!E[e]],void 0,n.K7.jserrors,R)},d.RI?(0,u.GG)((()=>j()),!0):j(),g}(e.agentIdentifier,R,e.runSoftNavOverSpa)),void 0===e.exposed&&(e.exposed=k),I=!0}},8374:(e,t,r)=>{r.nc=(()=>{try{return document?.currentScript?.nonce}catch(e){}return""})()},860:(e,t,r)=>{"use strict";r.d(t,{$J:()=>o,K7:()=>n,P3:()=>i});const n={ajax:"ajax",genericEvents:"generic_events",jserrors:"jserrors",logging:"logging",metrics:"metrics",pageAction:"page_action",pageViewEvent:"page_view_event",pageViewTiming:"page_view_timing",sessionReplay:"session_replay",sessionTrace:"session_trace",softNav:"soft_navigations",spa:"spa"},i={[n.pageViewEvent]:1,[n.pageViewTiming]:2,[n.metrics]:3,[n.jserrors]:4,[n.spa]:5,[n.ajax]:6,[n.sessionTrace]:7,[n.softNav]:8,[n.sessionReplay]:9,[n.logging]:10,[n.genericEvents]:11},o={[n.pageViewTiming]:"events",[n.ajax]:"events",[n.spa]:"events",[n.softNav]:"events",[n.metrics]:"jserrors",[n.jserrors]:"jserrors",[n.sessionTrace]:"browser/blobs",[n.sessionReplay]:"browser/blobs",[n.logging]:"browser/logs",[n.genericEvents]:"ins"}}},n={};function i(e){var t=n[e];if(void 0!==t)return t.exports;var o=n[e]={exports:{}};return r[e](o,o.exports,i),o.exports}i.m=r,i.d=(e,t)=>{for(var r in t)i.o(t,r)&&!i.o(e,r)&&Object.defineProperty(e,r,{enumerable:!0,get:t[r]})},i.f={},i.e=e=>Promise.all(Object.keys(i.f).reduce(((t,r)=>(i.f[r](e,t),t)),[])),i.u=e=>({212:"nr-spa-compressor",249:"nr-spa-recorder",478:"nr-spa"}[e]+"-1.274.0.min.js"),i.o=(e,t)=>Object.prototype.hasOwnProperty.call(e,t),e={},t="NRBA-1.274.0.PROD:",i.l=(r,n,o,a)=>{if(e[r])e[r].push(n);else{var s,c;if(void 0!==o)for(var u=document.getElementsByTagName("script"),d=0;d<u.length;d++){var l=u[d];if(l.getAttribute("src")==r||l.getAttribute("data-webpack")==t+o){s=l;break}}if(!s){c=!0;var f={478:"sha512-1vUqEfJPB8Pihje9mv5CfYgkitO1FWcS+UQb84DbXqP8oYctRv4/lzl/MzNLPlRhcY1WVDBGL20I8vm6s2VV7g==",249:"sha512-Y/BeZAh6VSTmUtUNmS5XdyKxL92s30Fyyj8xVW76HSPxcKItL4+x2+kGMZc8pMJnUpZDz1L4eftZQAJh3D8NnA==",212:"sha512-Gn2tQ3qog5Yhrx/gRutkSTYPp+7nkKFt4/mIXg99LxcNpMDAYJZDBYmAACdoHNM86+iq1F3cBcQotFNzjIX8bw=="};(s=document.createElement("script")).charset="utf-8",s.timeout=120,i.nc&&s.setAttribute("nonce",i.nc),s.setAttribute("data-webpack",t+o),s.src=r,0!==s.src.indexOf(window.location.origin+"/")&&(s.crossOrigin="anonymous"),f[a]&&(s.integrity=f[a])}e[r]=[n];var h=(t,n)=>{s.onerror=s.onload=null,clearTimeout(p);var i=e[r];if(delete e[r],s.parentNode&&s.parentNode.removeChild(s),i&&i.forEach((e=>e(n))),t)return t(n)},p=setTimeout(h.bind(null,void 0,{type:"timeout",target:s}),12e4);s.onerror=h.bind(null,s.onerror),s.onload=h.bind(null,s.onload),c&&document.head.appendChild(s)}},i.r=e=>{"undefined"!=typeof Symbol&&Symbol.toStringTag&&Object.defineProperty(e,Symbol.toStringTag,{value:"Module"}),Object.defineProperty(e,"__esModule",{value:!0})},i.p="https://js-agent.newrelic.com/",(()=>{var e={38:0,788:0};i.f.j=(t,r)=>{var n=i.o(e,t)?e[t]:void 0;if(0!==n)if(n)r.push(n[2]);else{var o=new Promise(((r,i)=>n=e[t]=[r,i]));r.push(n[2]=o);var a=i.p+i.u(t),s=new Error;i.l(a,(r=>{if(i.o(e,t)&&(0!==(n=e[t])&&(e[t]=void 0),n)){var o=r&&("load"===r.type?"missing":r.type),a=r&&r.target&&r.target.src;s.message="Loading chunk "+t+" failed.\n("+o+": "+a+")",s.name="ChunkLoadError",s.type=o,s.request=a,n[1](s)}}),"chunk-"+t,t)}};var t=(t,r)=>{var n,o,[a,s,c]=r,u=0;if(a.some((t=>0!==e[t]))){for(n in s)i.o(s,n)&&(i.m[n]=s[n]);if(c)c(i)}for(t&&t(r);u<a.length;u++)o=a[u],i.o(e,o)&&e[o]&&e[o][0](),e[o]=0},r=self["webpackChunk:NRBA-1.274.0.PROD"]=self["webpackChunk:NRBA-1.274.0.PROD"]||[];r.forEach(t.bind(null,0)),r.push=t.bind(null,r.push.bind(r))})(),(()=>{"use strict";i(8374);var e=i(944),t=i(6344),r=i(9566);class n{agentIdentifier;constructor(e=(0,r.LA)(16)){this.agentIdentifier=e}#e(t,...r){if("function"==typeof this.api?.[t])return this.api[t](...r);(0,e.R)(35,t)}addPageAction(e,t){return this.#e("addPageAction",e,t)}setPageViewName(e,t){return this.#e("setPageViewName",e,t)}setCustomAttribute(e,t,r){return this.#e("setCustomAttribute",e,t,r)}noticeError(e,t){return this.#e("noticeError",e,t)}setUserId(e){return this.#e("setUserId",e)}setApplicationVersion(e){return this.#e("setApplicationVersion",e)}setErrorHandler(e){return this.#e("setErrorHandler",e)}addRelease(e,t){return this.#e("addRelease",e,t)}log(e,t){return this.#e("log",e,t)}}class o extends n{#e(t,...r){if("function"==typeof this.api?.[t])return this.api[t](...r);(0,e.R)(35,t)}start(){return this.#e("start")}finished(e){return this.#e("finished",e)}recordReplay(){return this.#e(t.G4.RECORD)}pauseReplay(){return this.#e(t.G4.PAUSE)}addToTrace(e){return this.#e("addToTrace",e)}setCurrentRouteName(e){return this.#e("setCurrentRouteName",e)}interaction(){return this.#e("interaction")}wrapLogger(e,t,r){return this.#e("wrapLogger",e,t,r)}}var a=i(860),s=i(9417);const c=Object.values(a.K7);function u(e){const t={};return c.forEach((r=>{t[r]=function(e,t){return!0===(0,s.gD)(t,"".concat(e,".enabled"))}(r,e)})),t}var d=i(425);var l=i(1687),f=i(4234),h=i(5289),p=i(6154),g=i(5270),m=i(7767),v=i(6389);class b extends f.W{constructor(e,t,r=!0){super(e.agentIdentifier,t),this.auto=r,this.abortHandler=void 0,this.featAggregate=void 0,this.onAggregateImported=void 0,!1===e.init[this.featureName].autoStart&&(this.auto=!1),this.auto?(0,l.Ak)(e.agentIdentifier,t):this.ee.on("manual-start-all",(0,v.J)((()=>{(0,l.Ak)(e.agentIdentifier,this.featureName),this.auto=!0,this.importAggregator(e)})))}importAggregator(t,r={}){if(this.featAggregate||!this.auto)return;let n;this.onAggregateImported=new Promise((e=>{n=e}));const o=async()=>{let o;try{if((0,m.V)(this.agentIdentifier)){const{setupAgentSession:e}=await i.e(478).then(i.bind(i,6526));o=e(t)}}catch(t){(0,e.R)(20,t),this.ee.emit("internal-error",[t]),this.featureName===a.K7.sessionReplay&&this.abortHandler?.()}try{if(t.sharedAggregator)await t.sharedAggregator;else{t.sharedAggregator=i.e(478).then(i.bind(i,9337));const{EventAggregator:e}=await t.sharedAggregator;t.sharedAggregator=new e}if(!this.#t(this.featureName,o))return(0,l.Ze)(this.agentIdentifier,this.featureName),void n(!1);const{lazyFeatureLoader:e}=await i.e(478).then(i.bind(i,6103)),{Aggregate:a}=await e(this.featureName,"aggregate");this.featAggregate=new a(t,r),n(!0)}catch(t){(0,e.R)(34,t),this.abortHandler?.(),(0,l.Ze)(this.agentIdentifier,this.featureName,!0),n(!1),this.ee&&this.ee.abort()}};p.RI?(0,h.GG)((()=>o()),!0):o()}#t(e,t){switch(e){case a.K7.sessionReplay:return(0,g.SR)(this.agentIdentifier)&&!!t;case a.K7.sessionTrace:return!!t;default:return!0}}}var y=i(6630);class w extends b{static featureName=y.T;constructor(e,t=!0){super(e,y.T,t),this.importAggregator(e)}}var R=i(384);var x=i(9908),T=i(2843),A=i(3878),E=i(782),S=i(1863);class N extends b{static featureName=E.T;constructor(e,t=!0){super(e,E.T,t),p.RI&&((0,T.u)((()=>(0,x.p)("docHidden",[(0,S.t)()],void 0,E.T,this.ee)),!0),(0,A.sp)("pagehide",(()=>(0,x.p)("winPagehide",[(0,S.t)()],void 0,E.T,this.ee))),this.importAggregator(e))}}var O=i(3969);class _ extends b{static featureName=O.TZ;constructor(e,t=!0){super(e,O.TZ,t),this.importAggregator(e)}}var I=i(6774),j=i(3304);class P{constructor(e,t,r,n,i){this.name="UncaughtError",this.message="string"==typeof e?e:(0,j.A)(e),this.sourceURL=t,this.line=r,this.column=n,this.__newrelic=i}}function C(e){return H(e)?e:new P(void 0!==e?.message?e.message:e,e?.filename||e?.sourceURL,e?.lineno||e?.line,e?.colno||e?.col,e?.__newrelic)}function k(e){const t="Unhandled Promise Rejection";if(!e?.reason)return;if(H(e.reason))try{return e.reason.message=t+": "+e.reason.message,C(e.reason)}catch(t){return C(e.reason)}const r=C(e.reason);return r.message=t+": "+r?.message,r}function L(e){if(e.error instanceof SyntaxError&&!/:\d+$/.test(e.error.stack?.trim())){const t=new P(e.message,e.filename,e.lineno,e.colno,e.error.__newrelic);return t.name=SyntaxError.name,t}return H(e.error)?e.error:C(e)}function H(e){return e instanceof Error&&!!e.stack}class D extends b{static featureName=I.T;#r=!1;constructor(e,r=!0){super(e,I.T,r);try{this.removeOnAbort=new AbortController}catch(e){}this.ee.on("internal-error",(e=>{this.abortHandler&&(0,x.p)("ierr",[C(e),(0,S.t)(),!0,{},this.#r],void 0,this.featureName,this.ee)})),this.ee.on(t.G4.REPLAY_RUNNING,(e=>{this.#r=e})),p.gm.addEventListener("unhandledrejection",(e=>{this.abortHandler&&(0,x.p)("err",[k(e),(0,S.t)(),!1,{unhandledPromiseRejection:1},this.#r],void 0,this.featureName,this.ee)}),(0,A.jT)(!1,this.removeOnAbort?.signal)),p.gm.addEventListener("error",(e=>{this.abortHandler&&(0,x.p)("err",[L(e),(0,S.t)(),!1,{},this.#r],void 0,this.featureName,this.ee)}),(0,A.jT)(!1,this.removeOnAbort?.signal)),this.abortHandler=this.#n,this.importAggregator(e)}#n(){this.removeOnAbort?.abort(),this.abortHandler=void 0}}var M=i(8990);let K=1;const U="nr@id";function V(e){const t=typeof e;return!e||"object"!==t&&"function"!==t?-1:e===p.gm?0:(0,M.I)(e,U,(function(){return K++}))}function G(e){if("string"==typeof e&&e.length)return e.length;if("object"==typeof e){if("undefined"!=typeof ArrayBuffer&&e instanceof ArrayBuffer&&e.byteLength)return e.byteLength;if("undefined"!=typeof Blob&&e instanceof Blob&&e.size)return e.size;if(!("undefined"!=typeof FormData&&e instanceof FormData))try{return(0,j.A)(e).length}catch(e){return}}}var F=i(8139),B=i(7836),W=i(3434);const z={},q=["open","send"];function Z(t){var r=t||B.ee;const n=function(e){return(e||B.ee).get("xhr")}(r);if(z[n.debugId]++)return n;z[n.debugId]=1,(0,F.u)(r);var i=(0,W.YM)(n),o=p.gm.XMLHttpRequest,a=p.gm.MutationObserver,s=p.gm.Promise,c=p.gm.setInterval,u="readystatechange",d=["onload","onerror","onabort","onloadstart","onloadend","onprogress","ontimeout"],l=[],f=p.gm.XMLHttpRequest=function(t){const r=new o(t),a=n.context(r);try{n.emit("new-xhr",[r],a),r.addEventListener(u,(s=a,function(){var e=this;e.readyState>3&&!s.resolved&&(s.resolved=!0,n.emit("xhr-resolved",[],e)),i.inPlace(e,d,"fn-",y)}),(0,A.jT)(!1))}catch(t){(0,e.R)(15,t);try{n.emit("internal-error",[t])}catch(e){}}var s;return r};function h(e,t){i.inPlace(t,["onreadystatechange"],"fn-",y)}if(function(e,t){for(var r in e)t[r]=e[r]}(o,f),f.prototype=o.prototype,i.inPlace(f.prototype,q,"-xhr-",y),n.on("send-xhr-start",(function(e,t){h(e,t),function(e){l.push(e),a&&(g?g.then(b):c?c(b):(m=-m,v.data=m))}(t)})),n.on("open-xhr-start",h),a){var g=s&&s.resolve();if(!c&&!s){var m=1,v=document.createTextNode(m);new a(b).observe(v,{characterData:!0})}}else r.on("fn-end",(function(e){e[0]&&e[0].type===u||b()}));function b(){for(var e=0;e<l.length;e++)h(0,l[e]);l.length&&(l=[])}function y(e,t){return t}return n}var Y="fetch-",X=Y+"body-",J=["arrayBuffer","blob","json","text","formData"],Q=p.gm.Request,ee=p.gm.Response,te="prototype";const re={};function ne(e){const t=function(e){return(e||B.ee).get("fetch")}(e);if(!(Q&&ee&&p.gm.fetch))return t;if(re[t.debugId]++)return t;function r(e,r,n){var i=e[r];"function"==typeof i&&(e[r]=function(){var e,r=[...arguments],o={};t.emit(n+"before-start",[r],o),o[B.P]&&o[B.P].dt&&(e=o[B.P].dt);var a=i.apply(this,r);return t.emit(n+"start",[r,e],a),a.then((function(e){return t.emit(n+"end",[null,e],a),e}),(function(e){throw t.emit(n+"end",[e],a),e}))})}return re[t.debugId]=1,J.forEach((e=>{r(Q[te],e,X),r(ee[te],e,X)})),r(p.gm,"fetch",Y),t.on(Y+"end",(function(e,r){var n=this;if(r){var i=r.headers.get("content-length");null!==i&&(n.rxSize=i),t.emit(Y+"done",[null,r],n)}else t.emit(Y+"done",[e],n)})),t}var ie=i(7485),oe=i(5603);class ae{constructor(e){this.agentIdentifier=e}generateTracePayload(e){if(!this.shouldGenerateTrace(e))return null;var t=(0,oe.o)(this.agentIdentifier);if(!t)return null;var n=(t.accountID||"").toString()||null,i=(t.agentID||"").toString()||null,o=(t.trustKey||"").toString()||null;if(!n||!i)return null;var a=(0,r.ZF)(),s=(0,r.el)(),c=Date.now(),u={spanId:a,traceId:s,timestamp:c};return(e.sameOrigin||this.isAllowedOrigin(e)&&this.useTraceContextHeadersForCors())&&(u.traceContextParentHeader=this.generateTraceContextParentHeader(a,s),u.traceContextStateHeader=this.generateTraceContextStateHeader(a,c,n,i,o)),(e.sameOrigin&&!this.excludeNewrelicHeader()||!e.sameOrigin&&this.isAllowedOrigin(e)&&this.useNewrelicHeaderForCors())&&(u.newrelicHeader=this.generateTraceHeader(a,s,c,n,i,o)),u}generateTraceContextParentHeader(e,t){return"00-"+t+"-"+e+"-01"}generateTraceContextStateHeader(e,t,r,n,i){return i+"@nr=0-1-"+r+"-"+n+"-"+e+"----"+t}generateTraceHeader(e,t,r,n,i,o){if(!("function"==typeof p.gm?.btoa))return null;var a={v:[0,1],d:{ty:"Browser",ac:n,ap:i,id:e,tr:t,ti:r}};return o&&n!==o&&(a.d.tk=o),btoa((0,j.A)(a))}shouldGenerateTrace(e){return this.isDtEnabled()&&this.isAllowedOrigin(e)}isAllowedOrigin(e){var t=!1,r={};if((0,s.gD)(this.agentIdentifier,"distributed_tracing")&&(r=(0,s.D0)(this.agentIdentifier).distributed_tracing),e.sameOrigin)t=!0;else if(r.allowed_origins instanceof Array)for(var n=0;n<r.allowed_origins.length;n++){var i=(0,ie.D)(r.allowed_origins[n]);if(e.hostname===i.hostname&&e.protocol===i.protocol&&e.port===i.port){t=!0;break}}return t}isDtEnabled(){var e=(0,s.gD)(this.agentIdentifier,"distributed_tracing");return!!e&&!!e.enabled}excludeNewrelicHeader(){var e=(0,s.gD)(this.agentIdentifier,"distributed_tracing");return!!e&&!!e.exclude_newrelic_header}useNewrelicHeaderForCors(){var e=(0,s.gD)(this.agentIdentifier,"distributed_tracing");return!!e&&!1!==e.cors_use_newrelic_header}useTraceContextHeadersForCors(){var e=(0,s.gD)(this.agentIdentifier,"distributed_tracing");return!!e&&!!e.cors_use_tracecontext_headers}}var se=i(9300),ce=i(7295),ue=["load","error","abort","timeout"],de=ue.length,le=(0,R.dV)().o.REQ,fe=(0,R.dV)().o.XHR;class he extends b{static featureName=se.T;constructor(e,t=!0){super(e,se.T,t),this.dt=new ae(e.agentIdentifier),this.handler=(e,t,r,n)=>(0,x.p)(e,t,r,n,this.ee);try{const e={xmlhttprequest:"xhr",fetch:"fetch",beacon:"beacon"};p.gm?.performance?.getEntriesByType("resource").forEach((t=>{if(t.initiatorType in e&&0!==t.responseStatus){const r={status:t.responseStatus},n={rxSize:t.transferSize,duration:Math.floor(t.duration),cbTime:0};pe(r,t.name),this.handler("xhr",[r,n,t.startTime,t.responseEnd,e[t.initiatorType]],void 0,a.K7.ajax)}}))}catch(e){}ne(this.ee),Z(this.ee),function(e,t,r,n){function i(e){var t=this;t.totalCbs=0,t.called=0,t.cbTime=0,t.end=R,t.ended=!1,t.xhrGuids={},t.lastSize=null,t.loadCaptureCalled=!1,t.params=this.params||{},t.metrics=this.metrics||{},e.addEventListener("load",(function(r){T(t,e)}),(0,A.jT)(!1)),p.lR||e.addEventListener("progress",(function(e){t.lastSize=e.loaded}),(0,A.jT)(!1))}function o(e){this.params={method:e[0]},pe(this,e[1]),this.metrics={}}function s(t,r){e.loader_config.xpid&&this.sameOrigin&&r.setRequestHeader("X-NewRelic-ID",e.loader_config.xpid);var i=n.generateTracePayload(this.parsedOrigin);if(i){var o=!1;i.newrelicHeader&&(r.setRequestHeader("newrelic",i.newrelicHeader),o=!0),i.traceContextParentHeader&&(r.setRequestHeader("traceparent",i.traceContextParentHeader),i.traceContextStateHeader&&r.setRequestHeader("tracestate",i.traceContextStateHeader),o=!0),o&&(this.dt=i)}}function c(e,r){var n=this.metrics,i=e[0],o=this;if(n&&i){var a=G(i);a&&(n.txSize=a)}this.startTime=(0,S.t)(),this.body=i,this.listener=function(e){try{"abort"!==e.type||o.loadCaptureCalled||(o.params.aborted=!0),("load"!==e.type||o.called===o.totalCbs&&(o.onloadCalled||"function"!=typeof r.onload)&&"function"==typeof o.end)&&o.end(r)}catch(e){try{t.emit("internal-error",[e])}catch(e){}}};for(var s=0;s<de;s++)r.addEventListener(ue[s],this.listener,(0,A.jT)(!1))}function u(e,t,r){this.cbTime+=e,t?this.onloadCalled=!0:this.called+=1,this.called!==this.totalCbs||!this.onloadCalled&&"function"==typeof r.onload||"function"!=typeof this.end||this.end(r)}function d(e,t){var r=""+V(e)+!!t;this.xhrGuids&&!this.xhrGuids[r]&&(this.xhrGuids[r]=!0,this.totalCbs+=1)}function l(e,t){var r=""+V(e)+!!t;this.xhrGuids&&this.xhrGuids[r]&&(delete this.xhrGuids[r],this.totalCbs-=1)}function f(){this.endTime=(0,S.t)()}function h(e,r){r instanceof fe&&"load"===e[0]&&t.emit("xhr-load-added",[e[1],e[2]],r)}function g(e,r){r instanceof fe&&"load"===e[0]&&t.emit("xhr-load-removed",[e[1],e[2]],r)}function m(e,t,r){t instanceof fe&&("onload"===r&&(this.onload=!0),("load"===(e[0]&&e[0].type)||this.onload)&&(this.xhrCbStart=(0,S.t)()))}function v(e,r){this.xhrCbStart&&t.emit("xhr-cb-time",[(0,S.t)()-this.xhrCbStart,this.onload,r],r)}function b(e){var t,r=e[1]||{};if("string"==typeof e[0]?0===(t=e[0]).length&&p.RI&&(t=""+p.gm.location.href):e[0]&&e[0].url?t=e[0].url:p.gm?.URL&&e[0]&&e[0]instanceof URL?t=e[0].href:"function"==typeof e[0].toString&&(t=e[0].toString()),"string"==typeof t&&0!==t.length){t&&(this.parsedOrigin=(0,ie.D)(t),this.sameOrigin=this.parsedOrigin.sameOrigin);var i=n.generateTracePayload(this.parsedOrigin);if(i&&(i.newrelicHeader||i.traceContextParentHeader))if(e[0]&&e[0].headers)s(e[0].headers,i)&&(this.dt=i);else{var o={};for(var a in r)o[a]=r[a];o.headers=new Headers(r.headers||{}),s(o.headers,i)&&(this.dt=i),e.length>1?e[1]=o:e.push(o)}}function s(e,t){var r=!1;return t.newrelicHeader&&(e.set("newrelic",t.newrelicHeader),r=!0),t.traceContextParentHeader&&(e.set("traceparent",t.traceContextParentHeader),t.traceContextStateHeader&&e.set("tracestate",t.traceContextStateHeader),r=!0),r}}function y(e,t){this.params={},this.metrics={},this.startTime=(0,S.t)(),this.dt=t,e.length>=1&&(this.target=e[0]),e.length>=2&&(this.opts=e[1]);var r,n=this.opts||{},i=this.target;"string"==typeof i?r=i:"object"==typeof i&&i instanceof le?r=i.url:p.gm?.URL&&"object"==typeof i&&i instanceof URL&&(r=i.href),pe(this,r);var o=(""+(i&&i instanceof le&&i.method||n.method||"GET")).toUpperCase();this.params.method=o,this.body=n.body,this.txSize=G(n.body)||0}function w(e,t){if(this.endTime=(0,S.t)(),this.params||(this.params={}),(0,ce.iW)(this.params))return;let n;this.params.status=t?t.status:0,"string"==typeof this.rxSize&&this.rxSize.length>0&&(n=+this.rxSize);const i={txSize:this.txSize,rxSize:n,duration:(0,S.t)()-this.startTime};r("xhr",[this.params,i,this.startTime,this.endTime,"fetch"],this,a.K7.ajax)}function R(e){const t=this.params,n=this.metrics;if(!this.ended){this.ended=!0;for(let t=0;t<de;t++)e.removeEventListener(ue[t],this.listener,!1);t.aborted||(0,ce.iW)(t)||(n.duration=(0,S.t)()-this.startTime,this.loadCazptureCalled||4!==e.readyState?null==t.status&&(t.status=0):T(this,e),n.cbTime=this.cbTime,r("xhr",[t,n,this.startTime,this.endTime,"xhr"],this,a.K7.ajax))}}function T(e,r){e.params.status=r.status;var n=function(e,t){var r=e.responseType;return"json"===r&&null!==t?t:"arraybuffer"===r||"blob"===r||"json"===r?G(e.response):"text"===r||""===r||void 0===r?G(e.responseText):void 0}(r,e.lastSize);if(n&&(e.metrics.rxSize=n),e.sameOrigin){var i=r.getResponseHeader("X-NewRelic-App-Data");i&&((0,x.p)(O.rs,["Ajax/CrossApplicationTracing/Header/Seen"],void 0,a.K7.metrics,t),e.params.cat=i.split(", ").pop())}e.loadCaptureCalled=!0}t.on("new-xhr",i),t.on("open-xhr-start",o),t.on("open-xhr-end",s),t.on("send-xhr-start",c),t.on("xhr-cb-time",u),t.on("xhr-load-added",d),t.on("xhr-load-removed",l),t.on("xhr-resolved",f),t.on("addEventListener-end",h),t.on("removeEventListener-end",g),t.on("fn-end",v),t.on("fetch-before-start",b),t.on("fetch-start",y),t.on("fn-start",m),t.on("fetch-done",w)}(e,this.ee,this.handler,this.dt),this.importAggregator(e)}}function pe(e,t){var r=(0,ie.D)(t),n=e.params||e;n.hostname=r.hostname,n.port=r.port,n.protocol=r.protocol,n.host=r.hostname+":"+r.port,n.pathname=r.pathname,e.parsedOrigin=r,e.sameOrigin=r.sameOrigin}const ge={},me=["pushState","replaceState"];function ve(e){const t=function(e){return(e||B.ee).get("history")}(e);return!p.RI||ge[t.debugId]++||(ge[t.debugId]=1,(0,W.YM)(t).inPlace(window.history,me,"-")),t}var be=i(3738);const{He:ye,bD:we,d3:Re,Kp:xe,TZ:Te,Lc:Ae,uP:Ee,Rz:Se}=be;class Ne extends b{static featureName=Te;constructor(e,t=!0){super(e,Te,t);if(!(0,m.V)(this.agentIdentifier))return void this.deregisterDrain();const r=this.ee;let n;ve(r),this.eventsEE=(0,F.u)(r),this.eventsEE.on(Ee,(function(e,t){this.bstStart=(0,S.t)()})),this.eventsEE.on(Ae,(function(e,t){(0,x.p)("bst",[e[0],t,this.bstStart,(0,S.t)()],void 0,a.K7.sessionTrace,r)})),r.on(Se+Re,(function(e){this.time=(0,S.t)(),this.startPath=location.pathname+location.hash})),r.on(Se+xe,(function(e){(0,x.p)("bstHist",[location.pathname+location.hash,this.startPath,this.time],void 0,a.K7.sessionTrace,r)}));try{n=new PerformanceObserver((e=>{const t=e.getEntries();(0,x.p)(ye,[t],void 0,a.K7.sessionTrace,r)})),n.observe({type:we,buffered:!0})}catch(e){}this.importAggregator(e,{resourceObserver:n})}}var Oe=i(2614);class _e extends b{static featureName=t.TZ;#i;#o;constructor(e,r=!0){let n;super(e,t.TZ,r),this.replayRunning=!1,this.#o=e;try{n=JSON.parse(localStorage.getItem("".concat(Oe.H3,"_").concat(Oe.uh)))}catch(e){}(0,g.SR)(e.agentIdentifier)&&this.ee.on(t.G4.RECORD,(()=>this.#a())),this.#s(n)?(this.#i=n?.sessionReplayMode,this.#c()):this.importAggregator(e),this.ee.on("err",(e=>{this.replayRunning&&(this.errorNoticed=!0,(0,x.p)(t.G4.ERROR_DURING_REPLAY,[e],void 0,this.featureName,this.ee))})),this.ee.on(t.G4.REPLAY_RUNNING,(e=>{this.replayRunning=e}))}#s(e){return e&&(e.sessionReplayMode===Oe.g.FULL||e.sessionReplayMode===Oe.g.ERROR)||(0,g.Aw)(this.agentIdentifier)}#u=!1;async#c(e){if(!this.#u){this.#u=!0;try{const{Recorder:t}=await Promise.all([i.e(478),i.e(249)]).then(i.bind(i,8589));this.recorder??=new t({mode:this.#i,agentIdentifier:this.agentIdentifier,trigger:e,ee:this.ee}),this.recorder.startRecording(),this.abortHandler=this.recorder.stopRecording}catch(e){}this.importAggregator(this.#o,{recorder:this.recorder,errorNoticed:this.errorNoticed})}}#a(){this.featAggregate?this.featAggregate.mode!==Oe.g.FULL&&this.featAggregate.initializeRecording(Oe.g.FULL,!0):(this.#i=Oe.g.FULL,this.#c(t.Qb.API),this.recorder&&this.recorder.parent.mode!==Oe.g.FULL&&(this.recorder.parent.mode=Oe.g.FULL,this.recorder.stopRecording(),this.recorder.startRecording(),this.abortHandler=this.recorder.stopRecording))}}var Ie=i(3962);class je extends b{static featureName=Ie.TZ;constructor(e,t=!0){if(super(e,Ie.TZ,t),!p.RI||!(0,R.dV)().o.MO)return;const r=ve(this.ee);Ie.tC.forEach((e=>{(0,A.sp)(e,(e=>{a(e)}),!0)}));const n=()=>(0,x.p)("newURL",[(0,S.t)(),""+window.location],void 0,this.featureName,this.ee);r.on("pushState-end",n),r.on("replaceState-end",n);try{this.removeOnAbort=new AbortController}catch(e){}(0,A.sp)("popstate",(e=>(0,x.p)("newURL",[e.timeStamp,""+window.location],void 0,this.featureName,this.ee)),!0,this.removeOnAbort?.signal);let i=!1;const o=new((0,R.dV)().o.MO)(((e,t)=>{i||(i=!0,requestAnimationFrame((()=>{(0,x.p)("newDom",[(0,S.t)()],void 0,this.featureName,this.ee),i=!1})))})),a=(0,v.s)((e=>{(0,x.p)("newUIEvent",[e],void 0,this.featureName,this.ee),o.observe(document.body,{attributes:!0,childList:!0,subtree:!0,characterData:!0})}),100,{leading:!0});this.abortHandler=function(){this.removeOnAbort?.abort(),o.disconnect(),this.abortHandler=void 0},this.importAggregator(e,{domObserver:o})}}var Pe=i(7378);const Ce={},ke=["appendChild","insertBefore","replaceChild"];function Le(e){const t=function(e){return(e||B.ee).get("jsonp")}(e);if(!p.RI||Ce[t.debugId])return t;Ce[t.debugId]=!0;var r=(0,W.YM)(t),n=/[?&](?:callback|cb)=([^&#]+)/,i=/(.*)\.([^.]+)/,o=/^(\w+)(\.|$)(.*)$/;function a(e,t){if(!e)return t;const r=e.match(o),n=r[1];return a(r[3],t[n])}return r.inPlace(Node.prototype,ke,"dom-"),t.on("dom-start",(function(e){!function(e){if(!e||"string"!=typeof e.nodeName||"script"!==e.nodeName.toLowerCase())return;if("function"!=typeof e.addEventListener)return;var o=(s=e.src,c=s.match(n),c?c[1]:null);var s,c;if(!o)return;var u=function(e){var t=e.match(i);if(t&&t.length>=3)return{key:t[2],parent:a(t[1],window)};return{key:e,parent:window}}(o);if("function"!=typeof u.parent[u.key])return;var d={};function l(){t.emit("jsonp-end",[],d),e.removeEventListener("load",l,(0,A.jT)(!1)),e.removeEventListener("error",f,(0,A.jT)(!1))}function f(){t.emit("jsonp-error",[],d),t.emit("jsonp-end",[],d),e.removeEventListener("load",l,(0,A.jT)(!1)),e.removeEventListener("error",f,(0,A.jT)(!1))}r.inPlace(u.parent,[u.key],"cb-",d),e.addEventListener("load",l,(0,A.jT)(!1)),e.addEventListener("error",f,(0,A.jT)(!1)),t.emit("new-jsonp",[e.src],d)}(e[0])})),t}const He={};function De(e){const t=function(e){return(e||B.ee).get("promise")}(e);if(He[t.debugId])return t;He[t.debugId]=!0;var r=t.context,n=(0,W.YM)(t),i=p.gm.Promise;return i&&function(){function e(r){var o=t.context(),a=n(r,"executor-",o,null,!1);const s=Reflect.construct(i,[a],e);return t.context(s).getCtx=function(){return o},s}p.gm.Promise=e,Object.defineProperty(e,"name",{value:"Promise"}),e.toString=function(){return i.toString()},Object.setPrototypeOf(e,i),["all","race"].forEach((function(r){const n=i[r];e[r]=function(e){let i=!1;[...e||[]].forEach((e=>{this.resolve(e).then(a("all"===r),a(!1))}));const o=n.apply(this,arguments);return o;function a(e){return function(){t.emit("propagate",[null,!i],o,!1,!1),i=i||!e}}}})),["resolve","reject"].forEach((function(r){const n=i[r];e[r]=function(e){const r=n.apply(this,arguments);return e!==r&&t.emit("propagate",[e,!0],r,!1,!1),r}})),e.prototype=i.prototype;const o=i.prototype.then;i.prototype.then=function(...e){var i=this,a=r(i);a.promise=i,e[0]=n(e[0],"cb-",a,null,!1),e[1]=n(e[1],"cb-",a,null,!1);const s=o.apply(this,e);return a.nextPromise=s,t.emit("propagate",[i,!0],s,!1,!1),s},i.prototype.then[W.Jt]=o,t.on("executor-start",(function(e){e[0]=n(e[0],"resolve-",this,null,!1),e[1]=n(e[1],"resolve-",this,null,!1)})),t.on("executor-err",(function(e,t,r){e[1](r)})),t.on("cb-end",(function(e,r,n){t.emit("propagate",[n,!0],this.nextPromise,!1,!1)})),t.on("propagate",(function(e,r,n){this.getCtx&&!r||(this.getCtx=function(){if(e instanceof Promise)var r=t.context(e);return r&&r.getCtx?r.getCtx():this})}))}(),t}const Me={},Ke="setTimeout",Ue="setInterval",Ve="clearTimeout",Ge="-start",Fe=[Ke,"setImmediate",Ue,Ve,"clearImmediate"];function Be(e){const t=function(e){return(e||B.ee).get("timer")}(e);if(Me[t.debugId]++)return t;Me[t.debugId]=1;var r=(0,W.YM)(t);return r.inPlace(p.gm,Fe.slice(0,2),Ke+"-"),r.inPlace(p.gm,Fe.slice(2,3),Ue+"-"),r.inPlace(p.gm,Fe.slice(3),Ve+"-"),t.on(Ue+Ge,(function(e,t,n){e[0]=r(e[0],"fn-",null,n)})),t.on(Ke+Ge,(function(e,t,n){this.method=n,this.timerDuration=isNaN(e[1])?0:+e[1],e[0]=r(e[0],"fn-",this,n)})),t}const We={};function ze(e){const t=function(e){return(e||B.ee).get("mutation")}(e);if(!p.RI||We[t.debugId])return t;We[t.debugId]=!0;var r=(0,W.YM)(t),n=p.gm.MutationObserver;return n&&(window.MutationObserver=function(e){return this instanceof n?new n(r(e,"fn-")):n.apply(this,arguments)},MutationObserver.prototype=n.prototype),t}const{TZ:qe,d3:Ze,Kp:Ye,$p:Xe,wW:Je,e5:Qe,tH:$e,uP:et,rw:tt,Lc:rt}=Pe;class nt extends b{static featureName=qe;constructor(e,t=!0){if(super(e,qe,t),!p.RI)return;try{this.removeOnAbort=new AbortController}catch(e){}let r,n=0;const i=this.ee.get("tracer"),o=Le(this.ee),a=De(this.ee),s=Be(this.ee),c=Z(this.ee),u=this.ee.get("events"),d=ne(this.ee),l=ve(this.ee),f=ze(this.ee);function h(e,t){l.emit("newURL",[""+window.location,t])}function g(){n++,r=window.location.hash,this[et]=(0,S.t)()}function m(){n--,window.location.hash!==r&&h(0,!0);var e=(0,S.t)();this[Qe]=~~this[Qe]+e-this[et],this[rt]=e}function v(e,t){e.on(t,(function(){this[t]=(0,S.t)()}))}this.ee.on(et,g),a.on(tt,g),o.on(tt,g),this.ee.on(rt,m),a.on(Je,m),o.on(Je,m),this.ee.on("fn-err",((...t)=>{t[2]?.__newrelic?.[e.agentIdentifier]||(0,x.p)("function-err",[...t],void 0,this.featureName,this.ee)})),this.ee.buffer([et,rt,"xhr-resolved"],this.featureName),u.buffer([et],this.featureName),s.buffer(["setTimeout"+Ye,"clearTimeout"+Ze,et],this.featureName),c.buffer([et,"new-xhr","send-xhr"+Ze],this.featureName),d.buffer([$e+Ze,$e+"-done",$e+Xe+Ze,$e+Xe+Ye],this.featureName),l.buffer(["newURL"],this.featureName),f.buffer([et],this.featureName),a.buffer(["propagate",tt,Je,"executor-err","resolve"+Ze],this.featureName),i.buffer([et,"no-"+et],this.featureName),o.buffer(["new-jsonp","cb-start","jsonp-error","jsonp-end"],this.featureName),v(d,$e+Ze),v(d,$e+"-done"),v(o,"new-jsonp"),v(o,"jsonp-end"),v(o,"cb-start"),l.on("pushState-end",h),l.on("replaceState-end",h),window.addEventListener("hashchange",h,(0,A.jT)(!0,this.removeOnAbort?.signal)),window.addEventListener("load",h,(0,A.jT)(!0,this.removeOnAbort?.signal)),window.addEventListener("popstate",(function(){h(0,n>1)}),(0,A.jT)(!0,this.removeOnAbort?.signal)),this.abortHandler=this.#n,this.importAggregator(e)}#n(){this.removeOnAbort?.abort(),this.abortHandler=void 0}}var it=i(3333);class ot extends b{static featureName=it.TZ;constructor(e,t=!0){super(e,it.TZ,t);const r=[e.init.page_action.enabled,e.init.performance.capture_marks,e.init.performance.capture_measures,e.init.user_actions.enabled];p.RI&&e.init.user_actions.enabled&&(it.Zp.forEach((e=>(0,A.sp)(e,(e=>(0,x.p)("ua",[e],void 0,this.featureName,this.ee)),!0))),it.qN.forEach((e=>(0,A.sp)(e,(e=>(0,x.p)("ua",[e],void 0,this.featureName,this.ee)))))),r.some((e=>e))?this.importAggregator(e):this.deregisterDrain()}}var at=i(993),st=i(3785);class ct extends b{static featureName=at.TZ;constructor(e,t=!0){super(e,at.TZ,t);const r=this.ee;this.ee.on("wrap-logger-end",(function([e]){const{level:t,customAttributes:n}=this;(0,st.R)(r,e,n,t)})),this.importAggregator(e)}}new class extends o{constructor(t,r){super(r),p.gm?(this.features={},(0,R.bQ)(this.agentIdentifier,this),this.desiredFeatures=new Set(t.features||[]),this.desiredFeatures.add(w),this.runSoftNavOverSpa=[...this.desiredFeatures].some((e=>e.featureName===a.K7.softNav)),(0,d.j)(this,t,t.loaderType||"agent"),this.run()):(0,e.R)(21)}get config(){return{info:this.info,init:this.init,loader_config:this.loader_config,runtime:this.runtime}}run(){try{const t=u(this.agentIdentifier),r=[...this.desiredFeatures];r.sort(((e,t)=>a.P3[e.featureName]-a.P3[t.featureName])),r.forEach((r=>{if(!t[r.featureName]&&r.featureName!==a.K7.pageViewEvent)return;if(this.runSoftNavOverSpa&&r.featureName===a.K7.spa)return;if(!this.runSoftNavOverSpa&&r.featureName===a.K7.softNav)return;const n=function(e){switch(e){case a.K7.ajax:return[a.K7.jserrors];case a.K7.sessionTrace:return[a.K7.ajax,a.K7.pageViewEvent];case a.K7.sessionReplay:return[a.K7.sessionTrace];case a.K7.pageViewTiming:return[a.K7.pageViewEvent];default:return[]}}(r.featureName).filter((e=>!(e in this.features)));n.length>0&&(0,e.R)(36,{targetFeature:r.featureName,missingDependencies:n}),this.features[r.featureName]=new r(this)}))}catch(t){(0,e.R)(22,t);for(const e in this.features)this.features[e].abortHandler?.();const r=(0,R.Zm)();delete r.initializedAgents[this.agentIdentifier]?.api,delete r.initializedAgents[this.agentIdentifier]?.features,delete this.sharedAggregator;return r.ee.get(this.agentIdentifier).abort(),!1}}}({features:[he,w,N,Ne,_e,_,D,ot,ct,je,nt],loaderType:"spa"})})()})(); </script><link rel="preconnect" href="https://cdn.cookielaw.org"/><link rel="preconnect" href="https://fonts.gstatic.com" crossorigin="anonymous"/><link rel="preconnect" href="https://fonts.googleapis.com" crossorigin="anonymous"/><link rel="preconnect" href="https://www.googletagmanager.com"/><link rel="stylesheet" href="/build/_assets/styles.generated-IVZR5GKI.css"/><link rel="stylesheet" href="/build/_assets/brand.generated-EWTQS5FG.css"/><link rel="stylesheet" href="https://fonts.googleapis.com/css2?family=Inter:wght@100;200;300;400;500;600;700;800;900&display=swap"/><link rel="stylesheet" href="https://fonts.googleapis.com/css2?family=Inter:wght@100;200;300;400;500;600;700;800;900&display=swap"/><link rel="icon" type="image/x-icon" href="/build/_assets/darkreading-DSJITCUD.ico"/><noscript><style type="text/css">.gptHideContent { opacity: 1!important; }</style></noscript><script src="https://loader.bridged.media/bridged-agent.js"></script><script type="text/javascript" src="https://cdn.cookielaw.org/consent/4b083961-e2ac-4755-8801-f7c83a5fb187/OtAutoBlock.js"></script><script type="text/javascript" src="https://cdn.cookielaw.org/scripttemplates/otSDKStub.js" data-domain-script="4b083961-e2ac-4755-8801-f7c83a5fb187"></script><script> function OptanonWrapper() { const isClosed = OneTrust.IsAlertBoxClosed() const allowPersonalised = /,C0004,/.test(OnetrustActiveGroups) console.log('cookieBannerConsentChanged emit', isClosed, allowPersonalised) const event = new CustomEvent('cookieBannerConsentChanged', { detail: { allowPersonalised, isClosed } }) window.dispatchEvent(event) }</script><script async="" src="//static.adsafeprotected.com/iasPET.1.js"></script><script async="" src="https://securepubads.g.doubleclick.net/tag/js/gpt.js" type="text/javascript"></script></head><body class="brand-darkreading gptHideContent"><noscript></noscript><div id="bigsky_v"></div><div id="fb-root"></div><div id="welcome_v"></div><main data-theme="theme1" class="Provider"><div data-testid="ad_blocker" class="ads ad adsbox doubleclick ad-placement carbon-ads" style="height:1px;width:1px;position:absolute;left:-999em;top:-999em"></div><div><div data-template="layout" class="Layout"><nav data-module="navigation" aria-label="navigation" class="Navigation"><div data-testid="header" class="Navigation-HeaderWrapper"><div class="FullScreenBackground Navigation-HeaderBackground"></div><div class="Navigation-Header"><div class="InformaBar" data-component="informa-bar"><div class="InformaBar-ContentSection InformaBar-ContentSection_hidden" data-testid="informa-bar-content-section"><div class="InformaBar-LeftSection" data-testid="informa-bar-left-section"><div>Dark Reading is part of the Informa Tech Division of Informa PLC</div><div><a class="InformaBar-SubMenuItem" data-testid="informa-bar-sub-menu-item" href="https://www.informa.com/" title="Informa PLC" target="_blank" rel="noreferrer">Informa PLC</a><span class="InformaBar-Delimiter">|</span><a class="InformaBar-SubMenuItem" data-testid="informa-bar-sub-menu-item" href="https://www.informa.com/about-us/" title="ABOUT US" target="_blank" rel="noreferrer">ABOUT US</a><span class="InformaBar-Delimiter">|</span><a class="InformaBar-SubMenuItem" data-testid="informa-bar-sub-menu-item" href="https://www.informa.com/investors/" title="INVESTOR RELATIONS" target="_blank" rel="noreferrer">INVESTOR RELATIONS</a><span class="InformaBar-Delimiter">|</span><a class="InformaBar-SubMenuItem" data-testid="informa-bar-sub-menu-item" href="https://www.informa.com/talent/" title="TALENT" target="_blank" rel="noreferrer">TALENT</a></div></div><div class="InformaBar-RightSection" data-testid="informa-bar-right-section">This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales and Scotlan. Number 8860726.</div></div><div class="InformaBar-LogoSection" data-testid="informa-bar-logo-section" role="button" tabindex="0" aria-label="Open Informa bar"><div class="InformaBar-LogoWrapper"><img class="InformaBar-Logo" src="/build/_assets/informaLogoWhite-RZAE7EJI.png" alt="Logo Informa"/></div><span class="InformaBar-IconWrapper InformaBar-IconWrapper_closed"><svg viewBox="0 0 320 512" aria-hidden="true" focusable="false" role="img" xml:space="preserve" xmlns="http://www.w3.org/2000/svg" xmlns:xlink="http://www.w3.org/1999/xlink" fill="currentColor" height="100%"><path fill="#ffffff" d="M288.662 352H31.338c-17.818 0-26.741-21.543-14.142-34.142l128.662-128.662c7.81-7.81 20.474-7.81 28.284 0l128.662 128.662c12.6 12.599 3.676 34.142-14.142 34.142z"></path></svg></span></div></div></div></div><div class="Navigation-SecondaryMenuWrapper"><div class="FullScreenBackground Navigation-SecondaryMenuBackground"></div><div class="Navigation-SecondaryMenu"><nav data-testid="SecondaryMenu" class="SecondaryMenu"><a class="SecondaryMenu-Link" data-discover="true" href="/program/black-hat">Black Hat News</a><a class="SecondaryMenu-Link" data-discover="true" href="/program/omdia-cybersecurity">Omdia Cybersecurity</a><a class="SecondaryMenu-Link" target="_blank" href="https://reg.darkreading.com/media-kit?kcode=drsitehd">Advertise</a></nav></div></div><div style="padding-top:0px"></div><div id="navigation-header" class="Navigation-NavBase"><div data-testid="navBase" class="NavBase"><div class="NavBase-Content"><div class="FullScreenBackground NavBase-SecondaryMenuBackground"></div><div class="NavBase-HeaderWrapper"><div class="NavBase-IconsWrapper"><button data-testid="navBase-megaMenuButton" class="NavBase-MegaMenuButton" aria-label="Open Mega menu"><span data-component="icon" data-name="Bars" class="NavBase-MegaMenuIcon NavBase-MegaMenuIcon_iconVariant_small NavBase-MegaMenuIcon_iconType_bars" style="mask-image:url(/build/_assets/Bars-F4G2A5NO.svg);-webkit-mask-image:url(/build/_assets/Bars-F4G2A5NO.svg);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain"></span></button><button data-testid="SearchButtonDesktop" class="NavBase-SearchButtonDesktop" aria-label="Open Search"><span data-component="icon" data-name="Search" class="NavBase-SearchIcon NavBase-SearchIcon_iconVariant_large NavBase-SearchIcon_iconType_search" style="mask-image:url(/build/_assets/Search-T2ANYVG5.svg);-webkit-mask-image:url(/build/_assets/Search-T2ANYVG5.svg);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain"></span></button><button data-testid="SearchButtonTablet" class="NavBase-SearchButtonTablet" aria-label="Open Search in MegaMenu"><span data-component="icon" data-name="Search" class="NavBase-SearchIcon NavBase-SearchIcon_iconVariant_small NavBase-SearchIcon_iconType_search" style="mask-image:url(/build/_assets/Search-T2ANYVG5.svg);-webkit-mask-image:url(/build/_assets/Search-T2ANYVG5.svg);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain"></span></button></div><div class="NavBase-LogoWrapper"><button data-testid="navBase-LogoMegaMenuButton" class="NavBase-LogoMegaMenuButton" aria-label="Open Mega menu"><span data-component="icon" data-name="Bars" class="NavBase-LogoMegaMenuIcon NavBase-LogoMegaMenuIcon_iconVariant_small NavBase-LogoMegaMenuIcon_iconType_bars" style="mask-image:url(/build/_assets/Bars-F4G2A5NO.svg);-webkit-mask-image:url(/build/_assets/Bars-F4G2A5NO.svg);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain"></span></button><a class="NavBase-Logo" data-discover="true" href="/"><img data-testid="logo-image" data-component="image" class="NavBase-LogoImage" data-src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blte9ead971f13c662e/65437029846d7c040a6e588d/Logo_-_Dark_Reading.svg?width=476&auto=webp&quality=80&disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blte9ead971f13c662e/65437029846d7c040a6e588d/Logo_-_Dark_Reading.svg?width=476&auto=webp&quality=80&disable=upscale" loading="lazy" alt="Dark Reading Logo" title="Dark Reading Logo"/></a></div><div class="NavBase-RegisterWrapper"><div data-module="newsletter-signup-promo"><div class="NewsletterSignupPromo-Button NewsletterSignupPromo-Button_small NewsletterSignupButton"><a data-component="button" data-testid="headerSmallNewsletterButton" class="Button Button_size_small Button_variant_primaryFilled" href="https://dr-resources.darkreading.com/free/w_defa3135/prgm.cgi" target="_blank" rel="nofollow" data-name="subscribe-nav" data-action-type="sign-up"><span data-component="icon" data-name="Email" class="Button-Icon Button-Icon_position_left" style="mask-image:url(/build/_assets/Email-47H7P533.svg);-webkit-mask-image:url(/build/_assets/Email-47H7P533.svg);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain"></span><span class="Button-ContentWrapper">Newsletter Sign-Up</span></a></div><div class="NewsletterSignupPromo-Button NewsletterSignupPromo-Button_medium NewsletterSignupButton"><div data-component="social-share" class="SocialShare SocialShare_variant_layout Layout-SocialShare"><a target="_blank" rel="noreferrer" aria-label="Twitter" class="Layout-SocialLink" href="https://twitter.com/DarkReading"><span class="SocialShare-IconWrapper SocialShare-IconWrapper_variant_layout"><span data-component="icon" data-name="Twitter" class="SocialShare-Icon SocialShare-Icon_variant_layout SocialShare-Icon_type_twitter" style="mask-image:url(/build/_assets/Twitter-WD5AOEQ7.svg);-webkit-mask-image:url(/build/_assets/Twitter-WD5AOEQ7.svg);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain"></span></span></a><a target="_blank" rel="noreferrer" aria-label="Linkedin" class="Layout-SocialLink" href="https://www.linkedin.com/company/dark-reading/"><span class="SocialShare-IconWrapper SocialShare-IconWrapper_variant_layout"><span data-component="icon" data-name="Linkedin" class="SocialShare-Icon SocialShare-Icon_variant_layout SocialShare-Icon_type_linkedin" style="mask-image:url(/build/_assets/Linkedin-VQUF3EEQ.svg);-webkit-mask-image:url(/build/_assets/Linkedin-VQUF3EEQ.svg);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain"></span></span></a><a target="_blank" rel="noreferrer" aria-label="Facebook" class="Layout-SocialLink" href="https://www.facebook.com/darkreadingcom/"><span class="SocialShare-IconWrapper SocialShare-IconWrapper_variant_layout"><span data-component="icon" data-name="Facebook" class="SocialShare-Icon SocialShare-Icon_variant_layout SocialShare-Icon_type_facebook" style="mask-image:url(/build/_assets/Facebook-CJB5G2HY.svg);-webkit-mask-image:url(/build/_assets/Facebook-CJB5G2HY.svg);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain"></span></span></a><a target="_blank" rel="noreferrer" aria-label="Youtube" class="Layout-SocialLink" href="https://www.youtube.com/@DarkReadingOfficialYT"><span class="SocialShare-IconWrapper SocialShare-IconWrapper_variant_layout"><span data-component="icon" data-name="Youtube" class="SocialShare-Icon SocialShare-Icon_variant_layout SocialShare-Icon_type_youtube" style="mask-image:url(/build/_assets/Youtube-S4PSC4UA.svg);-webkit-mask-image:url(/build/_assets/Youtube-S4PSC4UA.svg);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain"></span></span></a><a target="_blank" rel="noreferrer" aria-label="RSS" class="Layout-SocialLink" href="https://www.darkreading.com/rss.xml"><span class="SocialShare-IconWrapper SocialShare-IconWrapper_variant_layout"><span data-component="icon" data-name="RSS" class="SocialShare-Icon SocialShare-Icon_variant_layout SocialShare-Icon_type_rss" style="mask-image:url(/build/_assets/RSS-3XFHIVCK.svg);-webkit-mask-image:url(/build/_assets/RSS-3XFHIVCK.svg);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain"></span></span></a><a target="_blank" rel="noreferrer" aria-label="GoogleNews" class="Layout-SocialLink" href="https://news.google.com/publications/CAAqBwgKMKmknwswtq63Aw?ceid=US:en&oc=3&hl=en-US&gl=US"><span class="SocialShare-IconWrapper SocialShare-IconWrapper_variant_layout"><span data-component="icon" data-name="GoogleNews" class="SocialShare-Icon SocialShare-Icon_variant_layout SocialShare-Icon_type_googleNews" style="mask-image:url(/build/_assets/GoogleNews-6O72APW7.svg);-webkit-mask-image:url(/build/_assets/GoogleNews-6O72APW7.svg);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain"></span></span></a></div><a data-component="button" data-testid="headerMediumNewsletterButton" class="Button Button_size_medium Button_variant_primaryFilled" href="https://dr-resources.darkreading.com/free/w_defa3135/prgm.cgi" target="_blank" rel="nofollow" data-name="subscribe-nav" data-action-type="sign-up"><span data-component="icon" data-name="Email" class="Button-Icon Button-Icon_position_left" style="mask-image:url(/build/_assets/Email-47H7P533.svg);-webkit-mask-image:url(/build/_assets/Email-47H7P533.svg);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain"></span><span class="Button-ContentWrapper">Newsletter Sign-Up</span></a></div></div><button data-testid="RegisterSearchButton" class="NavBase-RegisterSearchButton" aria-label="Open Search in MegaMenu"><span data-component="icon" data-name="Search" class="NavBase-SearchIcon NavBase-SearchIcon_iconVariant_large NavBase-SearchIcon_iconType_search" style="mask-image:url(/build/_assets/Search-T2ANYVG5.svg);-webkit-mask-image:url(/build/_assets/Search-T2ANYVG5.svg);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain"></span></button></div></div><div class="NavBase-SearchWrapper"><div class="FullScreenBackground NavBase-SearchBackground"></div><button data-testid="SearchCloseButton" class="NavBase-SearchCloseButton" aria-label="Close Search"><span data-component="icon" data-name="Close" class="NavBase-SearchIcon NavBase-SearchIcon_iconVariant_medium NavBase-SearchIcon_iconType_close" style="mask-image:url(/build/_assets/Close-KKOYAUD6.svg);-webkit-mask-image:url(/build/_assets/Close-KKOYAUD6.svg);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain"></span></button></div></div></div><div class="Navigation-MainMenu"><div data-testid="mainMenu"><div class="FullScreenBackground MainMenu-BackgroundSubmenu"></div><div class="FullScreenBackground MainMenu-BackgroundMenuItem"></div><div class="MainMenu-Content"><div class="MainMenu-MegaMenuButtonWrapper"><button data-testid="mainMenu-MegaMenuButton" aria-label="Open MegaMenu" class="MainMenu-MegaMenuButton"><span data-component="icon" data-name="Bars" class="MainMenu-MegaMenuIcon" style="mask-image:url(/build/_assets/Bars-F4G2A5NO.svg);-webkit-mask-image:url(/build/_assets/Bars-F4G2A5NO.svg);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain"></span></button></div><div class="MainMenu-ItemsWrapper" role="menu"><div class="MainMenu-MenuItemWrapper"><div class="MainMenu-MenuItem" role="menuitem" tabindex="0" data-testid="openSubMenu" aria-label="Open Sub menu of Cybersecurity Topics"><span class="MainMenu-MainTitle">Cybersecurity Topics<span data-component="icon" data-name="ChevronDown" class="MainMenu-SubMenuIcon" style="mask-image:url(/build/_assets/ChevronDown-PF4EH6J6.svg);-webkit-mask-image:url(/build/_assets/ChevronDown-PF4EH6J6.svg);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain"></span></span></div><div class="MainMenu-SubMenuWrapper"><div class="MainMenu-SubMenuContent"><div data-module="sub-menu" class="SubMenu MainMenu-SubMenu" role="presentation"><div class="SubMenu-Container"><div class="SubMenu-RelatedTopicsWrapper"><h4 class="SubMenu-RelatedTopics">Related Topics</h4><div class="SubMenu-CasualLinkWrapper" data-testid="related"><ul class="SubMenu-CasualLinkList"><li class="SubMenu-CasualLinkItem"><a class="SubMenu-ItemLink" data-testid="sub-menu-item-link" data-discover="true" href="/application-security">Application Security</a></li><li class="SubMenu-CasualLinkItem"><a class="SubMenu-ItemLink" data-testid="sub-menu-item-link" data-discover="true" href="/cybersecurity-operations/cybersecurity-careers">Cybersecurity Careers</a></li><li class="SubMenu-CasualLinkItem"><a class="SubMenu-ItemLink" data-testid="sub-menu-item-link" data-discover="true" href="/cloud-security">Cloud Security</a></li><li class="SubMenu-CasualLinkItem"><a class="SubMenu-ItemLink" data-testid="sub-menu-item-link" data-discover="true" href="/cyber-risk">Cyber Risk</a></li><li class="SubMenu-CasualLinkItem"><a class="SubMenu-ItemLink" data-testid="sub-menu-item-link" data-discover="true" href="/cyberattacks-data-breaches">Cyberattacks & Data Breaches</a></li><li class="SubMenu-CasualLinkItem"><a class="SubMenu-ItemLink" data-testid="sub-menu-item-link" data-discover="true" href="/cybersecurity-analytics">Cybersecurity Analytics</a></li><li class="SubMenu-CasualLinkItem"><a class="SubMenu-ItemLink" data-testid="sub-menu-item-link" data-discover="true" href="/cybersecurity-operations">Cybersecurity Operations</a></li><li class="SubMenu-CasualLinkItem"><a class="SubMenu-ItemLink" data-testid="sub-menu-item-link" data-discover="true" href="/cyber-risk/data-privacy">Data Privacy</a></li><li class="SubMenu-CasualLinkItem"><a class="SubMenu-ItemLink" data-testid="sub-menu-item-link" data-discover="true" href="/endpoint-security">Endpoint Security</a></li><li class="SubMenu-CasualLinkItem"><a class="SubMenu-ItemLink" data-testid="sub-menu-item-link" data-discover="true" href="/ics-ot-security">ICS/OT Security</a></li></ul><ul class="SubMenu-CasualLinkList"><li class="SubMenu-CasualLinkItem"><a class="SubMenu-ItemLink" data-testid="sub-menu-item-link" data-discover="true" href="/cybersecurity-operations/identity-access-management-security">Identity & Access Mgmt Security</a></li><li class="SubMenu-CasualLinkItem"><a class="SubMenu-ItemLink" data-testid="sub-menu-item-link" data-discover="true" href="/vulnerabilities-threats/insider-threats">Insider Threats</a></li><li class="SubMenu-CasualLinkItem"><a class="SubMenu-ItemLink" data-testid="sub-menu-item-link" data-discover="true" href="/ics-ot-security/iot">IoT</a></li><li class="SubMenu-CasualLinkItem"><a class="SubMenu-ItemLink" data-testid="sub-menu-item-link" data-discover="true" href="/endpoint-security/mobile-security">Mobile Security</a></li><li class="SubMenu-CasualLinkItem"><a class="SubMenu-ItemLink" data-testid="sub-menu-item-link" data-discover="true" href="/cybersecurity-operations/perimeter">Perimeter</a></li><li class="SubMenu-CasualLinkItem"><a class="SubMenu-ItemLink" data-testid="sub-menu-item-link" data-discover="true" href="/cybersecurity-operations/physical-security">Physical Security</a></li><li class="SubMenu-CasualLinkItem"><a class="SubMenu-ItemLink" data-testid="sub-menu-item-link" data-discover="true" href="/endpoint-security/remote-workforce">Remote Workforce</a></li><li class="SubMenu-CasualLinkItem"><a class="SubMenu-ItemLink" data-testid="sub-menu-item-link" data-discover="true" href="/threat-intelligence">Threat Intelligence</a></li><li class="SubMenu-CasualLinkItem"><a class="SubMenu-ItemLink" data-testid="sub-menu-item-link" data-discover="true" href="/vulnerabilities-threats">Vulnerabilities & Threats</a></li></ul></div></div><div class="SubMenu-RecentContentWrapper" data-testid="recent"></div></div></div></div></div></div><div class="MainMenu-MenuItemWrapper"><div class="MainMenu-MenuItem" role="menuitem" tabindex="0" data-testid="openSubMenu" aria-label="Open Sub menu of World "><span class="MainMenu-MainTitle">World <span data-component="icon" data-name="ChevronDown" class="MainMenu-SubMenuIcon" style="mask-image:url(/build/_assets/ChevronDown-PF4EH6J6.svg);-webkit-mask-image:url(/build/_assets/ChevronDown-PF4EH6J6.svg);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain"></span></span></div><div class="MainMenu-SubMenuWrapper"><div class="MainMenu-SubMenuContent"><div data-module="sub-menu" class="SubMenu MainMenu-SubMenu" role="presentation"><div class="SubMenu-Container"><div class="SubMenu-RelatedTopicsWrapper"><h4 class="SubMenu-RelatedTopics">Related Topics</h4><div class="SubMenu-CasualLinkWrapper" data-testid="related"><ul class="SubMenu-CasualLinkList"><li class="SubMenu-CasualLinkItem"><a class="SubMenu-ItemLink" data-testid="sub-menu-item-link" data-discover="true" href="/program/dr-global">DR Global</a></li><li class="SubMenu-CasualLinkItem"><a class="SubMenu-ItemLink" data-testid="sub-menu-item-link" data-discover="true" href="/keyword/middle-east-africa">Middle East & Africa</a></li></ul><ul class="SubMenu-CasualLinkList"><li class="SubMenu-CasualLinkItem"><a class="SubMenu-ItemLink" data-testid="sub-menu-item-link" data-discover="true" href="/keyword/asia-pacific">Asia Pacific</a></li></ul></div></div><div class="SubMenu-RecentContentWrapper" data-testid="recent"><div data-testid="see-more" class="SubMenu-SeeMore"><a class="SubMenu-MoreContent SubMenu-MoreContent_noRecent" data-discover="true" href="/program/dr-global"><span class="SubMenu-SeeMoreText">See All</span><span data-component="icon" data-name="ChevronRight" class="SubMenu-SeeMoreIcon" style="mask-image:url(/build/_assets/ChevronRight-NHDKEYGJ.svg);-webkit-mask-image:url(/build/_assets/ChevronRight-NHDKEYGJ.svg);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain"></span></a></div></div></div></div></div></div></div><div class="MainMenu-TitleWrapper"><a class="MainMenu-Title" data-discover="true" href="/program/the-edge">The Edge</a></div><div class="MainMenu-TitleWrapper"><a class="MainMenu-Title" data-discover="true" href="/program/dr-technology">DR Technology</a></div><div class="MainMenu-MenuItemWrapper"><div class="MainMenu-MenuItem" role="menuitem" tabindex="0" data-testid="openSubMenu" aria-label="Open Sub menu of Events"><span class="MainMenu-MainTitle">Events<span data-component="icon" data-name="ChevronDown" class="MainMenu-SubMenuIcon" style="mask-image:url(/build/_assets/ChevronDown-PF4EH6J6.svg);-webkit-mask-image:url(/build/_assets/ChevronDown-PF4EH6J6.svg);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain"></span></span></div><div class="MainMenu-SubMenuWrapper"><div class="MainMenu-SubMenuContent"><div data-module="sub-menu" class="SubMenu MainMenu-SubMenu" role="presentation"><div class="SubMenu-Container"><div class="SubMenu-RelatedTopicsWrapper"><h4 class="SubMenu-RelatedTopics">Related Topics</h4><div class="SubMenu-CasualLinkWrapper" data-testid="related"><ul class="SubMenu-CasualLinkList"><li class="SubMenu-CasualLinkItem"><a class="SubMenu-ItemLink" data-testid="sub-menu-item-link" data-discover="true" href="/events">Upcoming Events</a></li><li class="SubMenu-CasualLinkItem"><a class="SubMenu-ItemLink" data-testid="sub-menu-item-link" data-discover="true" href="/podcasts">Podcasts</a></li></ul><ul class="SubMenu-CasualLinkList"><li class="SubMenu-CasualLinkItem"><a class="SubMenu-ItemLink" data-testid="sub-menu-item-link" data-discover="true" href="/resources?types=Webinar">Webinars</a></li></ul></div></div><div class="SubMenu-RecentContentWrapper" data-testid="recent"><div data-testid="see-more" class="SubMenu-SeeMore"><a class="SubMenu-MoreContent SubMenu-MoreContent_noRecent" data-discover="true" href="/events"><span class="SubMenu-SeeMoreText">SEE ALL</span><span data-component="icon" data-name="ChevronRight" class="SubMenu-SeeMoreIcon" style="mask-image:url(/build/_assets/ChevronRight-NHDKEYGJ.svg);-webkit-mask-image:url(/build/_assets/ChevronRight-NHDKEYGJ.svg);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain"></span></a></div></div></div></div></div></div></div><div class="MainMenu-MenuItemWrapper"><div class="MainMenu-MenuItem" role="menuitem" tabindex="0" data-testid="openSubMenu" aria-label="Open Sub menu of Resources"><span class="MainMenu-MainTitle">Resources<span data-component="icon" data-name="ChevronDown" class="MainMenu-SubMenuIcon" style="mask-image:url(/build/_assets/ChevronDown-PF4EH6J6.svg);-webkit-mask-image:url(/build/_assets/ChevronDown-PF4EH6J6.svg);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain"></span></span></div><div class="MainMenu-SubMenuWrapper"><div class="MainMenu-SubMenuContent"><div data-module="sub-menu" class="SubMenu MainMenu-SubMenu" role="presentation"><div class="SubMenu-Container"><div class="SubMenu-RelatedTopicsWrapper"><h4 class="SubMenu-RelatedTopics">Related Topics</h4><div class="SubMenu-CasualLinkWrapper" data-testid="related"><ul class="SubMenu-CasualLinkList"><li class="SubMenu-CasualLinkItem"><a class="SubMenu-ItemLink" data-testid="sub-menu-item-link" data-discover="true" href="/resources">Library</a></li><li class="SubMenu-CasualLinkItem"><a class="SubMenu-ItemLink" data-testid="sub-menu-item-link" rel="nofollow" target="_blank" href="https://dr-resources.darkreading.com/free/w_defa3135/prgm.cgi">Newsletters</a></li><li class="SubMenu-CasualLinkItem"><a class="SubMenu-ItemLink" data-testid="sub-menu-item-link" data-discover="true" href="/podcasts">Podcasts</a></li><li class="SubMenu-CasualLinkItem"><a class="SubMenu-ItemLink" data-testid="sub-menu-item-link" data-discover="true" href="/resources?types=Report">Reports</a></li><li class="SubMenu-CasualLinkItem"><a class="SubMenu-ItemLink" data-testid="sub-menu-item-link" data-discover="true" href="/videos">Videos</a></li><li class="SubMenu-CasualLinkItem"><a class="SubMenu-ItemLink" data-testid="sub-menu-item-link" data-discover="true" href="/resources?types=Webinar">Webinars</a></li></ul><ul class="SubMenu-CasualLinkList"><li class="SubMenu-CasualLinkItem"><a class="SubMenu-ItemLink" data-testid="sub-menu-item-link" data-discover="true" href="/resources?types=Whitepaper">Whitepapers</a></li><li class="SubMenu-CasualLinkItem"><a class="SubMenu-ItemLink" data-testid="sub-menu-item-link" data-discover="true" href="/ "> </a></li><li class="SubMenu-CasualLinkItem"><a class="SubMenu-ItemLink" data-testid="sub-menu-item-link" data-discover="true" href="/ "> </a></li><li class="SubMenu-CasualLinkItem"><a class="SubMenu-ItemLink" data-testid="sub-menu-item-link" data-discover="true" href="/ "> </a></li><li class="SubMenu-CasualLinkItem"><a class="SubMenu-ItemLink" data-testid="sub-menu-item-link" data-discover="true" href="/ "> </a></li><li class="SubMenu-CasualLinkItem"><a class="SubMenu-ItemLink" data-testid="sub-menu-item-link" data-discover="true" href="/keyword/partner-perspectives">Partner Perspectives</a></li></ul></div></div><div class="SubMenu-RecentContentWrapper" data-testid="recent"><div data-testid="see-more" class="SubMenu-SeeMore"><a class="SubMenu-MoreContent SubMenu-MoreContent_noRecent" data-discover="true" href="/resources"><span class="SubMenu-SeeMoreText">SEE ALL</span><span data-component="icon" data-name="ChevronRight" class="SubMenu-SeeMoreIcon" style="mask-image:url(/build/_assets/ChevronRight-NHDKEYGJ.svg);-webkit-mask-image:url(/build/_assets/ChevronRight-NHDKEYGJ.svg);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain"></span></a></div></div></div></div></div></div></div></div><div class="MainMenu-SearchButtonWrapper"><button data-testid="mainMenu-SearchButton" aria-label="Open Search" class="MainMenu-SearchButton"><span data-component="icon" data-name="Search" class="MainMenu-SearchButtonIcon" style="mask-image:url(/build/_assets/Search-T2ANYVG5.svg);-webkit-mask-image:url(/build/_assets/Search-T2ANYVG5.svg);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain"></span></button></div></div><div class="MainMenu-SearchWrapper"><div class="FullScreenBackground MainMenu-SearchBackground MainMenu-SearchBackground_withSearchBar"></div><button data-testid="mainMenu-SearchCloseButton" class="MainMenu-SearchCloseButton" aria-label="Close Search"><span data-component="icon" data-name="Close" class="MainMenu-SearchCloseIcon" style="mask-image:url(/build/_assets/Close-KKOYAUD6.svg);-webkit-mask-image:url(/build/_assets/Close-KKOYAUD6.svg);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain"></span></button></div></div></div></div></nav><section class="Layout-Section"><div id="iiris-identity" data-testid="iris-identity"></div><div data-template="program-list-page" class="ProgramListPage"><div class="OneColumnLayout"><ul data-component="breadcrumb" class="Breadcrumb ProgramListPage-Breadcrumbs"><li class="Breadcrumb-ListItem"><span data-component="icon" data-name="ChevronRight" class="Breadcrumb-DividerIcon Breadcrumb-PrevIcon" style="mask-image:url(/build/_assets/ChevronRight-NHDKEYGJ.svg);-webkit-mask-image:url(/build/_assets/ChevronRight-NHDKEYGJ.svg);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain"></span><a class="Breadcrumb-GetText Breadcrumb-GetText_isNearLastItem" data-testid="breadcrumb-link" data-discover="true" href="/">Home</a><span data-component="icon" data-name="ChevronRight" class="Breadcrumb-DividerIcon Breadcrumb-NextIcon" style="mask-image:url(/build/_assets/ChevronRight-NHDKEYGJ.svg);-webkit-mask-image:url(/build/_assets/ChevronRight-NHDKEYGJ.svg);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain"></span></li><li class="Breadcrumb-ListItem"><a class="Breadcrumb-GetText Breadcrumb-GetText_isLastItem" data-testid="breadcrumb-link" data-discover="true" href="/program/dr-technology">DR Technology</a></li></ul><div class="ProgramListPage-Header"><a data-discover="true" href="/program/dr-technology"><div data-component="program-header" class="ProgramHeader ProgramHeader_mode_dark"><div data-testid="program-header-content" class="ProgramHeader-Content ProgramHeader-Content_mode_dark" style="background-color:#"><img data-component="image" class="ProgramHeader-Logo ProgramHeader-Logo_mode_dark" data-src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt4c091cd3ac9935ea/653a71456ad0f6040a6f71bd/Dark_Reading_Logo_Technology_0.png?width=700&auto=webp&quality=80&disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt4c091cd3ac9935ea/653a71456ad0f6040a6f71bd/Dark_Reading_Logo_Technology_0.png?width=700&auto=webp&quality=80&disable=upscale" loading="lazy" alt="DR Technology Logo" title="DR Technology Logo"/><div class="ProgramHeader-Description ProgramHeader-Description_mode_dark" data-testid="program-header-description"><p>News, news analysis, and commentary on the latest trends in cybersecurity technology.</p></div></div><div class=""></div></div></a></div><div class="ProgramListPage-Wrapper"><div data-module="top-featured" class="TopFeatured TopFeatured_variant_featuredWithAds"><div class="TopFeatured-FeatureItemsWrapper"><div class="TopFeatured-FeatureItem"><div class="ContentPreview" data-module="content-preview" data-variant="summary"><div class="ContentPreview-Wrapper ContentPreview-Wrapper_variant_summary"><a data-testid="thumbnail" data-discover="true" href="/endpoint-security/microsoft-releases-recall-windows-insider-preview"><div class="ContentPreview-ImageContainer"><span data-testid="content-preview-screen-reader-text" class="ContentPreview-ImageScreenReaderText">A screen showing the Windows 11 logo</span><img data-testid="content-preview-image" data-component="image" class="ContentPreview-Image" data-src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt665c5e44e3b036f8/6706f434d8c4923c6a1a9e28/mundissima-windows-11-photo-shutterstock.jpg?width=700&auto=webp&quality=80&disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt665c5e44e3b036f8/6706f434d8c4923c6a1a9e28/mundissima-windows-11-photo-shutterstock.jpg?width=700&auto=webp&quality=80&disable=upscale" loading="lazy" alt="" title=""/></div></a><a data-component="keyword" class="Keyword Keyword_variant_standard Keyword_title_endpointSecurity ContentPreview-Category" data-discover="true" href="/endpoint-security">Endpoint Security</a><div class="ArticlePreview"><div class="ArticlePreview-Body"><a class="ArticlePreview-Title ArticlePreview-Title_displayOption_default" data-testid="preview-default-title" data-discover="true" href="/endpoint-security/microsoft-releases-recall-windows-insider-preview">Microsoft Finally Releases Recall as Part of Windows Insider Preview</a><a class="ArticlePreview-Title ArticlePreview-Title_displayOption_mobile" data-testid="preview-mobile-title" data-discover="true" href="/endpoint-security/microsoft-releases-recall-windows-insider-preview">Microsoft Previews Recall in Windows Insider</a><p data-testid="preview-card-summary" class="ArticlePreview-Summary">The preview version now includes multiple security-focused additions Microsoft had promised to add, such as SecureBoot, BitLocker, and Windows Hello.</p></div><div class="ArticlePreview-Footer"><span class="ArticlePreview-Date">Nov 27, 2024</span><div data-module="card-time" class="CardTime"><span class="CardTime-SeparatorLine">|</span><div data-component="article-read-time" class="ArticleReadTime ArticleReadTime_size_small CardTime-ReadTime"><span>3 Min<!-- --> <!-- -->Read</span></div></div></div></div></div></div></div><div class="TopFeatured-Content TopFeatured-Content_latest"><div class="TopFeatured-FeatureItems"><div class="ContentPreview" data-module="content-preview" data-variant="normal"><div class="ContentPreview-Wrapper ContentPreview-Wrapper_variant_normal ContentPreview-Wrapper_articleSize_big"><a data-testid="thumbnail" data-discover="true" href="/identity-access-management-security/aws-rolls-out-updates-to-amazon-cognito"><div class="ContentPreview-ImageContainer"><span data-testid="content-preview-screen-reader-text" class="ContentPreview-ImageScreenReaderText">AWS logo against a black background.</span><img data-testid="content-preview-image" data-component="image" class="ContentPreview-Image" data-src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt6b376a9ebdf9876f/674616ddfbdcfd40f7ec33c3/AWS-GK_Images-Alamy.jpg?width=700&auto=webp&quality=80&disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt6b376a9ebdf9876f/674616ddfbdcfd40f7ec33c3/AWS-GK_Images-Alamy.jpg?width=700&auto=webp&quality=80&disable=upscale" loading="lazy" alt="" title=""/></div></a><a data-component="keyword" class="Keyword Keyword_variant_standard Keyword_title_identityAccessManagementSecurity ContentPreview-Category" data-discover="true" href="/cybersecurity-operations/identity-access-management-security">Identity & Access Management Security</a><div class="ContentCard"><div class="ContentCard-Body"><a class="ContentCard-Title ContentCard-Title_displayOption_default" data-testid="preview-default-title" data-discover="true" href="/identity-access-management-security/aws-rolls-out-updates-to-amazon-cognito">AWS Rolls Out Updates to Amazon Cognito</a><a class="ContentCard-Title ContentCard-Title_displayOption_mobile" data-testid="preview-mobile-title" data-discover="true" href="/identity-access-management-security/aws-rolls-out-updates-to-amazon-cognito">AWS Rolls Out Updates to Amazon Cognito</a><div class="Contributors Contributors_variant_slimline Contributors_cardVariant_normal" data-component="contributors"><div class="Contributors-InfoWrapper"><span class="Contributors-ByText" data-testid="by-text">by</span><a class="Contributors-ContributorName" data-testid="contributor-name" data-discover="true" href="/author/jennifer-lawinski">Jennifer Lawinski</a></div></div></div><div class="ContentCard-Footer"><span class="ContentCard-Date" data-testid="content-card-date">Nov 26, 2024</span><div data-module="card-time" class="CardTime"><div data-component="article-read-time" class="ArticleReadTime ArticleReadTime_size_small CardTime-ReadTime"><span>1 Min<!-- --> <!-- -->Read</span></div></div></div></div></div></div><div class="ContentPreview" data-module="content-preview" data-variant="normal"><div class="ContentPreview-Wrapper ContentPreview-Wrapper_variant_normal ContentPreview-Wrapper_articleSize_big"><a data-testid="thumbnail" data-discover="true" href="/cybersecurity-operations/phishing-prevention-framework-reduces-incidents-by-half"><div class="ContentPreview-ImageContainer"><span data-testid="content-preview-screen-reader-text" class="ContentPreview-ImageScreenReaderText">phishing login credentials financial services FS-ISAC</span><img data-testid="content-preview-image" data-component="image" class="ContentPreview-Image" data-src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt14e1d84c1085acdb/673e64b6791acf8e438a2080/Romolo_Tavani-phishing-credentials-shutterstock.jpg?width=700&auto=webp&quality=80&disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt14e1d84c1085acdb/673e64b6791acf8e438a2080/Romolo_Tavani-phishing-credentials-shutterstock.jpg?width=700&auto=webp&quality=80&disable=upscale" loading="lazy" alt="" title=""/></div></a><a data-component="keyword" class="Keyword Keyword_variant_standard Keyword_title_cybersecurityOperations ContentPreview-Category" data-discover="true" href="/cybersecurity-operations">Cybersecurity Operations</a><div class="ContentCard"><div class="ContentCard-Body"><a class="ContentCard-Title ContentCard-Title_displayOption_default" data-testid="preview-default-title" data-discover="true" href="/cybersecurity-operations/phishing-prevention-framework-reduces-incidents-by-half">Phishing Prevention Framework Reduces Incidents by Half</a><a class="ContentCard-Title ContentCard-Title_displayOption_mobile" data-testid="preview-mobile-title" data-discover="true" href="/cybersecurity-operations/phishing-prevention-framework-reduces-incidents-by-half">Phishing Prevention Framework Cuts Abuse Incidents in Half</a><div class="Contributors Contributors_variant_slimline Contributors_cardVariant_normal" data-component="contributors"><div class="Contributors-InfoWrapper"><span class="Contributors-ByText" data-testid="by-text">by</span><a class="Contributors-ContributorName" data-testid="contributor-name" data-discover="true" href="/author/robert-lemos">Robert Lemos, Contributing Writer</a></div></div></div><div class="ContentCard-Footer"><span class="ContentCard-Date" data-testid="content-card-date">Nov 25, 2024</span><div data-module="card-time" class="CardTime"><div data-component="article-read-time" class="ArticleReadTime ArticleReadTime_size_small CardTime-ReadTime"><span>5 Min<!-- --> <!-- -->Read</span></div></div></div></div></div></div></div></div></div><div data-testid="content-preview-ad-container" class="TopFeatured-RetangleAds TopFeatured-RetangleAds_isShowAd"></div></div><div data-module="content-spotlight" class="ContentSpotlight ContentSpotlight_mode_dark"><article class="ContentSpotlight-Article ContentSpotlight-Article_isReversed" moduleDesign="standard" title="TECH TRENDS" text-alignment="left" data-testid="content-spotlight-article"><div class="ContentSpotlight-ImageContainer" data-testid="content-spotlight-image-container"><div class="ContentSpotlight-KeywordList"><div class="ContentSpotlight-KeywordWrapper"><a data-component="keyword" class="Keyword Keyword_variant_standard Keyword_title_cybersecurityOperations ContentSpotlight-Keyword" data-discover="true" href="/cybersecurity-operations">Cybersecurity Operations</a></div></div><a data-discover="true" href="/cybersecurity-operations/survey-report-ai-ml-make-soc-better"><img data-component="image" class="ContentSpotlight-Image" data-src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/bltb488b813b54f31ab/673e529f3b1c9479ca463efc/tech-ttrendssoc-fig9.png?width=700&auto=webp&quality=80&disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/bltb488b813b54f31ab/673e529f3b1c9479ca463efc/tech-ttrendssoc-fig9.png?width=700&auto=webp&quality=80&disable=upscale" loading="lazy" alt="Figure 9. Chart of survey responses to the question "How has AI/ML improved your SOC operations?" Responses add up to more than 100 percent." title="Figure 9. Chart of survey responses to the question "How has AI/ML improved your SOC operations?" Responses add up to more than 100 percent."/></a></div><div class="ContentSpotlight-ContentContainer ContentSpotlight-ContentContainer_textAlignment_left" data-testid="content-spotlight-content-container"><p class="ContentSpotlight-ContentSummary" data-testid="content-spotlight-summary">TECHNOLOGY TRENDS</p><a data-discover="true" href="/cybersecurity-operations/survey-report-ai-ml-make-soc-better"><h2 class="ContentSpotlight-ContentHeading" data-testid="content-spotlight-heading">It's Near-Unanimous: AI, ML Make the SOC Better</h2></a><div class="ContentSpotlight-ContentBodyWrapper"><p class="ContentSpotlight-ContentBody" data-testid="content-spotlight-body">Efficiency is the name of the game for the security operations center — and 91% of cybersecurity pros say artificial intelligence and machine learning are winning that game.</p></div><div class="ContentSpotlight-ButtonContainer"><a data-testid="content-spotlight-button-link" data-discover="true" href="/cybersecurity-operations/survey-report-ai-ml-make-soc-better"><button data-component="button" data-testid="button_button" class="Button Button_size_medium Button_variant_lightOutlined" type="button"><span class="Button-ContentWrapper">Read More</span></button></a></div></div></article></div><div data-module="highlight-contents" class="HighlightContents"><div class="HighlightContents-Wrapper"><p class="HighlightContents-Title" data-testid="highlightContentsTitle">DR Technology Trends</p><div class="HighlightContents-ItemsWrapper"><div class="ContentPreview HighlightContents-Content" data-module="content-preview" data-variant="card-horizontal"><div class="HorizontalCard"><div class="HorizontalCard-ImageWrapper"><a data-discover="true" href="/cybersecurity-operations/survey-report-ai-ml-make-soc-better"><span class="HorizontalCard-ImageScreenReaderText">Figure 9. Chart of survey responses to the question "How has AI/ML improved your SOC operations?" Responses add up to more than 100 percent.</span><img data-component="image" class="HorizontalCard-Image" data-src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/bltb488b813b54f31ab/673e529f3b1c9479ca463efc/tech-ttrendssoc-fig9.png?width=300&auto=webp&quality=80&disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/bltb488b813b54f31ab/673e529f3b1c9479ca463efc/tech-ttrendssoc-fig9.png?width=300&auto=webp&quality=80&disable=upscale" loading="lazy" alt="" title=""/></a></div><div class="HorizontalCard-ContentWrapper"><div class="HorizontalCard-KeywordWrapper"><a data-component="keyword" class="Keyword Keyword_variant_alternate Keyword_title_cybersecurityOperations HorizontalCard-Keyword" data-discover="true" href="/cybersecurity-operations">Cybersecurity Operations</a></div><div class="HorizontalCard-TitleWrapper"><a class="HorizontalCard-Title" data-testid="preview-default-title" data-discover="true" href="/cybersecurity-operations/survey-report-ai-ml-make-soc-better">It's Near-Unanimous: AI, ML Make the SOC Better</a></div><div class="HorizontalCard-MobileTitleWrapper"><a class="HorizontalCard-Title" data-testid="preview-mobile-title" data-discover="true" href="/cybersecurity-operations/survey-report-ai-ml-make-soc-better">It's Near-Unanimous: AI, ML Make the SOC Better</a></div><p class="HorizontalCard-Date" data-testid="horizontalCardDate">Nov 20, 2024</p></div></div></div><div class="ContentPreview HighlightContents-Content" data-module="content-preview" data-variant="card-horizontal"><div class="HorizontalCard"><div class="HorizontalCard-ImageWrapper"><a data-discover="true" href="/ics-ot-security/incident-response-anomaly-detection-rank-high-on-planned-ics-security-spending"><span class="HorizontalCard-ImageScreenReaderText"></span><img data-component="image" class="HorizontalCard-Image" data-src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt57707039dda73ff7/673341c03f9de2939d0bb53f/tech-sans-ics-ot.jpg?width=300&auto=webp&quality=80&disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt57707039dda73ff7/673341c03f9de2939d0bb53f/tech-sans-ics-ot.jpg?width=300&auto=webp&quality=80&disable=upscale" loading="lazy" alt="" title=""/></a></div><div class="HorizontalCard-ContentWrapper"><div class="HorizontalCard-KeywordWrapper"><a data-component="keyword" class="Keyword Keyword_variant_alternate Keyword_title_icsOtSecurity HorizontalCard-Keyword" data-discover="true" href="/ics-ot-security">ICS/OT Security</a></div><div class="HorizontalCard-TitleWrapper"><a class="HorizontalCard-Title" data-testid="preview-default-title" data-discover="true" href="/ics-ot-security/incident-response-anomaly-detection-rank-high-on-planned-ics-security-spending">Incident Response, Anomaly Detection Rank High on Planned ICS Security Spending</a></div><div class="HorizontalCard-MobileTitleWrapper"><a class="HorizontalCard-Title" data-testid="preview-mobile-title" data-discover="true" href="/ics-ot-security/incident-response-anomaly-detection-rank-high-on-planned-ics-security-spending">Planned ICS Security Spending: Incident Response, Anomaly Detection</a></div><p class="HorizontalCard-Date" data-testid="horizontalCardDate">Nov 11, 2024</p></div></div></div><div class="HighlightContents-DivEmpty"></div><div class="ContentPreview HighlightContents-Content" data-module="content-preview" data-variant="card-horizontal"><div class="HorizontalCard"><div class="HorizontalCard-ImageWrapper"><a data-discover="true" href="/cybersecurity-operations/antivirus-antimalware-demand-ai-ml-tools"><span class="HorizontalCard-ImageScreenReaderText">Figure 2 asks, What AI/ML-enhanced solutions are you using in your cybersecurity operations?</span><img data-component="image" class="HorizontalCard-Image" data-src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/bltb32c902ebe95128a/67292cedd53ac5549ef0c621/fig2-techtrends110524-darkreading.png?width=300&auto=webp&quality=80&disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/bltb32c902ebe95128a/67292cedd53ac5549ef0c621/fig2-techtrends110524-darkreading.png?width=300&auto=webp&quality=80&disable=upscale" loading="lazy" alt="" title=""/></a></div><div class="HorizontalCard-ContentWrapper"><div class="HorizontalCard-KeywordWrapper"><a data-component="keyword" class="Keyword Keyword_variant_alternate Keyword_title_cybersecurityOperations HorizontalCard-Keyword" data-discover="true" href="/cybersecurity-operations">Cybersecurity Operations</a></div><div class="HorizontalCard-TitleWrapper"><a class="HorizontalCard-Title" data-testid="preview-default-title" data-discover="true" href="/cybersecurity-operations/antivirus-antimalware-demand-ai-ml-tools">Antivirus, Anti-Malware Lead Demand for AI/ML Tools</a></div><div class="HorizontalCard-MobileTitleWrapper"><a class="HorizontalCard-Title" data-testid="preview-mobile-title" data-discover="true" href="/cybersecurity-operations/antivirus-antimalware-demand-ai-ml-tools">Antivirus, Anti-Malware Lead Demand for AI/ML Tools</a></div><p class="HorizontalCard-Date" data-testid="horizontalCardDate">Nov 4, 2024</p></div></div></div><div class="HighlightContents-DivEmpty"></div></div><a data-component="button" data-testid="highlightContentsActionLink" class="Button Button_size_medium Button_variant_darkOutlined HighlightContents-ActionLink" href="/program/dr-tech-trends"><span class="Button-ContentWrapper">MORE DR TECHNOLOGY TRENDS</span></a></div><div class="HighlightContents-Wrapper"><p class="HighlightContents-Title" data-testid="highlightContentsTitle">DR Emerging Tech</p><div class="HighlightContents-ItemsWrapper"><div class="ContentPreview HighlightContents-Content" data-module="content-preview" data-variant="card-horizontal"><div class="HorizontalCard"><div class="HorizontalCard-ImageWrapper"><a data-discover="true" href="/cybersecurity-operations/untitled"><span class="HorizontalCard-ImageScreenReaderText">Scene of blue skiy with wispy clouds</span><img data-component="image" class="HorizontalCard-Image" data-src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt13bf1affe8923637/67350f06072cb331ecd50aea/cloud-connections_Zoonar_GmbH_Alamy_Stock_Photo.jpg?width=300&auto=webp&quality=80&disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt13bf1affe8923637/67350f06072cb331ecd50aea/cloud-connections_Zoonar_GmbH_Alamy_Stock_Photo.jpg?width=300&auto=webp&quality=80&disable=upscale" loading="lazy" alt="" title=""/></a></div><div class="HorizontalCard-ContentWrapper"><div class="HorizontalCard-KeywordWrapper"><a data-component="keyword" class="Keyword Keyword_variant_alternate Keyword_title_cybersecurityOperations HorizontalCard-Keyword" data-discover="true" href="/cybersecurity-operations">Cybersecurity Operations</a></div><div class="HorizontalCard-TitleWrapper"><a class="HorizontalCard-Title" data-testid="preview-default-title" data-discover="true" href="/cybersecurity-operations/untitled">DeepTempo Launches AI-Based Security App for Snowflake</a></div><div class="HorizontalCard-MobileTitleWrapper"><a class="HorizontalCard-Title" data-testid="preview-mobile-title" data-discover="true" href="/cybersecurity-operations/untitled">DeepTempo Launches AI-Based Security App for Snowflake</a></div><p class="HorizontalCard-Date" data-testid="horizontalCardDate">Nov 20, 2024</p></div></div></div><div class="ContentPreview HighlightContents-Content" data-module="content-preview" data-variant="card-horizontal"><div class="HorizontalCard"><div class="HorizontalCard-ImageWrapper"><a data-discover="true" href="/cyber-risk/riig-launches-risk-intelligence-solutions"><span class="HorizontalCard-ImageScreenReaderText">A keyboard with a red key marked RISK</span><img data-component="image" class="HorizontalCard-Image" data-src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt2e083f08865b175c/66f2c37003ecc04ce5a19432/Risk(1800)-Olekcii_Mach_Alamy.jpg?width=300&auto=webp&quality=80&disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt2e083f08865b175c/66f2c37003ecc04ce5a19432/Risk(1800)-Olekcii_Mach_Alamy.jpg?width=300&auto=webp&quality=80&disable=upscale" loading="lazy" alt="" title=""/></a></div><div class="HorizontalCard-ContentWrapper"><div class="HorizontalCard-KeywordWrapper"><a data-component="keyword" class="Keyword Keyword_variant_alternate Keyword_title_cyberRisk HorizontalCard-Keyword" data-discover="true" href="/cyber-risk">Cyber Risk</a></div><div class="HorizontalCard-TitleWrapper"><a class="HorizontalCard-Title" data-testid="preview-default-title" data-discover="true" href="/cyber-risk/riig-launches-risk-intelligence-solutions">RIIG Launches With Risk Intelligence Solutions</a></div><div class="HorizontalCard-MobileTitleWrapper"><a class="HorizontalCard-Title" data-testid="preview-mobile-title" data-discover="true" href="/cyber-risk/riig-launches-risk-intelligence-solutions">RIIG Launches With Risk Intelligence Solutions</a></div><p class="HorizontalCard-Date" data-testid="horizontalCardDate">Nov 20, 2024</p></div></div></div><div class="HighlightContents-DivEmpty"></div><div class="ContentPreview HighlightContents-Content" data-module="content-preview" data-variant="card-horizontal"><div class="HorizontalCard"><div class="HorizontalCard-ImageWrapper"><a data-discover="true" href="/ics-ot-security/frenos-takes-home-prize-2024-datatribe-challenge"><span class="HorizontalCard-ImageScreenReaderText">a brass two-handled trophy against a red curtain in the background.</span><img data-component="image" class="HorizontalCard-Image" data-src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt25563b5d5c98516a/66f475229441d64a76fe188c/trophy1800_Zoonar_GmbH_alamy.jpg?width=300&auto=webp&quality=80&disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt25563b5d5c98516a/66f475229441d64a76fe188c/trophy1800_Zoonar_GmbH_alamy.jpg?width=300&auto=webp&quality=80&disable=upscale" loading="lazy" alt="" title=""/></a></div><div class="HorizontalCard-ContentWrapper"><div class="HorizontalCard-KeywordWrapper"><a data-component="keyword" class="Keyword Keyword_variant_alternate Keyword_title_icsOtSecurity HorizontalCard-Keyword" data-discover="true" href="/ics-ot-security">ICS/OT Security</a></div><div class="HorizontalCard-TitleWrapper"><a class="HorizontalCard-Title" data-testid="preview-default-title" data-discover="true" href="/ics-ot-security/frenos-takes-home-prize-2024-datatribe-challenge">Frenos Takes Home the Prize at 2024 DataTribe Challenge</a></div><div class="HorizontalCard-MobileTitleWrapper"><a class="HorizontalCard-Title" data-testid="preview-mobile-title" data-discover="true" href="/ics-ot-security/frenos-takes-home-prize-2024-datatribe-challenge">Frenos Takes Home the Prize at 2024 DataTribe Challenge</a></div><p class="HorizontalCard-Date" data-testid="horizontalCardDate">Nov 14, 2024</p></div></div></div><div class="HighlightContents-DivEmpty"></div></div><a data-component="button" data-testid="highlightContentsActionLink" class="Button Button_size_medium Button_variant_darkOutlined HighlightContents-ActionLink" href="/program/dr-emerging-tech"><span class="Button-ContentWrapper">MORE DR EMERGING TECH</span></a></div><div class="HighlightContents-Wrapper"><p class="HighlightContents-Title" data-testid="highlightContentsTitle">DR Tech Talks</p><div class="HighlightContents-ItemsWrapper"><div class="ContentPreview HighlightContents-Content" data-module="content-preview" data-variant="card-horizontal"><div class="HorizontalCard"><div class="HorizontalCard-ImageWrapper"><a data-discover="true" href="/cloud-security/tony-jarvis-on-shifting-security-gears-as-we-move-to-the-cloud"><span class="HorizontalCard-ImageScreenReaderText"></span><img data-component="image" class="HorizontalCard-Image" data-src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/bltc94608acf452fd67/655cf371ab171e040a838b2a/329050_DR23_Graphics_Website_V5_Default_Image_v1.png?width=300&auto=webp&quality=80&disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/bltc94608acf452fd67/655cf371ab171e040a838b2a/329050_DR23_Graphics_Website_V5_Default_Image_v1.png?width=300&auto=webp&quality=80&disable=upscale" loading="lazy" alt=" logo in a gray background | " title=""/></a><a class="HorizontalCard-IconWrapper" title="Link to all video" data-testid="content-preview-icon-link" data-discover="true" href="/cloud-security/tony-jarvis-on-shifting-security-gears-as-we-move-to-the-cloud"><span data-component="icon" data-name="Play" class="HorizontalCard-Icon" style="mask-image:url(/build/_assets/Play-CLWHZVKX.svg);-webkit-mask-image:url(/build/_assets/Play-CLWHZVKX.svg);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain"></span></a></div><div class="HorizontalCard-ContentWrapper"><div class="HorizontalCard-KeywordWrapper"><a data-component="keyword" class="Keyword Keyword_variant_alternate Keyword_title_сloudSecurity HorizontalCard-Keyword" data-discover="true" href="/cloud-security">Сloud Security</a></div><div class="HorizontalCard-TitleWrapper"><a class="HorizontalCard-Title" data-testid="preview-default-title" data-discover="true" href="/cloud-security/tony-jarvis-on-shifting-security-gears-as-we-move-to-the-cloud">Darktrace's Tony Jarvis on Shifting Security Gears as We Move to the Cloud</a></div><div class="HorizontalCard-MobileTitleWrapper"><a class="HorizontalCard-Title" data-testid="preview-mobile-title" data-discover="true" href="/cloud-security/tony-jarvis-on-shifting-security-gears-as-we-move-to-the-cloud">Darktrace's Tony Jarvis on Shifting Security Gears as We Move to the Cloud</a></div><p class="HorizontalCard-Date" data-testid="horizontalCardDate">Jun 13, 2022</p></div></div></div><div class="ContentPreview HighlightContents-Content" data-module="content-preview" data-variant="card-horizontal"><div class="HorizontalCard"><div class="HorizontalCard-ImageWrapper"><a data-discover="true" href="/cyberattacks-data-breaches/darktrace-s-brianna-leddy-on-how-ransomware-groups-adapt-to-new-defenses"><span class="HorizontalCard-ImageScreenReaderText"></span><img data-component="image" class="HorizontalCard-Image" data-src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/bltc94608acf452fd67/655cf371ab171e040a838b2a/329050_DR23_Graphics_Website_V5_Default_Image_v1.png?width=300&auto=webp&quality=80&disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/bltc94608acf452fd67/655cf371ab171e040a838b2a/329050_DR23_Graphics_Website_V5_Default_Image_v1.png?width=300&auto=webp&quality=80&disable=upscale" loading="lazy" alt=" logo in a gray background | " title=""/></a><a class="HorizontalCard-IconWrapper" title="Link to all video" data-testid="content-preview-icon-link" data-discover="true" href="/cyberattacks-data-breaches/darktrace-s-brianna-leddy-on-how-ransomware-groups-adapt-to-new-defenses"><span data-component="icon" data-name="Play" class="HorizontalCard-Icon" style="mask-image:url(/build/_assets/Play-CLWHZVKX.svg);-webkit-mask-image:url(/build/_assets/Play-CLWHZVKX.svg);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain"></span></a></div><div class="HorizontalCard-ContentWrapper"><div class="HorizontalCard-KeywordWrapper"><a data-component="keyword" class="Keyword Keyword_variant_alternate Keyword_title_cyberattacksDataBreaches HorizontalCard-Keyword" data-discover="true" href="/cyberattacks-data-breaches">Cyberattacks & Data Breaches</a></div><div class="HorizontalCard-TitleWrapper"><a class="HorizontalCard-Title" data-testid="preview-default-title" data-discover="true" href="/cyberattacks-data-breaches/darktrace-s-brianna-leddy-on-how-ransomware-groups-adapt-to-new-defenses">Darktrace's Brianna Leddy on How Ransomware Groups Adapt to New Defenses</a></div><div class="HorizontalCard-MobileTitleWrapper"><a class="HorizontalCard-Title" data-testid="preview-mobile-title" data-discover="true" href="/cyberattacks-data-breaches/darktrace-s-brianna-leddy-on-how-ransomware-groups-adapt-to-new-defenses">Darktrace's Brianna Leddy on How Ransomware Groups Adapt to New Defenses</a></div><p class="HorizontalCard-Date" data-testid="horizontalCardDate">Jun 8, 2022</p></div></div></div><div class="HighlightContents-DivEmpty"></div><div class="ContentPreview HighlightContents-Content" data-module="content-preview" data-variant="card-horizontal"><div class="HorizontalCard"><div class="HorizontalCard-ImageWrapper"><a data-discover="true" href="/cyberattacks-data-breaches/darktrace-s-dave-masson-on-what-attacks-on-critical-infrastructure-looks-like"><span class="HorizontalCard-ImageScreenReaderText"></span><img data-component="image" class="HorizontalCard-Image" data-src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/bltc94608acf452fd67/655cf371ab171e040a838b2a/329050_DR23_Graphics_Website_V5_Default_Image_v1.png?width=300&auto=webp&quality=80&disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/bltc94608acf452fd67/655cf371ab171e040a838b2a/329050_DR23_Graphics_Website_V5_Default_Image_v1.png?width=300&auto=webp&quality=80&disable=upscale" loading="lazy" alt=" logo in a gray background | " title=""/></a><a class="HorizontalCard-IconWrapper" title="Link to all video" data-testid="content-preview-icon-link" data-discover="true" href="/cyberattacks-data-breaches/darktrace-s-dave-masson-on-what-attacks-on-critical-infrastructure-looks-like"><span data-component="icon" data-name="Play" class="HorizontalCard-Icon" style="mask-image:url(/build/_assets/Play-CLWHZVKX.svg);-webkit-mask-image:url(/build/_assets/Play-CLWHZVKX.svg);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain"></span></a></div><div class="HorizontalCard-ContentWrapper"><div class="HorizontalCard-KeywordWrapper"><a data-component="keyword" class="Keyword Keyword_variant_alternate Keyword_title_cyberattacksDataBreaches HorizontalCard-Keyword" data-discover="true" href="/cyberattacks-data-breaches">Cyberattacks & Data Breaches</a></div><div class="HorizontalCard-TitleWrapper"><a class="HorizontalCard-Title" data-testid="preview-default-title" data-discover="true" href="/cyberattacks-data-breaches/darktrace-s-dave-masson-on-what-attacks-on-critical-infrastructure-looks-like">Darktrace's David Masson on What Attacks on Critical Infrastructure Look Like</a></div><div class="HorizontalCard-MobileTitleWrapper"><a class="HorizontalCard-Title" data-testid="preview-mobile-title" data-discover="true" href="/cyberattacks-data-breaches/darktrace-s-dave-masson-on-what-attacks-on-critical-infrastructure-looks-like">Darktrace's David Masson on What Attacks on Critical Infrastructure Look Like</a></div><p class="HorizontalCard-Date" data-testid="horizontalCardDate">Jun 1, 2022</p></div></div></div><div class="HighlightContents-DivEmpty"></div></div><a data-component="button" data-testid="highlightContentsActionLink" class="Button Button_size_medium Button_variant_darkOutlined HighlightContents-ActionLink" href="/program/dr-tech-talks"><span class="Button-ContentWrapper">MORE DR TECH TALKS</span></a></div></div><div class="TextBox-Wrapper" data-module="text-box"><div class="TextBox-Title_center"><h2 class="TextBox-Title">Overheard This Week</h2></div><div class="TextBox-Content"><div class="TextBox-Content_center"><div data-module="content" class="ContentModule-Wrapper"><p class="ContentParagraph ContentParagraph_align_left" data-testid="content-paragraph"><span class="ContentText ContentText_variant_bodyNormal" data-testid="content-text">"Authentication and authorization in the world of API is critical." Jonathan Care during a June 6 webinar "Assessing Software Supply Chain Risk."</span></p></div></div></div><div class="TextBox-ButtonWrapper"><a data-component="button" data-testid="button_a" class="Button Button_size_large Button_variant_primaryFilled TextBox-Button" href="https://dr-resources.darkreading.com/free/w_apii05/?p=w_apii05" target="_blank" rel="nofollow"><span class="Button-ContentWrapper">Listen to the Discussion</span></a></div></div><div data-module="video-playlist" class="VideoPlaylist VideoPlaylist_isDarkMode"><h3 class="VideoPlaylist-Title" data-testid="playlist-title">Featured Video Playlist</h3><div class="VideoPlaylist-Wrapper"><div class="VideoPlaylist-PlayerWrapper" data-testid="video-playlist-active"><div class="VideoPlayer" data-component="video-player"><div class="VideoPlayer-Wrapper" data-testid="playlist-player"><div role="presentation" class="VideoPlayer-ThumbnailWrapper VideoPlayer-PlaylistThumbnailWrapper" data-testid="video-thumbnail"><img draggable="false" data-component="image" class="VideoPlayer-ThumbnailImage" data-src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/bltc94608acf452fd67/655cf371ab171e040a838b2a/329050_DR23_Graphics_Website_V5_Default_Image_v1.png?width=1280&auto=webp&quality=95&format=jpg&disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/bltc94608acf452fd67/655cf371ab171e040a838b2a/329050_DR23_Graphics_Website_V5_Default_Image_v1.png?width=1280&auto=webp&quality=95&format=jpg&disable=upscale" loading="eager" alt=" logo in a gray background | " title=""/><div class="VideoPlayer-IconWrapper" data-testid="video-play-icon"><svg xmlns="http://www.w3.org/2000/svg" width="14" height="14" viewBox="0 0 14 14" class="VideoPlayer-Icon"><path data-name="Icon awesome-play-circle" d="M7.563.563a7,7,0,1,0,7,7A7,7,0,0,0,7.563.563ZM10.828,8.24,5.86,11.091A.679.679,0,0,1,4.853,10.5V4.627A.679.679,0,0,1,5.86,4.034l4.968,3.02A.68.68,0,0,1,10.828,8.24Z" transform="translate(-0.563 -0.563)"></path></svg></div></div></div></div><a class="VideoPlaylist-ActiveVideoLink" data-discover="true" href="/cloud-security/vmware-offers-up-new-ground-truth-for-improved-cloud-security"><div class="VideoPlaylist-ActiveVideoTitle" data-testid="active-video-title">VMware Offers Up New Ground Truth for Improved Cloud Security</div><div class="VideoPlaylist-ActiveVideoMobileTitle" data-testid="active-video-mobile-title">VMware Offers Up New Ground Truth for Improved Cloud Security</div></a><div class="VideoPlaylist-ActiveVideoFooter"><span class="VideoPlaylist-ActiveVideoDate" data-testid="video-published-date">Apr 28, 2023</span></div></div><div class="VideoPlaylist-VideoListWrapper" data-testid="video-list"><div class="VideoPlaylist-VideoList"><div class="VideoPlaylist-VideoItem" data-testid="video-list-item"><div class="VideoPlaylist-VideoItemThumbnailAContainer" role="presentation"><div class="VideoPlaylist-VideoItemThumbnailAspect"><img draggable="false" data-component="image" class="VideoPlaylist-VideoItemThumbnail" data-src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/bltc94608acf452fd67/655cf371ab171e040a838b2a/329050_DR23_Graphics_Website_V5_Default_Image_v1.png?width=300&auto=webp&quality=95&format=jpg&disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/bltc94608acf452fd67/655cf371ab171e040a838b2a/329050_DR23_Graphics_Website_V5_Default_Image_v1.png?width=300&auto=webp&quality=95&format=jpg&disable=upscale" loading="eager" alt=" logo in a gray background | " title=""/><div class="VideoPlaylist-VideoItemOverlay" data-testid="video-item-overlay"><p class="VideoPlaylist-VideoItemOverlayText">Now playing</p></div></div><div class="VideoPlaylist-VideoItemInfo" data-testid="video-item-info"><span data-component="icon" data-name="Play" class="VideoPlaylist-VideoItemIcon" style="mask-image:url(/build/_assets/Play-CLWHZVKX.svg);-webkit-mask-image:url(/build/_assets/Play-CLWHZVKX.svg);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain"></span><span class="VideoPlaylist-VideoItemDuration"></span></div></div><a class="VideoPlaylist-VideoItemLink" data-discover="true" href="/cloud-security/vmware-offers-up-new-ground-truth-for-improved-cloud-security"><div class="VideoPlaylist-VideoItemTitle" data-testid="video-item-title">VMware Offers Up New Ground Truth for Improved Cloud Security</div><div class="VideoPlaylist-VideoItemMobileTitle" data-testid="video-item-mobile-title">VMware Offers Up New Ground Truth for Improved Cloud Security</div></a></div><div class="VideoPlaylist-VideoItem" data-testid="video-list-item"><div class="VideoPlaylist-VideoItemThumbnailAContainer" role="presentation"><div class="VideoPlaylist-VideoItemThumbnailAspect"><img draggable="false" data-component="image" class="VideoPlaylist-VideoItemThumbnail" data-src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/bltc94608acf452fd67/655cf371ab171e040a838b2a/329050_DR23_Graphics_Website_V5_Default_Image_v1.png?width=300&auto=webp&quality=95&format=jpg&disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/bltc94608acf452fd67/655cf371ab171e040a838b2a/329050_DR23_Graphics_Website_V5_Default_Image_v1.png?width=300&auto=webp&quality=95&format=jpg&disable=upscale" loading="eager" alt=" logo in a gray background | " title=""/><div class="VideoPlaylist-VideoItemOverlay" data-testid="video-item-overlay"><p class="VideoPlaylist-VideoItemOverlayText">Now playing</p></div></div><div class="VideoPlaylist-VideoItemInfo" data-testid="video-item-info"><span data-component="icon" data-name="Play" class="VideoPlaylist-VideoItemIcon" style="mask-image:url(/build/_assets/Play-CLWHZVKX.svg);-webkit-mask-image:url(/build/_assets/Play-CLWHZVKX.svg);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain"></span><span class="VideoPlaylist-VideoItemDuration"></span></div></div><a class="VideoPlaylist-VideoItemLink" data-discover="true" href="/cloud-security/jupiterone-weighs-in-on-the-need-for-unified-cyber-insights"><div class="VideoPlaylist-VideoItemTitle" data-testid="video-item-title">JupiterOne Weighs In on the Need For Unified Cyber Insights</div><div class="VideoPlaylist-VideoItemMobileTitle" data-testid="video-item-mobile-title">JupiterOne Weighs In on the Need For Unified Cyber Insights</div></a></div><div class="VideoPlaylist-VideoItem" data-testid="video-list-item"><div class="VideoPlaylist-VideoItemThumbnailAContainer" role="presentation"><div class="VideoPlaylist-VideoItemThumbnailAspect"><img draggable="false" data-component="image" class="VideoPlaylist-VideoItemThumbnail" data-src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/bltc94608acf452fd67/655cf371ab171e040a838b2a/329050_DR23_Graphics_Website_V5_Default_Image_v1.png?width=300&auto=webp&quality=95&format=jpg&disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/bltc94608acf452fd67/655cf371ab171e040a838b2a/329050_DR23_Graphics_Website_V5_Default_Image_v1.png?width=300&auto=webp&quality=95&format=jpg&disable=upscale" loading="eager" alt=" logo in a gray background | " title=""/><div class="VideoPlaylist-VideoItemOverlay" data-testid="video-item-overlay"><p class="VideoPlaylist-VideoItemOverlayText">Now playing</p></div></div><div class="VideoPlaylist-VideoItemInfo" data-testid="video-item-info"><span data-component="icon" data-name="Play" class="VideoPlaylist-VideoItemIcon" style="mask-image:url(/build/_assets/Play-CLWHZVKX.svg);-webkit-mask-image:url(/build/_assets/Play-CLWHZVKX.svg);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain"></span><span class="VideoPlaylist-VideoItemDuration"></span></div></div><a class="VideoPlaylist-VideoItemLink" data-discover="true" href="/cloud-security/darktrace-takes-a-closer-look-at-the-shifting-email-security-conversation"><div class="VideoPlaylist-VideoItemTitle" data-testid="video-item-title">Darktrace Takes a Closer Look at the Shifting Email Security Conversation</div><div class="VideoPlaylist-VideoItemMobileTitle" data-testid="video-item-mobile-title">Darktrace Takes a Closer Look at the Shifting Email Security Conversation</div></a></div><div class="VideoPlaylist-VideoItem" data-testid="video-list-item"><div class="VideoPlaylist-VideoItemThumbnailAContainer" role="presentation"><div class="VideoPlaylist-VideoItemThumbnailAspect"><img draggable="false" data-component="image" class="VideoPlaylist-VideoItemThumbnail" data-src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/bltc94608acf452fd67/655cf371ab171e040a838b2a/329050_DR23_Graphics_Website_V5_Default_Image_v1.png?width=300&auto=webp&quality=95&format=jpg&disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/bltc94608acf452fd67/655cf371ab171e040a838b2a/329050_DR23_Graphics_Website_V5_Default_Image_v1.png?width=300&auto=webp&quality=95&format=jpg&disable=upscale" loading="eager" alt=" logo in a gray background | " title=""/><div class="VideoPlaylist-VideoItemOverlay" data-testid="video-item-overlay"><p class="VideoPlaylist-VideoItemOverlayText">Now playing</p></div></div><div class="VideoPlaylist-VideoItemInfo" data-testid="video-item-info"><span data-component="icon" data-name="Play" class="VideoPlaylist-VideoItemIcon" style="mask-image:url(/build/_assets/Play-CLWHZVKX.svg);-webkit-mask-image:url(/build/_assets/Play-CLWHZVKX.svg);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain"></span><span class="VideoPlaylist-VideoItemDuration"></span></div></div><a class="VideoPlaylist-VideoItemLink" data-discover="true" href="/cloud-security/att-what-security-pros-should-know-about-the-evolving-edge-ecosystem"><div class="VideoPlaylist-VideoItemTitle" data-testid="video-item-title">AT&T: What Security Pros Should Know About the Evolving Edge Ecosystem</div><div class="VideoPlaylist-VideoItemMobileTitle" data-testid="video-item-mobile-title">AT&T: What Security Pros Should Know About the Evolving Edge Ecosystem</div></a></div><div class="VideoPlaylist-VideoItem" data-testid="video-list-item"><div class="VideoPlaylist-VideoItemThumbnailAContainer" role="presentation"><div class="VideoPlaylist-VideoItemThumbnailAspect"><img draggable="false" data-component="image" class="VideoPlaylist-VideoItemThumbnail" data-src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/bltc94608acf452fd67/655cf371ab171e040a838b2a/329050_DR23_Graphics_Website_V5_Default_Image_v1.png?width=300&auto=webp&quality=95&format=jpg&disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/bltc94608acf452fd67/655cf371ab171e040a838b2a/329050_DR23_Graphics_Website_V5_Default_Image_v1.png?width=300&auto=webp&quality=95&format=jpg&disable=upscale" loading="eager" alt=" logo in a gray background | " title=""/><div class="VideoPlaylist-VideoItemOverlay" data-testid="video-item-overlay"><p class="VideoPlaylist-VideoItemOverlayText">Now playing</p></div></div><div class="VideoPlaylist-VideoItemInfo" data-testid="video-item-info"><span data-component="icon" data-name="Play" class="VideoPlaylist-VideoItemIcon" style="mask-image:url(/build/_assets/Play-CLWHZVKX.svg);-webkit-mask-image:url(/build/_assets/Play-CLWHZVKX.svg);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain"></span><span class="VideoPlaylist-VideoItemDuration"></span></div></div><a class="VideoPlaylist-VideoItemLink" data-discover="true" href="/vulnerabilities-threats/opentext-integrating-processes-and-strategy-is-still-the-best-defense"><div class="VideoPlaylist-VideoItemTitle" data-testid="video-item-title">OpenText Cybersecurity: Integrating Processes — and Strategy — Is Still the Best Defense</div><div class="VideoPlaylist-VideoItemMobileTitle" data-testid="video-item-mobile-title">OpenText Cybersecurity: Integrating Processes — and Strategy — Is Still the Best Defense</div></a></div><div class="VideoPlaylist-VideoItem" data-testid="video-list-item"><div class="VideoPlaylist-VideoItemThumbnailAContainer" role="presentation"><div class="VideoPlaylist-VideoItemThumbnailAspect"><img draggable="false" data-component="image" class="VideoPlaylist-VideoItemThumbnail" data-src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/bltc94608acf452fd67/655cf371ab171e040a838b2a/329050_DR23_Graphics_Website_V5_Default_Image_v1.png?width=300&auto=webp&quality=95&format=jpg&disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/bltc94608acf452fd67/655cf371ab171e040a838b2a/329050_DR23_Graphics_Website_V5_Default_Image_v1.png?width=300&auto=webp&quality=95&format=jpg&disable=upscale" loading="eager" alt=" logo in a gray background | " title=""/><div class="VideoPlaylist-VideoItemOverlay" data-testid="video-item-overlay"><p class="VideoPlaylist-VideoItemOverlayText">Now playing</p></div></div><div class="VideoPlaylist-VideoItemInfo" data-testid="video-item-info"><span data-component="icon" data-name="Play" class="VideoPlaylist-VideoItemIcon" style="mask-image:url(/build/_assets/Play-CLWHZVKX.svg);-webkit-mask-image:url(/build/_assets/Play-CLWHZVKX.svg);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain"></span><span class="VideoPlaylist-VideoItemDuration"></span></div></div><a class="VideoPlaylist-VideoItemLink" data-discover="true" href="/cyberattacks-data-breaches/sophos-reveals-new-insights-for-protecting-against-active-adversaries"><div class="VideoPlaylist-VideoItemTitle" data-testid="video-item-title">Sophos Reveals New Insights for Protecting Against Active Adversaries</div><div class="VideoPlaylist-VideoItemMobileTitle" data-testid="video-item-mobile-title">Sophos Reveals New Insights for Protecting Against Active Adversaries</div></a></div><div class="VideoPlaylist-VideoItem" data-testid="video-list-item"><div class="VideoPlaylist-VideoItemThumbnailAContainer" role="presentation"><div class="VideoPlaylist-VideoItemThumbnailAspect"><img draggable="false" data-component="image" class="VideoPlaylist-VideoItemThumbnail" data-src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/bltc94608acf452fd67/655cf371ab171e040a838b2a/329050_DR23_Graphics_Website_V5_Default_Image_v1.png?width=300&auto=webp&quality=95&format=jpg&disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/bltc94608acf452fd67/655cf371ab171e040a838b2a/329050_DR23_Graphics_Website_V5_Default_Image_v1.png?width=300&auto=webp&quality=95&format=jpg&disable=upscale" loading="eager" alt=" logo in a gray background | " title=""/><div class="VideoPlaylist-VideoItemOverlay" data-testid="video-item-overlay"><p class="VideoPlaylist-VideoItemOverlayText">Now playing</p></div></div><div class="VideoPlaylist-VideoItemInfo" data-testid="video-item-info"><span data-component="icon" data-name="Play" class="VideoPlaylist-VideoItemIcon" style="mask-image:url(/build/_assets/Play-CLWHZVKX.svg);-webkit-mask-image:url(/build/_assets/Play-CLWHZVKX.svg);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain"></span><span class="VideoPlaylist-VideoItemDuration"></span></div></div><a class="VideoPlaylist-VideoItemLink" data-discover="true" href="/cyber-risk/automox-getting-smarter-where-endpoint-management-s-concerned"><div class="VideoPlaylist-VideoItemTitle" data-testid="video-item-title">Automox: Getting Smarter Where Endpoint Management's Concerned</div><div class="VideoPlaylist-VideoItemMobileTitle" data-testid="video-item-mobile-title">Automox: Getting Smarter Where Endpoint Management's Concerned</div></a></div><div class="VideoPlaylist-VideoItem" data-testid="video-list-item"><div class="VideoPlaylist-VideoItemThumbnailAContainer" role="presentation"><div class="VideoPlaylist-VideoItemThumbnailAspect"><img draggable="false" data-component="image" class="VideoPlaylist-VideoItemThumbnail" data-src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/bltc94608acf452fd67/655cf371ab171e040a838b2a/329050_DR23_Graphics_Website_V5_Default_Image_v1.png?width=300&auto=webp&quality=95&format=jpg&disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/bltc94608acf452fd67/655cf371ab171e040a838b2a/329050_DR23_Graphics_Website_V5_Default_Image_v1.png?width=300&auto=webp&quality=95&format=jpg&disable=upscale" loading="eager" alt=" logo in a gray background | " title=""/><div class="VideoPlaylist-VideoItemOverlay" data-testid="video-item-overlay"><p class="VideoPlaylist-VideoItemOverlayText">Now playing</p></div></div><div class="VideoPlaylist-VideoItemInfo" data-testid="video-item-info"><span data-component="icon" data-name="Play" class="VideoPlaylist-VideoItemIcon" style="mask-image:url(/build/_assets/Play-CLWHZVKX.svg);-webkit-mask-image:url(/build/_assets/Play-CLWHZVKX.svg);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain"></span><span class="VideoPlaylist-VideoItemDuration"></span></div></div><a class="VideoPlaylist-VideoItemLink" data-discover="true" href="/cyber-risk/sumo-logic-ponders-why-we-arent-there-yet-with-security-automation"><div class="VideoPlaylist-VideoItemTitle" data-testid="video-item-title">Sumo Logic Ponders Why We Aren't There Yet With Security Automation</div><div class="VideoPlaylist-VideoItemMobileTitle" data-testid="video-item-mobile-title">Sumo Logic Ponders Why We Aren't There Yet With Security Automation</div></a></div><div class="VideoPlaylist-VideoItem" data-testid="video-list-item"><div class="VideoPlaylist-VideoItemThumbnailAContainer" role="presentation"><div class="VideoPlaylist-VideoItemThumbnailAspect"><img draggable="false" data-component="image" class="VideoPlaylist-VideoItemThumbnail" data-src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/bltc94608acf452fd67/655cf371ab171e040a838b2a/329050_DR23_Graphics_Website_V5_Default_Image_v1.png?width=300&auto=webp&quality=95&format=jpg&disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/bltc94608acf452fd67/655cf371ab171e040a838b2a/329050_DR23_Graphics_Website_V5_Default_Image_v1.png?width=300&auto=webp&quality=95&format=jpg&disable=upscale" loading="eager" alt=" logo in a gray background | " title=""/><div class="VideoPlaylist-VideoItemOverlay" data-testid="video-item-overlay"><p class="VideoPlaylist-VideoItemOverlayText">Now playing</p></div></div><div class="VideoPlaylist-VideoItemInfo" data-testid="video-item-info"><span data-component="icon" data-name="Play" class="VideoPlaylist-VideoItemIcon" style="mask-image:url(/build/_assets/Play-CLWHZVKX.svg);-webkit-mask-image:url(/build/_assets/Play-CLWHZVKX.svg);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain"></span><span class="VideoPlaylist-VideoItemDuration"></span></div></div><a class="VideoPlaylist-VideoItemLink" data-discover="true" href="/cloud-security/beyond-identity-what-is-zero-trust-authentication-and-why-does-it-matter"><div class="VideoPlaylist-VideoItemTitle" data-testid="video-item-title">Beyond Identity: What Is Zero-Trust Authentication and Why Does It Matter?</div><div class="VideoPlaylist-VideoItemMobileTitle" data-testid="video-item-mobile-title">Beyond Identity: What Is Zero-Trust Authentication and Why Does It Matter?</div></a></div><div class="VideoPlaylist-VideoItem" data-testid="video-list-item"><div class="VideoPlaylist-VideoItemThumbnailAContainer" role="presentation"><div class="VideoPlaylist-VideoItemThumbnailAspect"><img draggable="false" data-component="image" class="VideoPlaylist-VideoItemThumbnail" data-src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt3e12fb388947d16b/6560a137a223a2040af160f9/Capture.jpg?width=300&auto=webp&quality=95&format=jpg&disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt3e12fb388947d16b/6560a137a223a2040af160f9/Capture.jpg?width=300&auto=webp&quality=95&format=jpg&disable=upscale" loading="eager" alt="" title=""/><div class="VideoPlaylist-VideoItemOverlay" data-testid="video-item-overlay"><p class="VideoPlaylist-VideoItemOverlayText">Now playing</p></div></div><div class="VideoPlaylist-VideoItemInfo" data-testid="video-item-info"><span data-component="icon" data-name="Play" class="VideoPlaylist-VideoItemIcon" style="mask-image:url(/build/_assets/Play-CLWHZVKX.svg);-webkit-mask-image:url(/build/_assets/Play-CLWHZVKX.svg);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain"></span><span class="VideoPlaylist-VideoItemDuration"></span></div></div><a class="VideoPlaylist-VideoItemLink" data-discover="true" href="/threat-intelligence/slashnext-how-generative-ai-is-changing-the-threat-landscape"><div class="VideoPlaylist-VideoItemTitle" data-testid="video-item-title">SlashNext: How Generative AI Is Changing the Threat Landscape</div><div class="VideoPlaylist-VideoItemMobileTitle" data-testid="video-item-mobile-title">SlashNext: How Generative AI Is Changing the Threat Landscape</div></a></div></div></div></div><a class="VideoPlaylist-CtaButtonLink" target="_blank" href="https://www.darkreading.com/cloud-security/security-leaders-discuss-industry-trends-at-dark-reading-news-desk-at-rsac-2023"><button data-component="button" data-testid="button_button" class="Button Button_size_medium Button_variant_lightOutlined VideoPlaylist-CtaButton" type="button"><span class="Button-ContentWrapper">See All RSAC Videos</span></button></a></div><div data-module="content-cards" class="ContentCards"><div class="ContentCards-CardsWrapper ContentCards-CardsWrapper_vertical"><div class="ContentCards-Header ContentCards-Header_vertical" data-testid="content-cards-header"><h3 class="ContentCards-Title" data-testid="contentCardsTitle">DR Technology Trends</h3><a class="ContentCards-Link" data-testid="content-card-link" data-discover="true" href="/program/dr-technology-trends"><span class="ContentCards-LinkText" data-testid="contentCardsBreadcrumbsLinkTitle">READ MORE DR TECHNOLOGY TRENDS</span><span data-component="icon" data-name="ChevronRight" class="ContentCards-LinkIcon" style="mask-image:url(/build/_assets/ChevronRight-NHDKEYGJ.svg);-webkit-mask-image:url(/build/_assets/ChevronRight-NHDKEYGJ.svg);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain"></span></a></div><div class="ContentCards-Content ContentCards-Content_vertical ContentCards-Content_none"><div class="ContentCards-ContentPreview ContentCards-ContentPreview_vertical" data-testid="content-preview-vertical"><div class="ContentPreview" data-module="content-preview" data-variant="card-vertical"><div class="ContentPreview-Wrapper ContentPreview-Wrapper_variant_cardVertical"><a data-testid="thumbnail" data-discover="true" href="/cybersecurity-operations/survey-report-ai-ml-make-soc-better"><div class="ContentPreview-ImageContainer"><span data-testid="content-preview-screen-reader-text" class="ContentPreview-ImageScreenReaderText">Figure 9. Chart of survey responses to the question "How has AI/ML improved your SOC operations?" Responses add up to more than 100 percent.</span><img data-testid="content-preview-image" data-component="image" class="ContentPreview-Image" data-src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/bltb488b813b54f31ab/673e529f3b1c9479ca463efc/tech-ttrendssoc-fig9.png?width=700&auto=webp&quality=80&disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/bltb488b813b54f31ab/673e529f3b1c9479ca463efc/tech-ttrendssoc-fig9.png?width=700&auto=webp&quality=80&disable=upscale" loading="lazy" alt="" title=""/></div></a><a data-component="keyword" class="Keyword Keyword_variant_standard Keyword_title_cybersecurityOperations ContentPreview-Category" data-discover="true" href="/cybersecurity-operations">Cybersecurity Operations</a><div class="VerticalCard"><div class="VerticalCard-Body"><a class="VerticalCard-Title VerticalCard-Title_displayOption_default" data-testid="preview-default-title" data-discover="true" href="/cybersecurity-operations/survey-report-ai-ml-make-soc-better">It's Near-Unanimous: AI, ML Make the SOC Better</a><a class="VerticalCard-Title VerticalCard-Title_displayOption_mobile" data-testid="preview-mobile-title" data-discover="true" href="/cybersecurity-operations/survey-report-ai-ml-make-soc-better">It's Near-Unanimous: AI, ML Make the SOC Better</a></div></div></div></div></div><div class="ContentCards-ContentPreview ContentCards-ContentPreview_vertical" data-testid="content-preview-vertical"><div class="ContentPreview" data-module="content-preview" data-variant="card-vertical"><div class="ContentPreview-Wrapper ContentPreview-Wrapper_variant_cardVertical"><a data-testid="thumbnail" data-discover="true" href="/ics-ot-security/incident-response-anomaly-detection-rank-high-on-planned-ics-security-spending"><div class="ContentPreview-ImageContainer"><span data-testid="content-preview-screen-reader-text" class="ContentPreview-ImageScreenReaderText">thumbnail</span><img data-testid="content-preview-image" data-component="image" class="ContentPreview-Image" data-src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt57707039dda73ff7/673341c03f9de2939d0bb53f/tech-sans-ics-ot.jpg?width=700&auto=webp&quality=80&disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt57707039dda73ff7/673341c03f9de2939d0bb53f/tech-sans-ics-ot.jpg?width=700&auto=webp&quality=80&disable=upscale" loading="lazy" alt="" title=""/></div></a><a data-component="keyword" class="Keyword Keyword_variant_standard Keyword_title_icsOtSecurity ContentPreview-Category" data-discover="true" href="/ics-ot-security">ICS/OT Security</a><div class="VerticalCard"><div class="VerticalCard-Body"><a class="VerticalCard-Title VerticalCard-Title_displayOption_default" data-testid="preview-default-title" data-discover="true" href="/ics-ot-security/incident-response-anomaly-detection-rank-high-on-planned-ics-security-spending">Incident Response, Anomaly Detection Rank High on Planned ICS Security Spending</a><a class="VerticalCard-Title VerticalCard-Title_displayOption_mobile" data-testid="preview-mobile-title" data-discover="true" href="/ics-ot-security/incident-response-anomaly-detection-rank-high-on-planned-ics-security-spending">Planned ICS Security Spending: Incident Response, Anomaly Detection</a></div></div></div></div></div><div class="ContentCards-ContentPreview ContentCards-ContentPreview_vertical" data-testid="content-preview-vertical"><div class="ContentPreview" data-module="content-preview" data-variant="card-vertical"><div class="ContentPreview-Wrapper ContentPreview-Wrapper_variant_cardVertical"><a data-testid="thumbnail" data-discover="true" href="/cybersecurity-operations/antivirus-antimalware-demand-ai-ml-tools"><div class="ContentPreview-ImageContainer"><span data-testid="content-preview-screen-reader-text" class="ContentPreview-ImageScreenReaderText">Figure 2 asks, What AI/ML-enhanced solutions are you using in your cybersecurity operations?</span><img data-testid="content-preview-image" data-component="image" class="ContentPreview-Image" data-src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/bltb32c902ebe95128a/67292cedd53ac5549ef0c621/fig2-techtrends110524-darkreading.png?width=700&auto=webp&quality=80&disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/bltb32c902ebe95128a/67292cedd53ac5549ef0c621/fig2-techtrends110524-darkreading.png?width=700&auto=webp&quality=80&disable=upscale" loading="lazy" alt="" title=""/></div></a><a data-component="keyword" class="Keyword Keyword_variant_standard Keyword_title_cybersecurityOperations ContentPreview-Category" data-discover="true" href="/cybersecurity-operations">Cybersecurity Operations</a><div class="VerticalCard"><div class="VerticalCard-Body"><a class="VerticalCard-Title VerticalCard-Title_displayOption_default" data-testid="preview-default-title" data-discover="true" href="/cybersecurity-operations/antivirus-antimalware-demand-ai-ml-tools">Antivirus, Anti-Malware Lead Demand for AI/ML Tools</a><a class="VerticalCard-Title VerticalCard-Title_displayOption_mobile" data-testid="preview-mobile-title" data-discover="true" href="/cybersecurity-operations/antivirus-antimalware-demand-ai-ml-tools">Antivirus, Anti-Malware Lead Demand for AI/ML Tools</a></div></div></div></div></div><div class="ContentCards-ContentPreview ContentCards-ContentPreview_vertical" data-testid="content-preview-vertical"><div class="ContentPreview" data-module="content-preview" data-variant="card-vertical"><div class="ContentPreview-Wrapper ContentPreview-Wrapper_variant_cardVertical"><a data-testid="thumbnail" data-discover="true" href="/cybersecurity-careers/ai-hype-drives-demand-ml-secops-skills"><div class="ContentPreview-ImageContainer"><span data-testid="content-preview-screen-reader-text" class="ContentPreview-ImageScreenReaderText">The words "skills gap" in a green cloud against a dark background.</span><img data-testid="content-preview-image" data-component="image" class="ContentPreview-Image" data-src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/bltfd06af8af256e09b/6709a18bb40de2271b260b60/Skills-gap-1800_designer491_Alamy.jpg?width=700&auto=webp&quality=80&disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/bltfd06af8af256e09b/6709a18bb40de2271b260b60/Skills-gap-1800_designer491_Alamy.jpg?width=700&auto=webp&quality=80&disable=upscale" loading="lazy" alt="" title=""/></div></a><a data-component="keyword" class="Keyword Keyword_variant_standard Keyword_title_cybersecurityCareers ContentPreview-Category" data-discover="true" href="/cybersecurity-operations/cybersecurity-careers">Cybersecurity Careers</a><div class="VerticalCard"><div class="VerticalCard-Body"><a class="VerticalCard-Title VerticalCard-Title_displayOption_default" data-testid="preview-default-title" data-discover="true" href="/cybersecurity-careers/ai-hype-drives-demand-ml-secops-skills">AI Hype Drives Demand For ML SecOps Skills</a><a class="VerticalCard-Title VerticalCard-Title_displayOption_mobile" data-testid="preview-mobile-title" data-discover="true" href="/cybersecurity-careers/ai-hype-drives-demand-ml-secops-skills">AI Hype Drives Demand For ML SecOps Skills</a></div></div></div></div></div></div></div></div><div data-module="latest-featured" class="LatestFeatured"><div class="LatestFeatured-ColumnList LatestFeatured-ColumnList_left" data-testid="list-content"><p class="LatestFeatured-Title" data-testid="list-content-title">Latest DR Technology Articles</p><div class="LatestFeatured-Content LatestFeatured-Content_left"><div class="ContentPreview LatestFeatured-ContentItem LatestFeatured-ContentItem_left" data-module="content-preview" data-variant="small"><div class="ListPreview"><div class="ListPreview-Container"><div class="ListPreview-ImageWrapper"><a aria-label="Read more about: A screen showing the Windows 11 logo" data-discover="true" href="/endpoint-security/microsoft-releases-recall-windows-insider-preview"><div title="A screen showing the Windows 11 logo"><img data-component="image" class="ListPreview-Image" data-src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt665c5e44e3b036f8/6706f434d8c4923c6a1a9e28/mundissima-windows-11-photo-shutterstock.jpg?width=300&auto=webp&quality=80&disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt665c5e44e3b036f8/6706f434d8c4923c6a1a9e28/mundissima-windows-11-photo-shutterstock.jpg?width=300&auto=webp&quality=80&disable=upscale" loading="lazy" alt="A screen showing the Windows 11 logo" title="A screen showing the Windows 11 logo"/></div></a></div><div class="ListPreview-ContentWrapper"><div class="ListPreview-KeywordWrapper"><a data-component="keyword" class="Keyword Keyword_variant_alternate Keyword_title_endpointSecurity ListPreview-Keyword" data-discover="true" href="/endpoint-security">Endpoint Security</a></div><div class="ListPreview-TitleWrapper"><a class="ListPreview-Title" data-testid="preview-default-title" data-discover="true" href="/endpoint-security/microsoft-releases-recall-windows-insider-preview">Microsoft Finally Releases Recall as Part of Windows Insider Preview</a></div><div class="ListPreview-MobileTitleWrapper"><a class="ListPreview-Title" data-testid="preview-mobile-title" data-discover="true" href="/endpoint-security/microsoft-releases-recall-windows-insider-preview">Microsoft Previews Recall in Windows Insider</a></div><div class="ListPreview-Footer"><span class="ListPreview-Date" data-testid="list-preview-date">Nov 27, 2024</span><div data-module="card-time" class="CardTime"><span class="CardTime-SeparatorLine">|</span><div data-component="article-read-time" class="ArticleReadTime ArticleReadTime_size_small CardTime-ReadTime"><span>3 Min<!-- --> <!-- -->Read</span></div></div></div></div></div></div></div><div class="ContentPreview LatestFeatured-ContentItem LatestFeatured-ContentItem_left" data-module="content-preview" data-variant="small"><div class="ListPreview"><div class="ListPreview-Container"><div class="ListPreview-ImageWrapper"><a aria-label="Read more about: AWS logo against a black background." data-discover="true" href="/identity-access-management-security/aws-rolls-out-updates-to-amazon-cognito"><div title="AWS logo against a black background."><img data-component="image" class="ListPreview-Image" data-src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt6b376a9ebdf9876f/674616ddfbdcfd40f7ec33c3/AWS-GK_Images-Alamy.jpg?width=300&auto=webp&quality=80&disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt6b376a9ebdf9876f/674616ddfbdcfd40f7ec33c3/AWS-GK_Images-Alamy.jpg?width=300&auto=webp&quality=80&disable=upscale" loading="lazy" alt="AWS logo against a black background." title="AWS logo against a black background."/></div></a></div><div class="ListPreview-ContentWrapper"><div class="ListPreview-KeywordWrapper"><a data-component="keyword" class="Keyword Keyword_variant_alternate Keyword_title_identityAccessManagementSecurity ListPreview-Keyword" data-discover="true" href="/cybersecurity-operations/identity-access-management-security">Identity & Access Management Security</a></div><div class="ListPreview-TitleWrapper"><a class="ListPreview-Title" data-testid="preview-default-title" data-discover="true" href="/identity-access-management-security/aws-rolls-out-updates-to-amazon-cognito">AWS Rolls Out Updates to Amazon Cognito</a></div><div class="ListPreview-MobileTitleWrapper"><a class="ListPreview-Title" data-testid="preview-mobile-title" data-discover="true" href="/identity-access-management-security/aws-rolls-out-updates-to-amazon-cognito">AWS Rolls Out Updates to Amazon Cognito</a></div><div class="ListPreview-Footer"><span class="ListPreview-Date" data-testid="list-preview-date">Nov 26, 2024</span><div data-module="card-time" class="CardTime"><span class="CardTime-SeparatorLine">|</span><div data-component="article-read-time" class="ArticleReadTime ArticleReadTime_size_small CardTime-ReadTime"><span>1 Min<!-- --> <!-- -->Read</span></div></div></div></div></div><div class="ListPreview-ContributorsWrapper"><div class="Contributors Contributors_variant_slimline Contributors_cardVariant_small Contributors_hasAvatar" data-component="contributors"><div class="Contributors-AvatarWrapper"><a class="Contributors-AvatarLink" aria-label="Jennifer Lawinski" data-discover="true" href="/author/jennifer-lawinski"><img aria-hidden="true" data-testid="contributor-avatar" data-component="image" class="Contributors-Avatar" data-src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt64edbfe42402bf03/660b3a58f5fc7993e5562490/jennifer-lawinski.jpg?width=100&auto=webp&quality=80&disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt64edbfe42402bf03/660b3a58f5fc7993e5562490/jennifer-lawinski.jpg?width=100&auto=webp&quality=80&disable=upscale" loading="lazy" alt="Picture of Jennifer Lawinski" title="Picture of Jennifer Lawinski"/></a></div><div class="Contributors-InfoWrapper"><span class="Contributors-ByText" data-testid="by-text">by</span><a class="Contributors-ContributorName" data-testid="contributor-name" data-discover="true" href="/author/jennifer-lawinski">Jennifer Lawinski</a><span class="Contributors-ContributorTitle" data-testid="contributor-title">, <!-- -->Contributing Writer</span></div></div></div></div></div><div class="ContentPreview LatestFeatured-ContentItem LatestFeatured-ContentItem_left" data-module="content-preview" data-variant="small"><div class="ListPreview"><div class="ListPreview-Container"><div class="ListPreview-ImageWrapper"><a aria-label="Read more about: phishing login credentials financial services FS-ISAC" data-discover="true" href="/cybersecurity-operations/phishing-prevention-framework-reduces-incidents-by-half"><div title="phishing login credentials financial services FS-ISAC"><img data-component="image" class="ListPreview-Image" data-src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt14e1d84c1085acdb/673e64b6791acf8e438a2080/Romolo_Tavani-phishing-credentials-shutterstock.jpg?width=300&auto=webp&quality=80&disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt14e1d84c1085acdb/673e64b6791acf8e438a2080/Romolo_Tavani-phishing-credentials-shutterstock.jpg?width=300&auto=webp&quality=80&disable=upscale" loading="lazy" alt="phishing login credentials financial services FS-ISAC" title="phishing login credentials financial services FS-ISAC"/></div></a></div><div class="ListPreview-ContentWrapper"><div class="ListPreview-KeywordWrapper"><a data-component="keyword" class="Keyword Keyword_variant_alternate Keyword_title_cybersecurityOperations ListPreview-Keyword" data-discover="true" href="/cybersecurity-operations">Cybersecurity Operations</a></div><div class="ListPreview-TitleWrapper"><a class="ListPreview-Title" data-testid="preview-default-title" data-discover="true" href="/cybersecurity-operations/phishing-prevention-framework-reduces-incidents-by-half">Phishing Prevention Framework Reduces Incidents by Half</a></div><div class="ListPreview-MobileTitleWrapper"><a class="ListPreview-Title" data-testid="preview-mobile-title" data-discover="true" href="/cybersecurity-operations/phishing-prevention-framework-reduces-incidents-by-half">Phishing Prevention Framework Cuts Abuse Incidents in Half</a></div><div class="ListPreview-Footer"><span class="ListPreview-Date" data-testid="list-preview-date">Nov 25, 2024</span><div data-module="card-time" class="CardTime"><span class="CardTime-SeparatorLine">|</span><div data-component="article-read-time" class="ArticleReadTime ArticleReadTime_size_small CardTime-ReadTime"><span>5 Min<!-- --> <!-- -->Read</span></div></div></div></div></div><div class="ListPreview-ContributorsWrapper"><div class="Contributors Contributors_variant_slimline Contributors_cardVariant_small Contributors_hasAvatar" data-component="contributors"><div class="Contributors-AvatarWrapper"><a class="Contributors-AvatarLink" aria-label="Robert Lemos, Contributing Writer" data-discover="true" href="/author/robert-lemos"><img aria-hidden="true" data-testid="contributor-avatar" data-component="image" class="Contributors-Avatar" data-src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt28d2c260c33375ea/64f14ff471df6264a382aaa0/Robert-Lemos.png?width=100&auto=webp&quality=80&disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt28d2c260c33375ea/64f14ff471df6264a382aaa0/Robert-Lemos.png?width=100&auto=webp&quality=80&disable=upscale" loading="lazy" alt="Picture of Robert Lemos, Contributing Writer" title="Picture of Robert Lemos, Contributing Writer"/></a></div><div class="Contributors-InfoWrapper"><span class="Contributors-ByText" data-testid="by-text">by</span><a class="Contributors-ContributorName" data-testid="contributor-name" data-discover="true" href="/author/robert-lemos">Robert Lemos, Contributing Writer</a></div></div></div></div></div><div class="ContentPreview LatestFeatured-ContentItem LatestFeatured-ContentItem_left" data-module="content-preview" data-variant="small"><div class="ListPreview"><div class="ListPreview-Container"><div class="ListPreview-ImageWrapper"><a aria-label="Read more about: Digital magnifying glass" data-discover="true" href="/cloud-security/microsoft-highlights-security-exposure-management-ignite"><div title="Digital magnifying glass"><img data-component="image" class="ListPreview-Image" data-src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt804d71f24ae24a3f/6740d9b25ae7e10170cea67c/magnifyingglass-WavebreakMedialtd-AlamyStockPhoto.jpg?width=300&auto=webp&quality=80&disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt804d71f24ae24a3f/6740d9b25ae7e10170cea67c/magnifyingglass-WavebreakMedialtd-AlamyStockPhoto.jpg?width=300&auto=webp&quality=80&disable=upscale" loading="lazy" alt="Digital magnifying glass" title="Digital magnifying glass"/></div></a></div><div class="ListPreview-ContentWrapper"><div class="ListPreview-KeywordWrapper"><a data-component="keyword" class="Keyword Keyword_variant_alternate Keyword_title_сloudSecurity ListPreview-Keyword" data-discover="true" href="/cloud-security">Сloud Security</a></div><div class="ListPreview-TitleWrapper"><a class="ListPreview-Title" data-testid="preview-default-title" data-discover="true" href="/cloud-security/microsoft-highlights-security-exposure-management-ignite">Microsoft Highlights Security Exposure Management at Ignite</a></div><div class="ListPreview-MobileTitleWrapper"><a class="ListPreview-Title" data-testid="preview-mobile-title" data-discover="true" href="/cloud-security/microsoft-highlights-security-exposure-management-ignite">Microsoft Highlights Security Exposure Management at Ignite</a></div><div class="ListPreview-Footer"><span class="ListPreview-Date" data-testid="list-preview-date">Nov 22, 2024</span><div data-module="card-time" class="CardTime"><span class="CardTime-SeparatorLine">|</span><div data-component="article-read-time" class="ArticleReadTime ArticleReadTime_size_small CardTime-ReadTime"><span>4 Min<!-- --> <!-- -->Read</span></div></div></div></div></div><div class="ListPreview-ContributorsWrapper"><div class="Contributors Contributors_variant_slimline Contributors_cardVariant_small Contributors_hasAvatar" data-component="contributors"><div class="Contributors-AvatarWrapper"><a class="Contributors-AvatarLink" aria-label="Jeffrey Schwartz" data-discover="true" href="/author/jeffrey-schwartz"><img aria-hidden="true" data-testid="contributor-avatar" data-component="image" class="Contributors-Avatar" data-src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blte815fe009d8ac172/64f1536fc3efae477df0ee60/Jeff_Schwartz_headshot-sq.png?width=100&auto=webp&quality=80&disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blte815fe009d8ac172/64f1536fc3efae477df0ee60/Jeff_Schwartz_headshot-sq.png?width=100&auto=webp&quality=80&disable=upscale" loading="lazy" alt="Picture of Jeffrey Schwartz" title="Picture of Jeffrey Schwartz"/></a></div><div class="Contributors-InfoWrapper"><span class="Contributors-ByText" data-testid="by-text">by</span><a class="Contributors-ContributorName" data-testid="contributor-name" data-discover="true" href="/author/jeffrey-schwartz">Jeffrey Schwartz</a><span class="Contributors-ContributorTitle" data-testid="contributor-title">, <!-- -->Contributing Writer</span></div></div></div></div></div><div class="ContentPreview LatestFeatured-ContentItem LatestFeatured-ContentItem_left" data-module="content-preview" data-variant="small"><div class="ListPreview"><div class="ListPreview-Container"><div class="ListPreview-ImageWrapper"><a aria-label="Read more about: cloud with padlocks" data-discover="true" href="/cloud-security/cloud-security-startup-wiz-to-acquire-dazz-in-risk-management-play"><div title="cloud with padlocks"><img data-component="image" class="ListPreview-Image" data-src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt65a16548ab4f4863/66fea28f3b9eea4d4ab5da42/Cloud(1800)_John_Williams_RF_Alamy.jpg?width=300&auto=webp&quality=80&disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt65a16548ab4f4863/66fea28f3b9eea4d4ab5da42/Cloud(1800)_John_Williams_RF_Alamy.jpg?width=300&auto=webp&quality=80&disable=upscale" loading="lazy" alt="cloud with padlocks" title="cloud with padlocks"/></div></a></div><div class="ListPreview-ContentWrapper"><div class="ListPreview-KeywordWrapper"><a data-component="keyword" class="Keyword Keyword_variant_alternate Keyword_title_сloudSecurity ListPreview-Keyword" data-discover="true" href="/cloud-security">Сloud Security</a></div><div class="ListPreview-TitleWrapper"><a class="ListPreview-Title" data-testid="preview-default-title" data-discover="true" href="/cloud-security/cloud-security-startup-wiz-to-acquire-dazz-in-risk-management-play">Cloud Security Startup Wiz to Acquire Dazz in Risk Management Play</a></div><div class="ListPreview-MobileTitleWrapper"><a class="ListPreview-Title" data-testid="preview-mobile-title" data-discover="true" href="/cloud-security/cloud-security-startup-wiz-to-acquire-dazz-in-risk-management-play">Cloud Security Startup Wiz to Acquire Dazz</a></div><div class="ListPreview-Footer"><span class="ListPreview-Date" data-testid="list-preview-date">Nov 21, 2024</span><div data-module="card-time" class="CardTime"><span class="CardTime-SeparatorLine">|</span><div data-component="article-read-time" class="ArticleReadTime ArticleReadTime_size_small CardTime-ReadTime"><span>2 Min<!-- --> <!-- -->Read</span></div></div></div></div></div><div class="ListPreview-ContributorsWrapper"><div class="Contributors Contributors_variant_slimline Contributors_cardVariant_small Contributors_hasAvatar" data-component="contributors"><div class="Contributors-AvatarWrapper"><a class="Contributors-AvatarLink" aria-label="Jennifer Lawinski" data-discover="true" href="/author/jennifer-lawinski"><img aria-hidden="true" data-testid="contributor-avatar" data-component="image" class="Contributors-Avatar" data-src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt64edbfe42402bf03/660b3a58f5fc7993e5562490/jennifer-lawinski.jpg?width=100&auto=webp&quality=80&disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt64edbfe42402bf03/660b3a58f5fc7993e5562490/jennifer-lawinski.jpg?width=100&auto=webp&quality=80&disable=upscale" loading="lazy" alt="Picture of Jennifer Lawinski" title="Picture of Jennifer Lawinski"/></a></div><div class="Contributors-InfoWrapper"><span class="Contributors-ByText" data-testid="by-text">by</span><a class="Contributors-ContributorName" data-testid="contributor-name" data-discover="true" href="/author/jennifer-lawinski">Jennifer Lawinski</a><span class="Contributors-ContributorTitle" data-testid="contributor-title">, <!-- -->Contributing Writer</span></div></div></div></div></div><div class="ContentPreview LatestFeatured-ContentItem LatestFeatured-ContentItem_left" data-module="content-preview" data-variant="small"><div class="ListPreview"><div class="ListPreview-Container"><div class="ListPreview-ImageWrapper"><a aria-label="Read more about: Figure 9. Chart of survey responses to the question "How has AI/ML improved your SOC operations?" Responses add up to more than 100 percent." data-discover="true" href="/cybersecurity-operations/survey-report-ai-ml-make-soc-better"><div title="Figure 9. Chart of survey responses to the question "How has AI/ML improved your SOC operations?" Responses add up to more than 100 percent."><img data-component="image" class="ListPreview-Image" data-src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/bltb488b813b54f31ab/673e529f3b1c9479ca463efc/tech-ttrendssoc-fig9.png?width=300&auto=webp&quality=80&disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/bltb488b813b54f31ab/673e529f3b1c9479ca463efc/tech-ttrendssoc-fig9.png?width=300&auto=webp&quality=80&disable=upscale" loading="lazy" alt="Figure 9. Chart of survey responses to the question "How has AI/ML improved your SOC operations?" Responses add up to more than 100 percent." title="Figure 9. Chart of survey responses to the question "How has AI/ML improved your SOC operations?" Responses add up to more than 100 percent."/></div></a></div><div class="ListPreview-ContentWrapper"><div class="ListPreview-KeywordWrapper"><a data-component="keyword" class="Keyword Keyword_variant_alternate Keyword_title_cybersecurityOperations ListPreview-Keyword" data-discover="true" href="/cybersecurity-operations">Cybersecurity Operations</a></div><div class="ListPreview-TitleWrapper"><a class="ListPreview-Title" data-testid="preview-default-title" data-discover="true" href="/cybersecurity-operations/survey-report-ai-ml-make-soc-better">It's Near-Unanimous: AI, ML Make the SOC Better</a></div><div class="ListPreview-MobileTitleWrapper"><a class="ListPreview-Title" data-testid="preview-mobile-title" data-discover="true" href="/cybersecurity-operations/survey-report-ai-ml-make-soc-better">It's Near-Unanimous: AI, ML Make the SOC Better</a></div><div class="ListPreview-Footer"><span class="ListPreview-Date" data-testid="list-preview-date">Nov 20, 2024</span><div data-module="card-time" class="CardTime"><span class="CardTime-SeparatorLine">|</span><div data-component="article-read-time" class="ArticleReadTime ArticleReadTime_size_small CardTime-ReadTime"><span>2 Min<!-- --> <!-- -->Read</span></div></div></div></div></div><div class="ListPreview-ContributorsWrapper"><div class="Contributors Contributors_variant_slimline Contributors_cardVariant_small Contributors_hasAvatar" data-component="contributors"><div class="Contributors-AvatarWrapper"><a class="Contributors-AvatarLink" aria-label="Dark Reading Staff" data-discover="true" href="/author/dark-reading-staff"><img aria-hidden="true" data-testid="contributor-avatar" data-component="image" class="Contributors-Avatar" data-src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt99b391f0439c1434/64f179af7de67f4e4300e517/285801_DR23_Graphics_Website_Author_Logo_0.jpg?width=100&auto=webp&quality=80&disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt99b391f0439c1434/64f179af7de67f4e4300e517/285801_DR23_Graphics_Website_Author_Logo_0.jpg?width=100&auto=webp&quality=80&disable=upscale" loading="lazy" alt="Picture of Dark Reading Staff" title="Picture of Dark Reading Staff"/></a></div><div class="Contributors-InfoWrapper"><span class="Contributors-ByText" data-testid="by-text">by</span><a class="Contributors-ContributorName" data-testid="contributor-name" data-discover="true" href="/author/dark-reading-staff">Dark Reading Staff</a><span class="Contributors-ContributorTitle" data-testid="contributor-title">, <!-- -->Dark Reading</span></div></div></div></div></div><div class="ContentPreview LatestFeatured-ContentItem LatestFeatured-ContentItem_left" data-module="content-preview" data-variant="small"><div class="ListPreview"><div class="ListPreview-Container"><div class="ListPreview-ImageWrapper"><a aria-label="Read more about: preying mantis" data-discover="true" href="/cybersecurity-operations/deceptive-framework-defense-mislead-attacking-ai"><div title="preying mantis"><img data-component="image" class="ListPreview-Image" data-src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt51f83c6a1967e8be/67352468b8302e7a69cdc2e7/Valentin_Baciu-preying-mantis-shutterstock.jpg?width=300&auto=webp&quality=80&disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt51f83c6a1967e8be/67352468b8302e7a69cdc2e7/Valentin_Baciu-preying-mantis-shutterstock.jpg?width=300&auto=webp&quality=80&disable=upscale" loading="lazy" alt="preying mantis" title="preying mantis"/></div></a></div><div class="ListPreview-ContentWrapper"><div class="ListPreview-KeywordWrapper"><a data-component="keyword" class="Keyword Keyword_variant_alternate Keyword_title_cybersecurityOperations ListPreview-Keyword" data-discover="true" href="/cybersecurity-operations">Cybersecurity Operations</a></div><div class="ListPreview-TitleWrapper"><a class="ListPreview-Title" data-testid="preview-default-title" data-discover="true" href="/cybersecurity-operations/deceptive-framework-defense-mislead-attacking-ai">AI About-Face: 'Mantis' Turns LLM Attackers Into Prey</a></div><div class="ListPreview-MobileTitleWrapper"><a class="ListPreview-Title" data-testid="preview-mobile-title" data-discover="true" href="/cybersecurity-operations/deceptive-framework-defense-mislead-attacking-ai">AI About-Face: 'Mantis' Turns LLM Attackers Into Prey</a></div><div class="ListPreview-Footer"><span class="ListPreview-Date" data-testid="list-preview-date">Nov 18, 2024</span><div data-module="card-time" class="CardTime"><span class="CardTime-SeparatorLine">|</span><div data-component="article-read-time" class="ArticleReadTime ArticleReadTime_size_small CardTime-ReadTime"><span>5 Min<!-- --> <!-- -->Read</span></div></div></div></div></div><div class="ListPreview-ContributorsWrapper"><div class="Contributors Contributors_variant_slimline Contributors_cardVariant_small Contributors_hasAvatar" data-component="contributors"><div class="Contributors-AvatarWrapper"><a class="Contributors-AvatarLink" aria-label="Robert Lemos, Contributing Writer" data-discover="true" href="/author/robert-lemos"><img aria-hidden="true" data-testid="contributor-avatar" data-component="image" class="Contributors-Avatar" data-src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt28d2c260c33375ea/64f14ff471df6264a382aaa0/Robert-Lemos.png?width=100&auto=webp&quality=80&disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt28d2c260c33375ea/64f14ff471df6264a382aaa0/Robert-Lemos.png?width=100&auto=webp&quality=80&disable=upscale" loading="lazy" alt="Picture of Robert Lemos, Contributing Writer" title="Picture of Robert Lemos, Contributing Writer"/></a></div><div class="Contributors-InfoWrapper"><span class="Contributors-ByText" data-testid="by-text">by</span><a class="Contributors-ContributorName" data-testid="contributor-name" data-discover="true" href="/author/robert-lemos">Robert Lemos, Contributing Writer</a></div></div></div></div></div><div class="ContentPreview LatestFeatured-ContentItem LatestFeatured-ContentItem_left" data-module="content-preview" data-variant="small"><div class="ListPreview"><div class="ListPreview-Container"><div class="ListPreview-ImageWrapper"><a aria-label="Read more about: Concept art of chain formed from glowy blue numbers" data-discover="true" href="/application-security/lessons-from-osc-r-on-protecting-the-software-supply-chain"><div title="Concept art of chain formed from glowy blue numbers"><img data-component="image" class="ListPreview-Image" data-src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt4ac69d7dd44e00e1/67357aa7cc5c0136a87148b9/Chain_Andrey_Kryuchkov_Alamy.jpg?width=300&auto=webp&quality=80&disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt4ac69d7dd44e00e1/67357aa7cc5c0136a87148b9/Chain_Andrey_Kryuchkov_Alamy.jpg?width=300&auto=webp&quality=80&disable=upscale" loading="lazy" alt="Concept art of chain formed from glowy blue numbers" title="Concept art of chain formed from glowy blue numbers"/></div></a></div><div class="ListPreview-ContentWrapper"><div class="ListPreview-KeywordWrapper"><a data-component="keyword" class="Keyword Keyword_variant_alternate Keyword_title_applicationSecurity ListPreview-Keyword" data-discover="true" href="/application-security">Application Security</a></div><div class="ListPreview-TitleWrapper"><a class="ListPreview-Title" data-testid="preview-default-title" data-discover="true" href="/application-security/lessons-from-osc-r-on-protecting-the-software-supply-chain">Lessons From OSC&R on Protecting the Software Supply Chain</a></div><div class="ListPreview-MobileTitleWrapper"><a class="ListPreview-Title" data-testid="preview-mobile-title" data-discover="true" href="/application-security/lessons-from-osc-r-on-protecting-the-software-supply-chain">Lessons From OSC&R on Protecting the Software Supply Chain</a></div><div class="ListPreview-Footer"><span class="ListPreview-Date" data-testid="list-preview-date">Nov 15, 2024</span><div data-module="card-time" class="CardTime"><span class="CardTime-SeparatorLine">|</span><div data-component="article-read-time" class="ArticleReadTime ArticleReadTime_size_small CardTime-ReadTime"><span>5 Min<!-- --> <!-- -->Read</span></div></div></div></div></div><div class="ListPreview-ContributorsWrapper"><div class="Contributors Contributors_variant_slimline Contributors_cardVariant_small Contributors_hasAvatar" data-component="contributors"><div class="Contributors-AvatarWrapper"><a class="Contributors-AvatarLink" aria-label="Neatsun Ziv" data-discover="true" href="/author/neatsun-ziv"><img aria-hidden="true" data-testid="contributor-avatar" data-component="image" class="Contributors-Avatar" data-src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt18fabc8af8a4ebec/660d94dac9baecfd4a406733/Neatsun_Ziv.jpg?width=100&auto=webp&quality=80&disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt18fabc8af8a4ebec/660d94dac9baecfd4a406733/Neatsun_Ziv.jpg?width=100&auto=webp&quality=80&disable=upscale" loading="lazy" alt="Picture of Neatsun Ziv" title="Picture of Neatsun Ziv"/></a></div><div class="Contributors-InfoWrapper"><span class="Contributors-ByText" data-testid="by-text">by</span><a class="Contributors-ContributorName" data-testid="contributor-name" data-discover="true" href="/author/neatsun-ziv">Neatsun Ziv</a><span class="Contributors-ContributorTitle" data-testid="contributor-title">, <!-- -->CEO & Co-Founder, Ox Security</span></div></div></div></div></div><div class="ContentPreview LatestFeatured-ContentItem LatestFeatured-ContentItem_left" data-module="content-preview" data-variant="small"><div class="ListPreview"><div class="ListPreview-Container"><div class="ListPreview-ImageWrapper"><a aria-label="Read more about: Two blue puzzle pieces joining together in a cityscape setting." data-discover="true" href="/endpoint-security/trustwave-cybereason-merger-boost-mdr-portfolio"><div title="Two blue puzzle pieces joining together in a cityscape setting."><img data-component="image" class="ListPreview-Image" data-src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt7e9171327ad49fa7/6735edb4fdb3eab0327e3262/merger-nespix-AdobeStock_172180231CP.jpg?width=300&auto=webp&quality=80&disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt7e9171327ad49fa7/6735edb4fdb3eab0327e3262/merger-nespix-AdobeStock_172180231CP.jpg?width=300&auto=webp&quality=80&disable=upscale" loading="lazy" alt="Two blue puzzle pieces joining together in a cityscape setting." title="Two blue puzzle pieces joining together in a cityscape setting."/></div></a></div><div class="ListPreview-ContentWrapper"><div class="ListPreview-KeywordWrapper"><a data-component="keyword" class="Keyword Keyword_variant_alternate Keyword_title_endpointSecurity ListPreview-Keyword" data-discover="true" href="/endpoint-security">Endpoint Security</a></div><div class="ListPreview-TitleWrapper"><a class="ListPreview-Title" data-testid="preview-default-title" data-discover="true" href="/endpoint-security/trustwave-cybereason-merger-boost-mdr-portfolio">Trustwave-Cybereason Merger Boosts MDR Portfolio</a></div><div class="ListPreview-MobileTitleWrapper"><a class="ListPreview-Title" data-testid="preview-mobile-title" data-discover="true" href="/endpoint-security/trustwave-cybereason-merger-boost-mdr-portfolio">Trustwave-Cybereason Merger Boosts MDR Portfolio</a></div><div class="ListPreview-Footer"><span class="ListPreview-Date" data-testid="list-preview-date">Nov 13, 2024</span><div data-module="card-time" class="CardTime"><span class="CardTime-SeparatorLine">|</span><div data-component="article-read-time" class="ArticleReadTime ArticleReadTime_size_small CardTime-ReadTime"><span>1 Min<!-- --> <!-- -->Read</span></div></div></div></div></div><div class="ListPreview-ContributorsWrapper"><div class="Contributors Contributors_variant_slimline Contributors_cardVariant_small Contributors_hasAvatar" data-component="contributors"><div class="Contributors-AvatarWrapper"><a class="Contributors-AvatarLink" aria-label="Dark Reading Staff" data-discover="true" href="/author/dark-reading-staff"><img aria-hidden="true" data-testid="contributor-avatar" data-component="image" class="Contributors-Avatar" data-src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt99b391f0439c1434/64f179af7de67f4e4300e517/285801_DR23_Graphics_Website_Author_Logo_0.jpg?width=100&auto=webp&quality=80&disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt99b391f0439c1434/64f179af7de67f4e4300e517/285801_DR23_Graphics_Website_Author_Logo_0.jpg?width=100&auto=webp&quality=80&disable=upscale" loading="lazy" alt="Picture of Dark Reading Staff" title="Picture of Dark Reading Staff"/></a></div><div class="Contributors-InfoWrapper"><span class="Contributors-ByText" data-testid="by-text">by</span><a class="Contributors-ContributorName" data-testid="contributor-name" data-discover="true" href="/author/dark-reading-staff">Dark Reading Staff</a><span class="Contributors-ContributorTitle" data-testid="contributor-title">, <!-- -->Dark Reading</span></div></div></div></div></div><div class="ContentPreview LatestFeatured-ContentItem LatestFeatured-ContentItem_left" data-module="content-preview" data-variant="small"><div class="ListPreview"><div class="ListPreview-Container"><div class="ListPreview-ImageWrapper"><a aria-label="Read more about: Silhouettes of people standing next to padlocks in a circle." data-discover="true" href="/identity-access-management-security/crowdstrike-spends-boost-identity-threat-detection"><div title="Silhouettes of people standing next to padlocks in a circle."><img data-component="image" class="ListPreview-Image" data-src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt7ea610a15c2e225b/6706fbc3dd85ad377e33a095/identity-ArtemisDiana-alamy.jpg?width=300&auto=webp&quality=80&disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt7ea610a15c2e225b/6706fbc3dd85ad377e33a095/identity-ArtemisDiana-alamy.jpg?width=300&auto=webp&quality=80&disable=upscale" loading="lazy" alt="Silhouettes of people standing next to padlocks in a circle." title="Silhouettes of people standing next to padlocks in a circle."/></div></a></div><div class="ListPreview-ContentWrapper"><div class="ListPreview-KeywordWrapper"><a data-component="keyword" class="Keyword Keyword_variant_alternate Keyword_title_identityAccessManagementSecurity ListPreview-Keyword" data-discover="true" href="/cybersecurity-operations/identity-access-management-security">Identity & Access Management Security</a></div><div class="ListPreview-TitleWrapper"><a class="ListPreview-Title" data-testid="preview-default-title" data-discover="true" href="/identity-access-management-security/crowdstrike-spends-boost-identity-threat-detection">CrowdStrike Spends to Boost Identity Threat Detection</a></div><div class="ListPreview-MobileTitleWrapper"><a class="ListPreview-Title" data-testid="preview-mobile-title" data-discover="true" href="/identity-access-management-security/crowdstrike-spends-boost-identity-threat-detection">CrowdStrike Spends to Boost Identity Threat Detection</a></div><div class="ListPreview-Footer"><span class="ListPreview-Date" data-testid="list-preview-date">Nov 12, 2024</span><div data-module="card-time" class="CardTime"><span class="CardTime-SeparatorLine">|</span><div data-component="article-read-time" class="ArticleReadTime ArticleReadTime_size_small CardTime-ReadTime"><span>5 Min<!-- --> <!-- -->Read</span></div></div></div></div></div><div class="ListPreview-ContributorsWrapper"><div class="Contributors Contributors_variant_slimline Contributors_cardVariant_small Contributors_hasAvatar" data-component="contributors"><div class="Contributors-AvatarWrapper"><a class="Contributors-AvatarLink" aria-label="Jeffrey Schwartz" data-discover="true" href="/author/jeffrey-schwartz"><img aria-hidden="true" data-testid="contributor-avatar" data-component="image" class="Contributors-Avatar" data-src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blte815fe009d8ac172/64f1536fc3efae477df0ee60/Jeff_Schwartz_headshot-sq.png?width=100&auto=webp&quality=80&disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blte815fe009d8ac172/64f1536fc3efae477df0ee60/Jeff_Schwartz_headshot-sq.png?width=100&auto=webp&quality=80&disable=upscale" loading="lazy" alt="Picture of Jeffrey Schwartz" title="Picture of Jeffrey Schwartz"/></a></div><div class="Contributors-InfoWrapper"><span class="Contributors-ByText" data-testid="by-text">by</span><a class="Contributors-ContributorName" data-testid="contributor-name" data-discover="true" href="/author/jeffrey-schwartz">Jeffrey Schwartz</a><span class="Contributors-ContributorTitle" data-testid="contributor-title">, <!-- -->Contributing Writer</span></div></div></div></div></div></div><a data-testid="list-content-more-content" class="LatestFeatured-Link" data-discover="true" href="/program/dr-technology-articles">READ MORE FROM DR TECHNOLOGY</a></div><div class="LatestFeatured-ColumnList" data-testid="list-content"><p class="LatestFeatured-Title LatestFeatured-Title_right LatestFeatured-Title_withoutAd" data-testid="list-content-title">Emerging Technology</p><div class="LatestFeatured-Content"><div class="ContentPreview LatestFeatured-ContentItem" data-module="content-preview" data-variant="contributor-focused"><div class="ContributorFocusedCard"><div class="ContributorFocusedCard-Wrapper"><div class="ContributorFocusedCard-Body"><a aria-label="Dark Reading Staff" data-discover="true" href="/author/dark-reading-staff"><span class="ContributorFocusedCard-ScreenReaderText">Picture of Dark Reading Staff</span><img aria-hidden="true" data-component="image" class="ContributorFocusedCard-Avatar" data-src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt99b391f0439c1434/64f179af7de67f4e4300e517/285801_DR23_Graphics_Website_Author_Logo_0.jpg?width=150&auto=webp&quality=80&disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt99b391f0439c1434/64f179af7de67f4e4300e517/285801_DR23_Graphics_Website_Author_Logo_0.jpg?width=150&auto=webp&quality=80&disable=upscale" loading="lazy" alt="" title=""/></a></div><div class="ContributorFocusedCard-InfoWrapper"><a class="ContributorFocusedCard-ContributorName" data-discover="true" href="/author/dark-reading-staff">Dark Reading Staff</a><p class="ContributorFocusedCard-ContributorTitle" data-testid="preview-contributor-title">Dark Reading</p></div></div><div class="ContributorFocusedCard-ContentWrapper"><a data-component="keyword" class="Keyword Keyword_variant_alternate Keyword_title_cybersecurityOperations" data-discover="true" href="/cybersecurity-operations">Cybersecurity Operations</a><div class="ContributorFocusedCard-TitleWrapper"><a class="ContributorFocusedCard-Title" data-testid="contributor-focused-card-title" data-discover="true" href="/cybersecurity-operations/untitled">DeepTempo Launches AI-Based Security App for Snowflake</a></div><div class="ContributorFocusedCard-Footer"><span class="ContributorFocusedCard-Date">Nov 20, 2024</span><div data-module="card-time" class="CardTime"><span class="CardTime-SeparatorLine">|</span><div data-component="article-read-time" class="ArticleReadTime ArticleReadTime_size_small CardTime-ReadTime"><span>2 Min<!-- --> <!-- -->Read</span></div></div></div></div></div></div><div class="ContentPreview LatestFeatured-ContentItem" data-module="content-preview" data-variant="contributor-focused"><div class="ContributorFocusedCard"><div class="ContributorFocusedCard-Wrapper"><div class="ContributorFocusedCard-Body"><a aria-label="Dark Reading Staff" data-discover="true" href="/author/dark-reading-staff"><span class="ContributorFocusedCard-ScreenReaderText">Picture of Dark Reading Staff</span><img aria-hidden="true" data-component="image" class="ContributorFocusedCard-Avatar" data-src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt99b391f0439c1434/64f179af7de67f4e4300e517/285801_DR23_Graphics_Website_Author_Logo_0.jpg?width=150&auto=webp&quality=80&disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt99b391f0439c1434/64f179af7de67f4e4300e517/285801_DR23_Graphics_Website_Author_Logo_0.jpg?width=150&auto=webp&quality=80&disable=upscale" loading="lazy" alt="" title=""/></a></div><div class="ContributorFocusedCard-InfoWrapper"><a class="ContributorFocusedCard-ContributorName" data-discover="true" href="/author/dark-reading-staff">Dark Reading Staff</a><p class="ContributorFocusedCard-ContributorTitle" data-testid="preview-contributor-title">Dark Reading</p></div></div><div class="ContributorFocusedCard-ContentWrapper"><a data-component="keyword" class="Keyword Keyword_variant_alternate Keyword_title_cyberRisk" data-discover="true" href="/cyber-risk">Cyber Risk</a><div class="ContributorFocusedCard-TitleWrapper"><a class="ContributorFocusedCard-Title" data-testid="contributor-focused-card-title" data-discover="true" href="/cyber-risk/riig-launches-risk-intelligence-solutions">RIIG Launches With Risk Intelligence Solutions</a></div><div class="ContributorFocusedCard-Footer"><span class="ContributorFocusedCard-Date">Nov 20, 2024</span><div data-module="card-time" class="CardTime"><span class="CardTime-SeparatorLine">|</span><div data-component="article-read-time" class="ArticleReadTime ArticleReadTime_size_small CardTime-ReadTime"><span>1 Min<!-- --> <!-- -->Read</span></div></div></div></div></div></div><div class="ContentPreview LatestFeatured-ContentItem" data-module="content-preview" data-variant="contributor-focused"><div class="ContributorFocusedCard"><div class="ContributorFocusedCard-Wrapper"><div class="ContributorFocusedCard-Body"><a aria-label="Jennifer Lawinski" data-discover="true" href="/author/jennifer-lawinski"><span class="ContributorFocusedCard-ScreenReaderText">Picture of Jennifer Lawinski</span><img aria-hidden="true" data-component="image" class="ContributorFocusedCard-Avatar" data-src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt64edbfe42402bf03/660b3a58f5fc7993e5562490/jennifer-lawinski.jpg?width=150&auto=webp&quality=80&disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt64edbfe42402bf03/660b3a58f5fc7993e5562490/jennifer-lawinski.jpg?width=150&auto=webp&quality=80&disable=upscale" loading="lazy" alt="" title=""/></a></div><div class="ContributorFocusedCard-InfoWrapper"><a class="ContributorFocusedCard-ContributorName" data-discover="true" href="/author/jennifer-lawinski">Jennifer Lawinski</a><p class="ContributorFocusedCard-ContributorTitle" data-testid="preview-contributor-title">Contributing Writer</p></div></div><div class="ContributorFocusedCard-ContentWrapper"><a data-component="keyword" class="Keyword Keyword_variant_alternate Keyword_title_icsOtSecurity" data-discover="true" href="/ics-ot-security">ICS/OT Security</a><div class="ContributorFocusedCard-TitleWrapper"><a class="ContributorFocusedCard-Title" data-testid="contributor-focused-card-title" data-discover="true" href="/ics-ot-security/frenos-takes-home-prize-2024-datatribe-challenge">Frenos Takes Home the Prize at 2024 DataTribe Challenge</a></div><div class="ContributorFocusedCard-Footer"><span class="ContributorFocusedCard-Date">Nov 14, 2024</span><div data-module="card-time" class="CardTime"><span class="CardTime-SeparatorLine">|</span><div data-component="article-read-time" class="ArticleReadTime ArticleReadTime_size_small CardTime-ReadTime"><span>2 Min<!-- --> <!-- -->Read</span></div></div></div></div></div></div><div class="ContentPreview LatestFeatured-ContentItem" data-module="content-preview" data-variant="contributor-focused"><div class="ContributorFocusedCard"><div class="ContributorFocusedCard-Wrapper"><div class="ContributorFocusedCard-Body"><a aria-label="Fahmida Y. Rashid" data-discover="true" href="/author/fahmida-y-rashid"><span class="ContributorFocusedCard-ScreenReaderText">Picture of Fahmida Y. Rashid</span><img aria-hidden="true" data-component="image" class="ContributorFocusedCard-Avatar" data-src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blta4695bcb7a96b293/64f0c7c615ed143d78ad5df7/fahmida.png?width=150&auto=webp&quality=80&disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blta4695bcb7a96b293/64f0c7c615ed143d78ad5df7/fahmida.png?width=150&auto=webp&quality=80&disable=upscale" loading="lazy" alt="" title=""/></a></div><div class="ContributorFocusedCard-InfoWrapper"><a class="ContributorFocusedCard-ContributorName" data-discover="true" href="/author/fahmida-y-rashid">Fahmida Y. Rashid</a><p class="ContributorFocusedCard-ContributorTitle" data-testid="preview-contributor-title">Managing Editor, Features</p></div></div><div class="ContributorFocusedCard-ContentWrapper"><a data-component="keyword" class="Keyword Keyword_variant_alternate Keyword_title_applicationSecurity" data-discover="true" href="/application-security">Application Security</a><div class="ContributorFocusedCard-TitleWrapper"><a class="ContributorFocusedCard-Title" data-testid="contributor-focused-card-title" data-discover="true" href="/application-security/symbiotic-code-security-tool-fix-flaws">Symbiotic Security Launches Scanning Tool to Help Fix Flaws in Code</a></div><div class="ContributorFocusedCard-Footer"><span class="ContributorFocusedCard-Date">Nov 7, 2024</span><div data-module="card-time" class="CardTime"><span class="CardTime-SeparatorLine">|</span><div data-component="article-read-time" class="ArticleReadTime ArticleReadTime_size_small CardTime-ReadTime"><span>2 Min<!-- --> <!-- -->Read</span></div></div></div></div></div></div><div class="ContentPreview LatestFeatured-ContentItem" data-module="content-preview" data-variant="contributor-focused"><div class="ContributorFocusedCard"><div class="ContributorFocusedCard-Wrapper"><div class="ContributorFocusedCard-Body"><a aria-label="Dark Reading Staff" data-discover="true" href="/author/dark-reading-staff"><span class="ContributorFocusedCard-ScreenReaderText">Picture of Dark Reading Staff</span><img aria-hidden="true" data-component="image" class="ContributorFocusedCard-Avatar" data-src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt99b391f0439c1434/64f179af7de67f4e4300e517/285801_DR23_Graphics_Website_Author_Logo_0.jpg?width=150&auto=webp&quality=80&disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt99b391f0439c1434/64f179af7de67f4e4300e517/285801_DR23_Graphics_Website_Author_Logo_0.jpg?width=150&auto=webp&quality=80&disable=upscale" loading="lazy" alt="" title=""/></a></div><div class="ContributorFocusedCard-InfoWrapper"><a class="ContributorFocusedCard-ContributorName" data-discover="true" href="/author/dark-reading-staff">Dark Reading Staff</a><p class="ContributorFocusedCard-ContributorTitle" data-testid="preview-contributor-title">Dark Reading</p></div></div><div class="ContributorFocusedCard-ContentWrapper"><a data-component="keyword" class="Keyword Keyword_variant_alternate Keyword_title_applicationSecurity" data-discover="true" href="/application-security">Application Security</a><div class="ContributorFocusedCard-TitleWrapper"><a class="ContributorFocusedCard-Title" data-testid="contributor-focused-card-title" data-discover="true" href="/application-security/noma-launches-secure-data-ai-lifecycle">Noma Launches With Plans to Secure Data, AI Life Cycle</a></div><div class="ContributorFocusedCard-Footer"><span class="ContributorFocusedCard-Date">Oct 31, 2024</span><div data-module="card-time" class="CardTime"><span class="CardTime-SeparatorLine">|</span><div data-component="article-read-time" class="ArticleReadTime ArticleReadTime_size_small CardTime-ReadTime"><span>1 Min<!-- --> <!-- -->Read</span></div></div></div></div></div></div><div class="ContentPreview LatestFeatured-ContentItem" data-module="content-preview" data-variant="contributor-focused"><div class="ContributorFocusedCard"><div class="ContributorFocusedCard-Wrapper"><div class="ContributorFocusedCard-Body"><a aria-label="Dark Reading Staff" data-discover="true" href="/author/dark-reading-staff"><span class="ContributorFocusedCard-ScreenReaderText">Picture of Dark Reading Staff</span><img aria-hidden="true" data-component="image" class="ContributorFocusedCard-Avatar" data-src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt99b391f0439c1434/64f179af7de67f4e4300e517/285801_DR23_Graphics_Website_Author_Logo_0.jpg?width=150&auto=webp&quality=80&disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt99b391f0439c1434/64f179af7de67f4e4300e517/285801_DR23_Graphics_Website_Author_Logo_0.jpg?width=150&auto=webp&quality=80&disable=upscale" loading="lazy" alt="" title=""/></a></div><div class="ContributorFocusedCard-InfoWrapper"><a class="ContributorFocusedCard-ContributorName" data-discover="true" href="/author/dark-reading-staff">Dark Reading Staff</a><p class="ContributorFocusedCard-ContributorTitle" data-testid="preview-contributor-title">Dark Reading</p></div></div><div class="ContributorFocusedCard-ContentWrapper"><a data-component="keyword" class="Keyword Keyword_variant_alternate Keyword_title_cyberattacksDataBreaches" data-discover="true" href="/cyberattacks-data-breaches">Cyberattacks & Data Breaches</a><div class="ContributorFocusedCard-TitleWrapper"><a class="ContributorFocusedCard-Title" data-testid="contributor-focused-card-title" data-discover="true" href="/cyberattacks-data-breaches/mind-launches-intelligent-dlp-platform">MIND Launches 'Intelligent' DLP Platform</a></div><div class="ContributorFocusedCard-Footer"><span class="ContributorFocusedCard-Date">Oct 31, 2024</span><div data-module="card-time" class="CardTime"><span class="CardTime-SeparatorLine">|</span><div data-component="article-read-time" class="ArticleReadTime ArticleReadTime_size_small CardTime-ReadTime"><span>1 Min<!-- --> <!-- -->Read</span></div></div></div></div></div></div></div><a data-testid="list-content-more-content" class="LatestFeatured-Link LatestFeatured-Link_right" data-discover="true" href="/program/dr-emerging-technology">READ MORE EMERGING TECHNOLOGY</a></div></div></div></div></div></section><footer data-module="footer" class="Footer"><div class="Footer-Background"></div><div data-testid="logo" class="Footer-LogoContainer Footer-LogoContainer_length_2"><a data-discover="true" href="/"><img title="Logo" data-component="image" class="Footer-LogoImage Footer-LogoImage_length_2" data-src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt6aed714e279eeb34/6542104467527c040a9b2014/Logo_-_Dark_Reading.svg?width=700&auto=webp&quality=80&disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt6aed714e279eeb34/6542104467527c040a9b2014/Logo_-_Dark_Reading.svg?width=700&auto=webp&quality=80&disable=upscale" loading="lazy" alt="Logo"/></a></div><div data-testid="LinkSection" class="LinkSection LinkSection_length_2"><h5 class="LinkSection-Title" data-testid="link-section-title">Discover More With Informa Tech</h5><div class="LinkSection-LinksWrapper"><a class="LinkSection-Link" rel="noreferrer" data-discover="true" href="/program/black-hat" target="_blank">Black Hat</a><a class="LinkSection-Link" rel="noreferrer" data-discover="true" href="/program/omdia-cybersecurity" target="_blank">Omdia</a></div></div><div data-testid="LinkSection" class="LinkSection LinkSection_length_2"><h5 class="LinkSection-Title" data-testid="link-section-title">Working With Us</h5><div class="LinkSection-LinksWrapper"><a class="LinkSection-Link" data-discover="true" href="/about-us" target="_self">About Us</a><a class="LinkSection-Link" data-discover="true" href="/advertise" target="_self">Advertise</a><a class="LinkSection-Link" target="_blank" rel="noreferrer" href="https://info.wrightsmedia.com/informa-licensing-reprints-request">Reprints</a></div></div><div data-testid="registration" class="Footer-RegistrationWrapper"><div class="RegistrationSection RegistrationSection_linkSectionLength_2"><h5 class="RegistrationSection-Title">Join Us</h5><div class="Layout-Register Layout-Register_variant_footer"></div><div class="Layout-NewsLetter Layout-NewsLetter_variant_footer"><div data-module="newsletter-signup-promo"><a data-component="button" data-testid="footerNewsletterButton" class="Button Button_size_medium Button_variant_primaryFilled" href="https://dr-resources.darkreading.com/free/w_defa3135/prgm.cgi" target="_blank" rel="nofollow" data-name="subscribe-footer" data-action-type="sign-up"><span class="Button-ContentWrapper">Newsletter Sign-Up</span></a></div></div></div></div><div data-testid="social" class="SocialSection SocialSection_linkSectionLength_2"><h5 class="SocialSection-Title">Follow Us</h5><div data-component="social-share" class="SocialShare SocialShare_variant_layout"><a target="_blank" rel="noreferrer" aria-label="Twitter" href="https://twitter.com/DarkReading"><span class="SocialShare-IconWrapper SocialShare-IconWrapper_variant_layout"><span data-component="icon" data-name="Twitter" class="SocialShare-Icon SocialShare-Icon_variant_layout SocialShare-Icon_type_twitter" style="mask-image:url(/build/_assets/Twitter-WD5AOEQ7.svg);-webkit-mask-image:url(/build/_assets/Twitter-WD5AOEQ7.svg);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain"></span></span></a><a target="_blank" rel="noreferrer" aria-label="Linkedin" href="https://www.linkedin.com/company/dark-reading/"><span class="SocialShare-IconWrapper SocialShare-IconWrapper_variant_layout"><span data-component="icon" data-name="Linkedin" class="SocialShare-Icon SocialShare-Icon_variant_layout SocialShare-Icon_type_linkedin" style="mask-image:url(/build/_assets/Linkedin-VQUF3EEQ.svg);-webkit-mask-image:url(/build/_assets/Linkedin-VQUF3EEQ.svg);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain"></span></span></a><a target="_blank" rel="noreferrer" aria-label="Facebook" href="https://www.facebook.com/darkreadingcom/"><span class="SocialShare-IconWrapper SocialShare-IconWrapper_variant_layout"><span data-component="icon" data-name="Facebook" class="SocialShare-Icon SocialShare-Icon_variant_layout SocialShare-Icon_type_facebook" style="mask-image:url(/build/_assets/Facebook-CJB5G2HY.svg);-webkit-mask-image:url(/build/_assets/Facebook-CJB5G2HY.svg);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain"></span></span></a><a target="_blank" rel="noreferrer" aria-label="Youtube" href="https://www.youtube.com/@DarkReadingOfficialYT"><span class="SocialShare-IconWrapper SocialShare-IconWrapper_variant_layout"><span data-component="icon" data-name="Youtube" class="SocialShare-Icon SocialShare-Icon_variant_layout SocialShare-Icon_type_youtube" style="mask-image:url(/build/_assets/Youtube-S4PSC4UA.svg);-webkit-mask-image:url(/build/_assets/Youtube-S4PSC4UA.svg);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain"></span></span></a><a target="_blank" rel="noreferrer" aria-label="RSS" href="https://www.darkreading.com/rss.xml"><span class="SocialShare-IconWrapper SocialShare-IconWrapper_variant_layout"><span data-component="icon" data-name="RSS" class="SocialShare-Icon SocialShare-Icon_variant_layout SocialShare-Icon_type_rss" style="mask-image:url(/build/_assets/RSS-3XFHIVCK.svg);-webkit-mask-image:url(/build/_assets/RSS-3XFHIVCK.svg);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain"></span></span></a><a target="_blank" rel="noreferrer" aria-label="GoogleNews" href="https://news.google.com/publications/CAAqBwgKMKmknwswtq63Aw?ceid=US:en&oc=3&hl=en-US&gl=US"><span class="SocialShare-IconWrapper SocialShare-IconWrapper_variant_layout"><span data-component="icon" data-name="GoogleNews" class="SocialShare-Icon SocialShare-Icon_variant_layout SocialShare-Icon_type_googleNews" style="mask-image:url(/build/_assets/GoogleNews-6O72APW7.svg);-webkit-mask-image:url(/build/_assets/GoogleNews-6O72APW7.svg);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain"></span></span></a></div></div><div class="CopyrightsSection"><div class="CopyrightsSection-Background"></div><div data-testid="copyrights" class="CopyrightsSection-Wrapper"><a data-testid="businessUnit" class="CopyrightsSection-BusinessLink" target="_blank" href="https://www.informatech.com"><img title="Informa Tech" data-component="image" class="CopyrightsSection-BusinessImage" data-src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blte88e1a0b459f2cef/6500460020e2ed10ea731cb1/InformaTechBTYB_240x60.webp?width=700&auto=webp&quality=80&disable=upscale" src="https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blte88e1a0b459f2cef/6500460020e2ed10ea731cb1/InformaTechBTYB_240x60.webp?width=700&auto=webp&quality=80&disable=upscale" loading="lazy" alt="Informa Tech"/></a><div class="CopyrightsSection-TextWrapper"><p data-testid="copyrightText" class="CopyrightsSection-Text"><span class="CopyrightsSection-TextBlock"></span>Copyright © 2024 Informa PLC Informa UK Limited is a company registered in England and Wales with company number 1072954 whose registered office is 5 Howick Place, London, SW1P 1WG.</p><div data-testid="copyrightLinks" class="CopyrightsSection-LinksWrapper CopyrightsSection-LinksWrapper_hasLinks"><a class="CopyrightsSection-Link" rel="noreferrer" target="_blank" href="https://www.informatech.com/">Home<span class="CopyrightsSection-LinkSeparator">|</span></a><a class="CopyrightsSection-Link" rel="noreferrer" data-discover="true" href="/cookie-policy" target="_blank">Cookie Policy<span class="CopyrightsSection-LinkSeparator">|</span></a><a class="CopyrightsSection-Link" rel="noreferrer" target="_blank" href="https://www.informa.com/privacy-policy/">Privacy<span class="CopyrightsSection-LinkSeparator">|</span></a><a class="CopyrightsSection-Link" rel="noreferrer" target="_blank" href="https://www.informatech.com/terms-and-conditions/">Terms of Use</a></div></div></div></div></footer></div></div></main><script>((STORAGE_KEY, restoreKey) => { if (!window.history.state || !window.history.state.key) { let key = Math.random().toString(32).slice(2); window.history.replaceState({ key }, ""); } try { let positions = JSON.parse(sessionStorage.getItem(STORAGE_KEY) || "{}"); let storedY = positions[restoreKey || window.history.state.key]; if (typeof storedY === "number") { window.scrollTo(0, storedY); } } catch (error) { console.error(error); sessionStorage.removeItem(STORAGE_KEY); } })("positions", null)</script><link rel="modulepreload" href="/build/manifest-A2F38A42.js"/><link rel="modulepreload" href="/build/entry.client-SFHSSSEN.js"/><link rel="modulepreload" href="/build/_shared/chunk-RVHE4U6B.js"/><link rel="modulepreload" href="/build/_shared/chunk-SJXV5VAW.js"/><link rel="modulepreload" href="/build/_shared/chunk-63EVRDSK.js"/><link rel="modulepreload" href="/build/_shared/chunk-ADMCF34Z.js"/><link rel="modulepreload" href="/build/_shared/chunk-QLNIWV7P.js"/><link rel="modulepreload" href="/build/_shared/chunk-VAILQJN5.js"/><link rel="modulepreload" href="/build/_shared/chunk-RZRUW7QG.js"/><link rel="modulepreload" href="/build/_shared/chunk-3MIG7PUI.js"/><link rel="modulepreload" href="/build/_shared/chunk-B7M2L5OV.js"/><link rel="modulepreload" href="/build/_shared/chunk-JWYSME77.js"/><link rel="modulepreload" href="/build/_shared/chunk-JRHR4PP4.js"/><link rel="modulepreload" href="/build/_shared/chunk-WTDTITBY.js"/><link rel="modulepreload" href="/build/_shared/chunk-VZQVWFLO.js"/><link rel="modulepreload" href="/build/_shared/chunk-4PCUPHYO.js"/><link rel="modulepreload" href="/build/_shared/chunk-JERMOH2I.js"/><link rel="modulepreload" href="/build/_shared/chunk-265XATAY.js"/><link rel="modulepreload" href="/build/_shared/chunk-5JUJG2OP.js"/><link rel="modulepreload" href="/build/_shared/chunk-BC6KZFPP.js"/><link rel="modulepreload" href="/build/_shared/chunk-QVUW3IXO.js"/><link rel="modulepreload" href="/build/_shared/chunk-ALTNKHHR.js"/><link rel="modulepreload" href="/build/_shared/chunk-HMGGHMSJ.js"/><link rel="modulepreload" href="/build/_shared/chunk-IW54JVOH.js"/><link rel="modulepreload" href="/build/root-TPDAOOC5.js"/><link rel="modulepreload" href="/build/_shared/chunk-B7N643NL.js"/><link rel="modulepreload" href="/build/_shared/chunk-ED7QE4BI.js"/><link rel="modulepreload" href="/build/_shared/chunk-TMZP7SNL.js"/><link rel="modulepreload" href="/build/_shared/chunk-OSADQMDF.js"/><link rel="modulepreload" href="/build/_shared/chunk-JM7IRZAX.js"/><link rel="modulepreload" href="/build/_shared/chunk-7IHSV4VV.js"/><link rel="modulepreload" href="/build/_shared/chunk-PLHCH5TH.js"/><link rel="modulepreload" href="/build/_shared/chunk-3NMSOMAP.js"/><link rel="modulepreload" href="/build/_shared/chunk-WGLVXOTX.js"/><link rel="modulepreload" href="/build/_shared/chunk-WXVEBWE3.js"/><link rel="modulepreload" href="/build/_shared/chunk-7WX3BG7O.js"/><link rel="modulepreload" href="/build/_shared/chunk-LHFD2AZM.js"/><link rel="modulepreload" href="/build/_shared/chunk-S6Q7UVRU.js"/><link rel="modulepreload" href="/build/_shared/chunk-2Q3IQPTU.js"/><link rel="modulepreload" href="/build/_shared/chunk-B765HE7O.js"/><link rel="modulepreload" href="/build/_shared/chunk-4DPVJM62.js"/><link rel="modulepreload" href="/build/_shared/chunk-PHSYQFSR.js"/><link rel="modulepreload" href="/build/_shared/chunk-GGO4FWBQ.js"/><link rel="modulepreload" href="/build/_shared/chunk-N3DN6AS5.js"/><link rel="modulepreload" href="/build/_shared/chunk-IJ353W5V.js"/><link rel="modulepreload" href="/build/_shared/chunk-C5UGRRW5.js"/><link rel="modulepreload" href="/build/_shared/chunk-KNORYGJC.js"/><link rel="modulepreload" href="/build/_shared/chunk-TDM4RAGW.js"/><link rel="modulepreload" href="/build/routes/program.$slug-YSGWY6HN.js"/><script>window.__remixContext = {"future":{"v3_fetcherPersist":false,"v3_relativeSplatPath":false,"v3_throwAbortReason":false},"state":{"loaderData":{"root":{"brand":"darkreading","authenticationStatus":"anonymous","siteName":"Dark Reading","ads":{"networkId":3834,"parentAdUnit":"darkreading.home","enabledAds":"all","checkClientIP":false,"disableSponsorBar":true},"authConfig":{"enabled":false,"disableCaptcha":false},"isDctsTurnOn":false,"oneTrust":{"siteId":"4b083961-e2ac-4755-8801-f7c83a5fb187"},"gtmIds":{"primary":"GTM-5523ZCM","secondary":"GTM-WB8Q7XR"},"pageContent":{"registrationText":"Learn about New Cybersecurity Threats, Vulnerabilities and Technology Trends."},"ui":{"brand":"darkreading","theme":"theme1","font":{"primary":{"name":"Inter","url":"https://fonts.googleapis.com/css2?family=Inter:wght@100;200;300;400;500;600;700;800;900\u0026display=swap"},"secondary":{"name":"Inter","url":"https://fonts.googleapis.com/css2?family=Inter:wght@100;200;300;400;500;600;700;800;900\u0026display=swap"}}},"environment":"prod","featureToggles":{"elnNewsletter":false,"elnWithoutNewsletter":false,"iirisAuthentication":false,"subBrand":false,"useSettingsRedirectAPIVersion1":false,"gatingEnabled":false,"iirisRecommendationDisabled":false,"iasPetEnabled":true,"bridgedMediaEnabled":true,"ecommerceEnabled":false,"iirisRecommendationVer":"version4","weather3MonthForecastEnabled":false,"legacyHomepage":false},"layout":{"socialLinks":[{"type":"Twitter","url":"https://twitter.com/DarkReading"},{"type":"Linkedin","url":"https://www.linkedin.com/company/dark-reading/"},{"type":"Facebook","url":"https://www.facebook.com/darkreadingcom/"},{"type":"Youtube","url":"https://www.youtube.com/@DarkReadingOfficialYT"},{"type":"RSS","url":"https://www.darkreading.com/rss.xml"},{"type":"GoogleNews","url":"https://news.google.com/publications/CAAqBwgKMKmknwswtq63Aw?ceid=US:en\u0026oc=3\u0026hl=en-US\u0026gl=US"}],"informaBar":{"enabled":true,"leftSection":{"description":"Dark Reading is part of the Informa Tech Division of Informa PLC","subMenu":[{"title":"Informa PLC","url":"https://www.informa.com/"},{"title":"ABOUT US","url":"https://www.informa.com/about-us/"},{"title":"INVESTOR RELATIONS","url":"https://www.informa.com/investors/"},{"title":"TALENT","url":"https://www.informa.com/talent/"}]},"rightSection":{"description":"This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales and Scotlan. Number 8860726."}},"nav":{"mainMenuItems":[{"title":"Cybersecurity Topics","url":"","seeAllLink":"","seeAllLinkUrl":"","hasSubMenu":true,"subMenu":[{"title":"Application Security","url":"/application-security"},{"title":"Cybersecurity Careers","url":"/cybersecurity-operations/cybersecurity-careers"},{"title":"Cloud Security","url":"/cloud-security"},{"title":"Cyber Risk","url":"/cyber-risk"},{"title":"Cyberattacks \u0026 Data Breaches","url":"/cyberattacks-data-breaches"},{"title":"Cybersecurity Analytics","url":"/cybersecurity-analytics"},{"title":"Cybersecurity Operations","url":"/cybersecurity-operations"},{"title":"Data Privacy","url":"/cyber-risk/data-privacy"},{"title":"Endpoint Security","url":"/endpoint-security"},{"title":"ICS/OT Security","url":"/ics-ot-security"},{"title":"Identity \u0026 Access Mgmt Security","url":"/cybersecurity-operations/identity-access-management-security"},{"title":"Insider Threats","url":"/vulnerabilities-threats/insider-threats"},{"title":"IoT","url":"/ics-ot-security/iot"},{"title":"Mobile Security","url":"/endpoint-security/mobile-security"},{"title":"Perimeter","url":"/cybersecurity-operations/perimeter"},{"title":"Physical Security","url":"/cybersecurity-operations/physical-security"},{"title":"Remote Workforce","url":"/endpoint-security/remote-workforce"},{"title":"Threat Intelligence","url":"/threat-intelligence"},{"title":"Vulnerabilities \u0026 Threats","url":"/vulnerabilities-threats"}],"recentContents":[]},{"title":"World ","url":"/program/dr-global","seeAllLink":"See All","seeAllLinkUrl":"/program/dr-global","hasSubMenu":true,"subMenu":[{"title":"DR Global","url":"/program/dr-global"},{"title":"Middle East \u0026 Africa","url":"/keyword/middle-east-africa"},{"title":"Asia Pacific","url":"/keyword/asia-pacific"}],"recentContents":[]},{"title":"The Edge","url":"/program/the-edge","seeAllLink":"","seeAllLinkUrl":"/program/the-edge","hasSubMenu":false,"subMenu":[],"recentContents":[]},{"title":"DR Technology","url":"/program/dr-technology","seeAllLink":"","seeAllLinkUrl":"/program/dr-technology","hasSubMenu":false,"subMenu":[],"recentContents":[]},{"title":"Events","url":"/events","seeAllLink":"SEE ALL","seeAllLinkUrl":"/events","hasSubMenu":true,"subMenu":[{"title":"Upcoming Events","url":"/events"},{"title":"Podcasts","url":"/podcasts"},{"title":"Webinars","url":"/resources?types=Webinar"}],"recentContents":[]},{"title":"Resources","url":"/resources","seeAllLink":"SEE ALL","seeAllLinkUrl":"/resources","hasSubMenu":true,"subMenu":[{"title":"Library","url":"/resources"},{"title":"Newsletters","url":"https://dr-resources.darkreading.com/free/w_defa3135/prgm.cgi"},{"title":"Podcasts","url":"/podcasts"},{"title":"Reports","url":"/resources?types=Report"},{"title":"Videos","url":"/videos"},{"title":"Webinars","url":"/resources?types=Webinar"},{"title":"Whitepapers","url":"/resources?types=Whitepaper"},{"title":" ","url":" "},{"title":" ","url":" "},{"title":" ","url":" "},{"title":" ","url":" "},{"title":"Partner Perspectives","url":"/keyword/partner-perspectives"}],"recentContents":[]}],"secondaryMenu":[{"title":"Black Hat News","url":"/program/black-hat"},{"title":"Omdia Cybersecurity","url":"/program/omdia-cybersecurity"},{"title":"Advertise","url":"https://reg.darkreading.com/media-kit?kcode=drsitehd"}]},"megaMenu":{"largeMenu":[{"title":"Cybersecurity Topics","url":"","subMenu":[{"title":"Application Security","url":"/application-security"},{"title":"Cybersecurity Careers","url":"/cybersecurity-operations/cybersecurity-careers"},{"title":"Cloud Security","url":"/cloud-security"},{"title":"Cyber Risk","url":"/cyber-risk"},{"title":"Cyberattacks \u0026 Data Breaches","url":"/cyberattacks-data-breaches"},{"title":"Cybersecurity Analytics","url":"/cybersecurity-analytics"},{"title":"Cybersecurity Operations","url":"/cybersecurity-operations"},{"title":"Data Privacy","url":"/cyber-risk/data-privacy"},{"title":"Endpoint Security","url":"/endpoint-security"},{"title":"ICS/OT Security","url":"/ics-ot-security"},{"title":"Identity \u0026 Access Mgmt Security","url":"/cybersecurity-operations/identity-access-management-security"},{"title":"Insider Threats","url":"/vulnerabilities-threats/insider-threats"},{"title":"IoT","url":"/ics-ot-security/iot"},{"title":"Mobile Security","url":"/endpoint-security/mobile-security"},{"title":"Perimeter","url":"/cybersecurity-operations/perimeter"},{"title":"Physical Security","url":"/cybersecurity-operations/physical-security"},{"title":"Remote Workforce","url":"/endpoint-security/remote-workforce"},{"title":"Threat Intelligence","url":"/threat-intelligence"},{"title":"Vulnerabilities \u0026 Threats","url":"/vulnerabilities-threats"}],"seeAllLink":"","seeAllLinkUrl":""},{"title":"World ","url":"/program/dr-global","subMenu":[{"title":"DR Global","url":"/program/dr-global"},{"title":"Middle East \u0026 Africa","url":"/keyword/middle-east-africa"},{"title":"Asia Pacific","url":"/keyword/asia-pacific"}],"seeAllLink":"See All","seeAllLinkUrl":"/program/dr-global"},{"title":"The Edge","url":"/program/the-edge","subMenu":[],"seeAllLink":"","seeAllLinkUrl":"/program/the-edge"},{"title":"DR Technology","url":"/program/dr-technology","subMenu":[],"seeAllLink":"","seeAllLinkUrl":"/program/dr-technology"},{"title":"Events","url":"/events","subMenu":[{"title":"Upcoming Events","url":"/events"},{"title":"Podcasts","url":"/podcasts"},{"title":"Webinars","url":"/resources?types=Webinar"}],"seeAllLink":"SEE ALL","seeAllLinkUrl":"/events"},{"title":"Resources","url":"/resources","subMenu":[{"title":"Library","url":"/resources"},{"title":"Newsletters","url":"https://dr-resources.darkreading.com/free/w_defa3135/prgm.cgi"},{"title":"Podcasts","url":"/podcasts"},{"title":"Reports","url":"/resources?types=Report"},{"title":"Videos","url":"/videos"},{"title":"Webinars","url":"/resources?types=Webinar"},{"title":"Whitepapers","url":"/resources?types=Whitepaper"},{"title":" ","url":" "},{"title":" ","url":" "},{"title":" ","url":" "},{"title":" ","url":" "},{"title":"Partner Perspectives","url":"/keyword/partner-perspectives"}],"seeAllLink":"SEE ALL","seeAllLinkUrl":"/resources"}],"smallMenu":[{"title":"Resources","url":"","subMenu":[]},{"title":"More","url":"","subMenu":[{"title":"About Us","url":"/about-us"},{"title":"Advertise With Us","url":"/advertise"},{"title":"Submissions","url":"/cyberattacks-data-breaches/how-to-submit-a-column-to-dark-reading"}]}],"sideNavSections":[]},"navBase":{"logo":{"url":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blte9ead971f13c662e/65437029846d7c040a6e588d/Logo_-_Dark_Reading.svg","altText":"Dark Reading Logo"}},"footer":{"logo":{"url":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt6aed714e279eeb34/6542104467527c040a9b2014/Logo_-_Dark_Reading.svg","altText":"Logo"},"linkSections":[{"links":[{"image":{"altText":"","url":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt39752b9f502ed723/65004ef460832757db397d3a/Dark_Reading_Logo_Stacked_K.png"},"openInNewTab":true,"title":"Black Hat","url":"/program/black-hat"},{"image":{"altText":"","url":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt39752b9f502ed723/65004ef460832757db397d3a/Dark_Reading_Logo_Stacked_K.png"},"openInNewTab":true,"title":"Omdia","url":"/program/omdia-cybersecurity"}],"title":"Discover More With Informa Tech","type":"1"},{"links":[{"image":{"altText":"","url":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt64bc80c1cc860f0e/64ff3af37434dc8f904db946/Dark_Reading_Logo_0_200px.png"},"openInNewTab":false,"title":"About Us","url":"/about-us"},{"image":{"altText":"","url":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt9a23e12b46e10b76/64ff3b08f7b4013e16a3d26a/Dark_Reading_Logo_0_200px.png"},"openInNewTab":false,"title":"Advertise","url":"/advertise"},{"image":{"altText":"","url":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt7b65ada713568986/64ff3bd1abb8d8128a7762bd/Dark_Reading_Logo_0_200px.png"},"openInNewTab":true,"title":"Reprints","url":"https://info.wrightsmedia.com/informa-licensing-reprints-request"}],"title":"Working With Us","type":"1"}],"brandLinks":[],"copyright":{"businessUnit":{"url":"https://www.informatech.com","name":"Informa Tech","logoUrl":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blte88e1a0b459f2cef/6500460020e2ed10ea731cb1/InformaTechBTYB_240x60.webp"},"links":[{"image":{"altText":"Home","url":"https://www.informatech.com/"},"openInNewTab":true,"title":"Home","url":"https://www.informatech.com/"},{"image":{"altText":"Cookie Policy","url":"/cookie-policy"},"openInNewTab":true,"title":"Cookie Policy","url":"/cookie-policy"},{"image":{"altText":"Privacy","url":"https://www.informa.com/privacy-policy/"},"openInNewTab":true,"title":"Privacy","url":"https://www.informa.com/privacy-policy/"},{"image":{"altText":"Terms of Use","url":"https://www.informatech.com/terms-and-conditions/"},"openInNewTab":true,"title":"Terms of Use","url":"https://www.informatech.com/terms-and-conditions/"}],"title":" Informa PLC Informa UK Limited is a company registered in England and Wales with company number 1072954 whose registered office is 5 Howick Place, London, SW1P 1WG."}},"isSponsorBarEnabled":true,"isPaidContent":false},"newRelicJs":"window.NREUM||(NREUM={});NREUM.init={distributed_tracing:{enabled:true},privacy:{cookies_enabled:true},ajax:{deny_list:[\"bam.eu01.nr-data.net\"]}};\n\n;NREUM.loader_config={accountID:\"3936348\",trustKey:\"3288925\",agentID:\"538600199\",licenseKey:\"NRJS-26ae6a3b09493bbcc87\",applicationID:\"538600199\"};\n;NREUM.info={beacon:\"bam.eu01.nr-data.net\",errorBeacon:\"bam.eu01.nr-data.net\",licenseKey:\"NRJS-26ae6a3b09493bbcc87\",applicationID:\"538600199\",sa:1};\n;/*! For license information please see nr-loader-spa-1.274.0.min.js.LICENSE.txt */\n(()=\u003e{var e,t,r={8122:(e,t,r)=\u003e{\"use strict\";r.d(t,{a:()=\u003ei});var n=r(944);function i(e,t){try{if(!e||\"object\"!=typeof e)return(0,n.R)(3);if(!t||\"object\"!=typeof t)return(0,n.R)(4);const r=Object.create(Object.getPrototypeOf(t),Object.getOwnPropertyDescriptors(t)),o=0===Object.keys(r).length?e:r;for(let a in o)if(void 0!==e[a])try{if(null===e[a]){r[a]=null;continue}Array.isArray(e[a])\u0026\u0026Array.isArray(t[a])?r[a]=Array.from(new Set([...e[a],...t[a]])):\"object\"==typeof e[a]\u0026\u0026\"object\"==typeof t[a]?r[a]=i(e[a],t[a]):r[a]=e[a]}catch(e){(0,n.R)(1,e)}return r}catch(e){(0,n.R)(2,e)}}},2555:(e,t,r)=\u003e{\"use strict\";r.d(t,{Vp:()=\u003ec,fn:()=\u003es,x1:()=\u003eu});var n=r(384),i=r(8122);const o={beacon:n.NT.beacon,errorBeacon:n.NT.errorBeacon,licenseKey:void 0,applicationID:void 0,sa:void 0,queueTime:void 0,applicationTime:void 0,ttGuid:void 0,user:void 0,account:void 0,product:void 0,extra:void 0,jsAttributes:{},userAttributes:void 0,atts:void 0,transactionName:void 0,tNamePlain:void 0},a={};function s(e){try{const t=c(e);return!!t.licenseKey\u0026\u0026!!t.errorBeacon\u0026\u0026!!t.applicationID}catch(e){return!1}}function c(e){if(!e)throw new Error(\"All info objects require an agent identifier!\");if(!a[e])throw new Error(\"Info for \".concat(e,\" was never set\"));return a[e]}function u(e,t){if(!e)throw new Error(\"All info objects require an agent identifier!\");a[e]=(0,i.a)(t,o);const r=(0,n.nY)(e);r\u0026\u0026(r.info=a[e])}},9417:(e,t,r)=\u003e{\"use strict\";r.d(t,{D0:()=\u003eh,gD:()=\u003eg,xN:()=\u003ep});var n=r(993);const i=e=\u003e{if(!e||\"string\"!=typeof e)return!1;try{document.createDocumentFragment().querySelector(e)}catch{return!1}return!0};var o=r(2614),a=r(944),s=r(384),c=r(8122);const u=\"[data-nr-mask]\",d=()=\u003e{const e={mask_selector:\"*\",block_selector:\"[data-nr-block]\",mask_input_options:{color:!1,date:!1,\"datetime-local\":!1,email:!1,month:!1,number:!1,range:!1,search:!1,tel:!1,text:!1,time:!1,url:!1,week:!1,textarea:!1,select:!1,password:!0}};return{ajax:{deny_list:void 0,block_internal:!0,enabled:!0,harvestTimeSeconds:10,autoStart:!0},distributed_tracing:{enabled:void 0,exclude_newrelic_header:void 0,cors_use_newrelic_header:void 0,cors_use_tracecontext_headers:void 0,allowed_origins:void 0},feature_flags:[],generic_events:{enabled:!0,harvestTimeSeconds:30,autoStart:!0},harvest:{tooManyRequestsDelay:60},jserrors:{enabled:!0,harvestTimeSeconds:10,autoStart:!0},logging:{enabled:!0,harvestTimeSeconds:10,autoStart:!0,level:n.p_.INFO},metrics:{enabled:!0,autoStart:!0},obfuscate:void 0,page_action:{enabled:!0},page_view_event:{enabled:!0,autoStart:!0},page_view_timing:{enabled:!0,harvestTimeSeconds:30,autoStart:!0},performance:{capture_marks:!1,capture_measures:!1},privacy:{cookies_enabled:!0},proxy:{assets:void 0,beacon:void 0},session:{expiresMs:o.wk,inactiveMs:o.BB},session_replay:{autoStart:!0,enabled:!1,harvestTimeSeconds:60,preload:!1,sampling_rate:10,error_sampling_rate:100,collect_fonts:!1,inline_images:!1,fix_stylesheets:!0,mask_all_inputs:!0,get mask_text_selector(){return e.mask_selector},set mask_text_selector(t){i(t)?e.mask_selector=\"\".concat(t,\",\").concat(u):\"\"===t||null===t?e.mask_selector=u:(0,a.R)(5,t)},get block_class(){return\"nr-block\"},get ignore_class(){return\"nr-ignore\"},get mask_text_class(){return\"nr-mask\"},get block_selector(){return e.block_selector},set block_selector(t){i(t)?e.block_selector+=\",\".concat(t):\"\"!==t\u0026\u0026(0,a.R)(6,t)},get mask_input_options(){return e.mask_input_options},set mask_input_options(t){t\u0026\u0026\"object\"==typeof t?e.mask_input_options={...t,password:!0}:(0,a.R)(7,t)}},session_trace:{enabled:!0,harvestTimeSeconds:10,autoStart:!0},soft_navigations:{enabled:!0,harvestTimeSeconds:10,autoStart:!0},spa:{enabled:!0,harvestTimeSeconds:10,autoStart:!0},ssl:void 0,user_actions:{enabled:!0}}},l={},f=\"All configuration objects require an agent identifier!\";function h(e){if(!e)throw new Error(f);if(!l[e])throw new Error(\"Configuration for \".concat(e,\" was never set\"));return l[e]}function p(e,t){if(!e)throw new Error(f);l[e]=(0,c.a)(t,d());const r=(0,s.nY)(e);r\u0026\u0026(r.init=l[e])}function g(e,t){if(!e)throw new Error(f);var r=h(e);if(r){for(var n=t.split(\".\"),i=0;i\u003cn.length-1;i++)if(\"object\"!=typeof(r=r[n[i]]))return;r=r[n[n.length-1]]}return r}},5603:(e,t,r)=\u003e{\"use strict\";r.d(t,{a:()=\u003ec,o:()=\u003es});var n=r(384),i=r(8122);const o={accountID:void 0,trustKey:void 0,agentID:void 0,licenseKey:void 0,applicationID:void 0,xpid:void 0},a={};function s(e){if(!e)throw new Error(\"All loader-config objects require an agent identifier!\");if(!a[e])throw new Error(\"LoaderConfig for \".concat(e,\" was never set\"));return a[e]}function c(e,t){if(!e)throw new Error(\"All loader-config objects require an agent identifier!\");a[e]=(0,i.a)(t,o);const r=(0,n.nY)(e);r\u0026\u0026(r.loader_config=a[e])}},3371:(e,t,r)=\u003e{\"use strict\";r.d(t,{V:()=\u003ef,f:()=\u003el});var n=r(8122),i=r(384),o=r(6154),a=r(9324);let s=0;const c={buildEnv:a.F3,distMethod:a.Xs,version:a.xv,originTime:o.WN},u={customTransaction:void 0,disabled:!1,isolatedBacklog:!1,loaderType:void 0,maxBytes:3e4,onerror:void 0,ptid:void 0,releaseIds:{},appMetadata:{},session:void 0,denyList:void 0,timeKeeper:void 0,obfuscator:void 0},d={};function l(e){if(!e)throw new Error(\"All runtime objects require an agent identifier!\");if(!d[e])throw new Error(\"Runtime for \".concat(e,\" was never set\"));return d[e]}function f(e,t){if(!e)throw new Error(\"All runtime objects require an agent identifier!\");d[e]={...(0,n.a)(t,u),...c},Object.hasOwnProperty.call(d[e],\"harvestCount\")||Object.defineProperty(d[e],\"harvestCount\",{get:()=\u003e++s});const r=(0,i.nY)(e);r\u0026\u0026(r.runtime=d[e])}},9324:(e,t,r)=\u003e{\"use strict\";r.d(t,{F3:()=\u003ei,Xs:()=\u003eo,Yq:()=\u003ea,xv:()=\u003en});const n=\"1.274.0\",i=\"PROD\",o=\"CDN\",a=\"^2.0.0-alpha.17\"},6154:(e,t,r)=\u003e{\"use strict\";r.d(t,{A4:()=\u003es,OF:()=\u003ed,RI:()=\u003ei,WN:()=\u003eh,bv:()=\u003eo,gm:()=\u003ea,lR:()=\u003ef,m:()=\u003eu,mw:()=\u003ec,sb:()=\u003el});var n=r(1863);const i=\"undefined\"!=typeof window\u0026\u0026!!window.document,o=\"undefined\"!=typeof WorkerGlobalScope\u0026\u0026(\"undefined\"!=typeof self\u0026\u0026self instanceof WorkerGlobalScope\u0026\u0026self.navigator instanceof WorkerNavigator||\"undefined\"!=typeof globalThis\u0026\u0026globalThis instanceof WorkerGlobalScope\u0026\u0026globalThis.navigator instanceof WorkerNavigator),a=i?window:\"undefined\"!=typeof WorkerGlobalScope\u0026\u0026(\"undefined\"!=typeof self\u0026\u0026self instanceof WorkerGlobalScope\u0026\u0026self||\"undefined\"!=typeof globalThis\u0026\u0026globalThis instanceof WorkerGlobalScope\u0026\u0026globalThis),s=\"complete\"===a?.document?.readyState,c=Boolean(\"hidden\"===a?.document?.visibilityState),u=\"\"+a?.location,d=/iPad|iPhone|iPod/.test(a.navigator?.userAgent),l=d\u0026\u0026\"undefined\"==typeof SharedWorker,f=(()=\u003e{const e=a.navigator?.userAgent?.match(/Firefox[/\\s](\\d+\\.\\d+)/);return Array.isArray(e)\u0026\u0026e.length\u003e=2?+e[1]:0})(),h=Date.now()-(0,n.t)()},7295:(e,t,r)=\u003e{\"use strict\";r.d(t,{Xv:()=\u003ea,gX:()=\u003ei,iW:()=\u003eo});var n=[];function i(e){if(!e||o(e))return!1;if(0===n.length)return!0;for(var t=0;t\u003cn.length;t++){var r=n[t];if(\"*\"===r.hostname)return!1;if(s(r.hostname,e.hostname)\u0026\u0026c(r.pathname,e.pathname))return!1}return!0}function o(e){return void 0===e.hostname}function a(e){if(n=[],e\u0026\u0026e.length)for(var t=0;t\u003ce.length;t++){let r=e[t];if(!r)continue;0===r.indexOf(\"http://\")?r=r.substring(7):0===r.indexOf(\"https://\")\u0026\u0026(r=r.substring(8));const i=r.indexOf(\"/\");let o,a;i\u003e0?(o=r.substring(0,i),a=r.substring(i)):(o=r,a=\"\");let[s]=o.split(\":\");n.push({hostname:s,pathname:a})}}function s(e,t){return!(e.length\u003et.length)\u0026\u0026t.indexOf(e)===t.length-e.length}function c(e,t){return 0===e.indexOf(\"/\")\u0026\u0026(e=e.substring(1)),0===t.indexOf(\"/\")\u0026\u0026(t=t.substring(1)),\"\"===e||e===t}},1687:(e,t,r)=\u003e{\"use strict\";r.d(t,{Ak:()=\u003ec,Ze:()=\u003el,x3:()=\u003eu});var n=r(7836),i=r(3606),o=r(860),a=r(2646);const s={};function c(e,t){const r={staged:!1,priority:o.P3[t]||0};d(e),s[e].get(t)||s[e].set(t,r)}function u(e,t){e\u0026\u0026s[e]\u0026\u0026(s[e].get(t)\u0026\u0026s[e].delete(t),h(e,t,!1),s[e].size\u0026\u0026f(e))}function d(e){if(!e)throw new Error(\"agentIdentifier required\");s[e]||(s[e]=new Map)}function l(e=\"\",t=\"feature\",r=!1){if(d(e),!e||!s[e].get(t)||r)return h(e,t);s[e].get(t).staged=!0,f(e)}function f(e){const t=Array.from(s[e]);t.every((([e,t])=\u003et.staged))\u0026\u0026(t.sort(((e,t)=\u003ee[1].priority-t[1].priority)),t.forEach((([t])=\u003e{s[e].delete(t),h(e,t)})))}function h(e,t,r=!0){const o=e?n.ee.get(e):n.ee,s=i.i.handlers;if(!o.aborted\u0026\u0026o.backlog\u0026\u0026s){if(r){const e=o.backlog[t],r=s[t];if(r){for(let t=0;e\u0026\u0026t\u003ce.length;++t)p(e[t],r);Object.entries(r).forEach((([e,t])=\u003e{Object.values(t||{}).forEach((t=\u003e{t[0]?.on\u0026\u0026t[0]?.context()instanceof a.y\u0026\u0026t[0].on(e,t[1])}))}))}}o.isolatedBacklog||delete s[t],o.backlog[t]=null,o.emit(\"drain-\"+t,[])}}function p(e,t){var r=e[1];Object.values(t[r]||{}).forEach((t=\u003e{var r=e[0];if(t[0]===r){var n=t[1],i=e[3],o=e[2];n.apply(i,o)}}))}},7836:(e,t,r)=\u003e{\"use strict\";r.d(t,{P:()=\u003ec,ee:()=\u003eu});var n=r(384),i=r(8990),o=r(3371),a=r(2646),s=r(5607);const c=\"nr@context:\".concat(s.W),u=function e(t,r){var n={},s={},d={},l=!1;try{l=16===r.length\u0026\u0026(0,o.f)(r).isolatedBacklog}catch(e){}var f={on:p,addEventListener:p,removeEventListener:function(e,t){var r=n[e];if(!r)return;for(var i=0;i\u003cr.length;i++)r[i]===t\u0026\u0026r.splice(i,1)},emit:function(e,r,n,i,o){!1!==o\u0026\u0026(o=!0);if(u.aborted\u0026\u0026!i)return;t\u0026\u0026o\u0026\u0026t.emit(e,r,n);for(var a=h(n),c=g(e),d=c.length,l=0;l\u003cd;l++)c[l].apply(a,r);var p=v()[s[e]];p\u0026\u0026p.push([f,e,r,a]);return a},get:m,listeners:g,context:h,buffer:function(e,t){const r=v();if(t=t||\"feature\",f.aborted)return;Object.entries(e||{}).forEach((([e,n])=\u003e{s[n]=t,t in r||(r[t]=[])}))},abort:function(){f._aborted=!0,Object.keys(f.backlog).forEach((e=\u003e{delete f.backlog[e]}))},isBuffering:function(e){return!!v()[s[e]]},debugId:r,backlog:l?{}:t\u0026\u0026\"object\"==typeof t.backlog?t.backlog:{},isolatedBacklog:l};return Object.defineProperty(f,\"aborted\",{get:()=\u003e{let e=f._aborted||!1;return e||(t\u0026\u0026(e=t.aborted),e)}}),f;function h(e){return e\u0026\u0026e instanceof a.y?e:e?(0,i.I)(e,c,(()=\u003enew a.y(c))):new a.y(c)}function p(e,t){n[e]=g(e).concat(t)}function g(e){return n[e]||[]}function m(t){return d[t]=d[t]||e(f,t)}function v(){return f.backlog}}(void 0,\"globalEE\"),d=(0,n.Zm)();d.ee||(d.ee=u)},2646:(e,t,r)=\u003e{\"use strict\";r.d(t,{y:()=\u003en});class n{constructor(e){this.contextId=e}}},9908:(e,t,r)=\u003e{\"use strict\";r.d(t,{d:()=\u003en,p:()=\u003ei});var n=r(7836).ee.get(\"handle\");function i(e,t,r,i,o){o?(o.buffer([e],i),o.emit(e,t,r)):(n.buffer([e],i),n.emit(e,t,r))}},3606:(e,t,r)=\u003e{\"use strict\";r.d(t,{i:()=\u003eo});var n=r(9908);o.on=a;var i=o.handlers={};function o(e,t,r,o){a(o||n.d,i,e,t,r)}function a(e,t,r,i,o){o||(o=\"feature\"),e||(e=n.d);var a=t[o]=t[o]||{};(a[r]=a[r]||[]).push([e,i])}},3878:(e,t,r)=\u003e{\"use strict\";function n(e,t){return{capture:e,passive:!1,signal:t}}function i(e,t,r=!1,i){window.addEventListener(e,t,n(r,i))}function o(e,t,r=!1,i){document.addEventListener(e,t,n(r,i))}r.d(t,{DD:()=\u003eo,jT:()=\u003en,sp:()=\u003ei})},5607:(e,t,r)=\u003e{\"use strict\";r.d(t,{W:()=\u003en});const n=(0,r(9566).bz)()},9566:(e,t,r)=\u003e{\"use strict\";r.d(t,{LA:()=\u003es,ZF:()=\u003ec,bz:()=\u003ea,el:()=\u003eu});var n=r(6154);const i=\"xxxxxxxx-xxxx-4xxx-yxxx-xxxxxxxxxxxx\";function o(e,t){return e?15\u0026e[t]:16*Math.random()|0}function a(){const e=n.gm?.crypto||n.gm?.msCrypto;let t,r=0;return e\u0026\u0026e.getRandomValues\u0026\u0026(t=e.getRandomValues(new Uint8Array(30))),i.split(\"\").map((e=\u003e\"x\"===e?o(t,r++).toString(16):\"y\"===e?(3\u0026o()|8).toString(16):e)).join(\"\")}function s(e){const t=n.gm?.crypto||n.gm?.msCrypto;let r,i=0;t\u0026\u0026t.getRandomValues\u0026\u0026(r=t.getRandomValues(new Uint8Array(e)));const a=[];for(var s=0;s\u003ce;s++)a.push(o(r,i++).toString(16));return a.join(\"\")}function c(){return s(16)}function u(){return s(32)}},2614:(e,t,r)=\u003e{\"use strict\";r.d(t,{BB:()=\u003ea,H3:()=\u003en,g:()=\u003eu,iL:()=\u003ec,tS:()=\u003es,uh:()=\u003ei,wk:()=\u003eo});const n=\"NRBA\",i=\"SESSION\",o=144e5,a=18e5,s={STARTED:\"session-started\",PAUSE:\"session-pause\",RESET:\"session-reset\",RESUME:\"session-resume\",UPDATE:\"session-update\"},c={SAME_TAB:\"same-tab\",CROSS_TAB:\"cross-tab\"},u={OFF:0,FULL:1,ERROR:2}},1863:(e,t,r)=\u003e{\"use strict\";function n(){return Math.floor(performance.now())}r.d(t,{t:()=\u003en})},7485:(e,t,r)=\u003e{\"use strict\";r.d(t,{D:()=\u003ei});var n=r(6154);function i(e){if(0===(e||\"\").indexOf(\"data:\"))return{protocol:\"data\"};try{const t=new URL(e,location.href),r={port:t.port,hostname:t.hostname,pathname:t.pathname,search:t.search,protocol:t.protocol.slice(0,t.protocol.indexOf(\":\")),sameOrigin:t.protocol===n.gm?.location?.protocol\u0026\u0026t.host===n.gm?.location?.host};return r.port\u0026\u0026\"\"!==r.port||(\"http:\"===t.protocol\u0026\u0026(r.port=\"80\"),\"https:\"===t.protocol\u0026\u0026(r.port=\"443\")),r.pathname\u0026\u0026\"\"!==r.pathname?r.pathname.startsWith(\"/\")||(r.pathname=\"/\".concat(r.pathname)):r.pathname=\"/\",r}catch(e){return{}}}},944:(e,t,r)=\u003e{\"use strict\";function n(e,t){\"function\"==typeof console.debug\u0026\u0026console.debug(\"New Relic Warning: https://github.com/newrelic/newrelic-browser-agent/blob/main/docs/warning-codes.md#\".concat(e),t)}r.d(t,{R:()=\u003en})},5284:(e,t,r)=\u003e{\"use strict\";r.d(t,{t:()=\u003ec,B:()=\u003es});var n=r(7836),i=r(6154);const o=\"newrelic\";const a=new Set,s={};function c(e,t){const r=n.ee.get(t);s[t]??={},e\u0026\u0026\"object\"==typeof e\u0026\u0026(a.has(t)||(r.emit(\"rumresp\",[e]),s[t]=e,a.add(t),function(e={}){try{i.gm.dispatchEvent(new CustomEvent(o,{detail:e}))}catch(e){}}({loaded:!0})))}},8990:(e,t,r)=\u003e{\"use strict\";r.d(t,{I:()=\u003ei});var n=Object.prototype.hasOwnProperty;function i(e,t,r){if(n.call(e,t))return e[t];var i=r();if(Object.defineProperty\u0026\u0026Object.keys)try{return Object.defineProperty(e,t,{value:i,writable:!0,enumerable:!1}),i}catch(e){}return e[t]=i,i}},6389:(e,t,r)=\u003e{\"use strict\";function n(e,t=500,r={}){const n=r?.leading||!1;let i;return(...r)=\u003e{n\u0026\u0026void 0===i\u0026\u0026(e.apply(this,r),i=setTimeout((()=\u003e{i=clearTimeout(i)}),t)),n||(clearTimeout(i),i=setTimeout((()=\u003e{e.apply(this,r)}),t))}}function i(e){let t=!1;return(...r)=\u003e{t||(t=!0,e.apply(this,r))}}r.d(t,{J:()=\u003ei,s:()=\u003en})},3304:(e,t,r)=\u003e{\"use strict\";r.d(t,{A:()=\u003eo});var n=r(7836);const i=()=\u003e{const e=new WeakSet;return(t,r)=\u003e{if(\"object\"==typeof r\u0026\u0026null!==r){if(e.has(r))return;e.add(r)}return r}};function o(e){try{return JSON.stringify(e,i())??\"\"}catch(e){try{n.ee.emit(\"internal-error\",[e])}catch(e){}return\"\"}}},5289:(e,t,r)=\u003e{\"use strict\";r.d(t,{GG:()=\u003eo,sB:()=\u003ea});var n=r(3878);function i(){return\"undefined\"==typeof document||\"complete\"===document.readyState}function o(e,t){if(i())return e();(0,n.sp)(\"load\",e,t)}function a(e){if(i())return e();(0,n.DD)(\"DOMContentLoaded\",e)}},384:(e,t,r)=\u003e{\"use strict\";r.d(t,{NT:()=\u003eo,US:()=\u003ed,Zm:()=\u003ea,bQ:()=\u003ec,dV:()=\u003es,nY:()=\u003eu,pV:()=\u003el});var n=r(6154),i=r(1863);const o={beacon:\"bam.nr-data.net\",errorBeacon:\"bam.nr-data.net\"};function a(){return n.gm.NREUM||(n.gm.NREUM={}),void 0===n.gm.newrelic\u0026\u0026(n.gm.newrelic=n.gm.NREUM),n.gm.NREUM}function s(){let e=a();return e.o||(e.o={ST:n.gm.setTimeout,SI:n.gm.setImmediate,CT:n.gm.clearTimeout,XHR:n.gm.XMLHttpRequest,REQ:n.gm.Request,EV:n.gm.Event,PR:n.gm.Promise,MO:n.gm.MutationObserver,FETCH:n.gm.fetch,WS:n.gm.WebSocket}),e}function c(e,t){let r=a();r.initializedAgents??={},t.initializedAt={ms:(0,i.t)(),date:new Date},r.initializedAgents[e]=t}function u(e){let t=a();return t.initializedAgents?.[e]}function d(e,t){a()[e]=t}function l(){return function(){let e=a();const t=e.info||{};e.info={beacon:o.beacon,errorBeacon:o.errorBeacon,...t}}(),function(){let e=a();const t=e.init||{};e.init={...t}}(),s(),function(){let e=a();const t=e.loader_config||{};e.loader_config={...t}}(),a()}},2843:(e,t,r)=\u003e{\"use strict\";r.d(t,{u:()=\u003ei});var n=r(3878);function i(e,t=!1,r,i){(0,n.DD)(\"visibilitychange\",(function(){if(t)return void(\"hidden\"===document.visibilityState\u0026\u0026e());e(document.visibilityState)}),r,i)}},8139:(e,t,r)=\u003e{\"use strict\";r.d(t,{u:()=\u003ef});var n=r(7836),i=r(3434),o=r(8990),a=r(6154);const s={},c=a.gm.XMLHttpRequest,u=\"addEventListener\",d=\"removeEventListener\",l=\"nr@wrapped:\".concat(n.P);function f(e){var t=function(e){return(e||n.ee).get(\"events\")}(e);if(s[t.debugId]++)return t;s[t.debugId]=1;var r=(0,i.YM)(t,!0);function f(e){r.inPlace(e,[u,d],\"-\",p)}function p(e,t){return e[1]}return\"getPrototypeOf\"in Object\u0026\u0026(a.RI\u0026\u0026h(document,f),h(a.gm,f),h(c.prototype,f)),t.on(u+\"-start\",(function(e,t){var n=e[1];if(null!==n\u0026\u0026(\"function\"==typeof n||\"object\"==typeof n)){var i=(0,o.I)(n,l,(function(){var e={object:function(){if(\"function\"!=typeof n.handleEvent)return;return n.handleEvent.apply(n,arguments)},function:n}[typeof n];return e?r(e,\"fn-\",null,e.name||\"anonymous\"):n}));this.wrapped=e[1]=i}})),t.on(d+\"-start\",(function(e){e[1]=this.wrapped||e[1]})),t}function h(e,t,...r){let n=e;for(;\"object\"==typeof n\u0026\u0026!Object.prototype.hasOwnProperty.call(n,u);)n=Object.getPrototypeOf(n);n\u0026\u0026t(n,...r)}},3434:(e,t,r)=\u003e{\"use strict\";r.d(t,{Jt:()=\u003eo,YM:()=\u003ec});var n=r(7836),i=r(5607);const o=\"nr@original:\".concat(i.W);var a=Object.prototype.hasOwnProperty,s=!1;function c(e,t){return e||(e=n.ee),r.inPlace=function(e,t,n,i,o){n||(n=\"\");const a=\"-\"===n.charAt(0);for(let s=0;s\u003ct.length;s++){const c=t[s],u=e[c];d(u)||(e[c]=r(u,a?c+n:n,i,c,o))}},r.flag=o,r;function r(t,r,n,s,c){return d(t)?t:(r||(r=\"\"),nrWrapper[o]=t,function(e,t,r){if(Object.defineProperty\u0026\u0026Object.keys)try{return Object.keys(e).forEach((function(r){Object.defineProperty(t,r,{get:function(){return e[r]},set:function(t){return e[r]=t,t}})})),t}catch(e){u([e],r)}for(var n in e)a.call(e,n)\u0026\u0026(t[n]=e[n])}(t,nrWrapper,e),nrWrapper);function nrWrapper(){var o,a,d,l;try{a=this,o=[...arguments],d=\"function\"==typeof n?n(o,a):n||{}}catch(t){u([t,\"\",[o,a,s],d],e)}i(r+\"start\",[o,a,s],d,c);try{return l=t.apply(a,o)}catch(e){throw i(r+\"err\",[o,a,e],d,c),e}finally{i(r+\"end\",[o,a,l],d,c)}}}function i(r,n,i,o){if(!s||t){var a=s;s=!0;try{e.emit(r,n,i,t,o)}catch(t){u([t,r,n,i],e)}s=a}}}function u(e,t){t||(t=n.ee);try{t.emit(\"internal-error\",e)}catch(e){}}function d(e){return!(e\u0026\u0026\"function\"==typeof e\u0026\u0026e.apply\u0026\u0026!e[o])}},9300:(e,t,r)=\u003e{\"use strict\";r.d(t,{T:()=\u003en});const n=r(860).K7.ajax},3333:(e,t,r)=\u003e{\"use strict\";r.d(t,{TZ:()=\u003en,Zp:()=\u003ei,mq:()=\u003es,nf:()=\u003ea,qN:()=\u003eo});const n=r(860).K7.genericEvents,i=[\"auxclick\",\"click\",\"copy\",\"keydown\",\"paste\",\"scrollend\"],o=[\"focus\",\"blur\"],a=4,s=1e3},6774:(e,t,r)=\u003e{\"use strict\";r.d(t,{T:()=\u003en});const n=r(860).K7.jserrors},993:(e,t,r)=\u003e{\"use strict\";r.d(t,{ET:()=\u003eo,TZ:()=\u003ea,p_:()=\u003ei});var n=r(860);const i={ERROR:\"ERROR\",WARN:\"WARN\",INFO:\"INFO\",DEBUG:\"DEBUG\",TRACE:\"TRACE\"},o=\"log\",a=n.K7.logging},3785:(e,t,r)=\u003e{\"use strict\";r.d(t,{R:()=\u003ec,b:()=\u003eu});var n=r(9908),i=r(1863),o=r(860),a=r(3969),s=r(993);function c(e,t,r={},c=s.p_.INFO){(0,n.p)(a.xV,[\"API/logging/\".concat(c.toLowerCase(),\"/called\")],void 0,o.K7.metrics,e),(0,n.p)(s.ET,[(0,i.t)(),t,r,c],void 0,o.K7.logging,e)}function u(e){return\"string\"==typeof e\u0026\u0026Object.values(s.p_).some((t=\u003et===e.toUpperCase().trim()))}},3969:(e,t,r)=\u003e{\"use strict\";r.d(t,{TZ:()=\u003en,XG:()=\u003es,rs:()=\u003ei,xV:()=\u003ea,z_:()=\u003eo});const n=r(860).K7.metrics,i=\"sm\",o=\"cm\",a=\"storeSupportabilityMetrics\",s=\"storeEventMetrics\"},6630:(e,t,r)=\u003e{\"use strict\";r.d(t,{T:()=\u003en});const n=r(860).K7.pageViewEvent},782:(e,t,r)=\u003e{\"use strict\";r.d(t,{T:()=\u003en});const n=r(860).K7.pageViewTiming},6344:(e,t,r)=\u003e{\"use strict\";r.d(t,{BB:()=\u003ed,G4:()=\u003eo,Qb:()=\u003el,TZ:()=\u003ei,Ug:()=\u003ea,_s:()=\u003es,bc:()=\u003eu,yP:()=\u003ec});var n=r(2614);const i=r(860).K7.sessionReplay,o={RECORD:\"recordReplay\",PAUSE:\"pauseReplay\",REPLAY_RUNNING:\"replayRunning\",ERROR_DURING_REPLAY:\"errorDuringReplay\"},a=.12,s={DomContentLoaded:0,Load:1,FullSnapshot:2,IncrementalSnapshot:3,Meta:4,Custom:5},c={[n.g.ERROR]:15e3,[n.g.FULL]:3e5,[n.g.OFF]:0},u={RESET:{message:\"Session was reset\",sm:\"Reset\"},IMPORT:{message:\"Recorder failed to import\",sm:\"Import\"},TOO_MANY:{message:\"429: Too Many Requests\",sm:\"Too-Many\"},TOO_BIG:{message:\"Payload was too large\",sm:\"Too-Big\"},CROSS_TAB:{message:\"Session Entity was set to OFF on another tab\",sm:\"Cross-Tab\"},ENTITLEMENTS:{message:\"Session Replay is not allowed and will not be started\",sm:\"Entitlement\"}},d=5e3,l={API:\"api\"}},5270:(e,t,r)=\u003e{\"use strict\";r.d(t,{Aw:()=\u003ec,CT:()=\u003eu,SR:()=\u003es});var n=r(384),i=r(9417),o=r(7767),a=r(6154);function s(e){return!!(0,n.dV)().o.MO\u0026\u0026(0,o.V)(e)\u0026\u0026!0===(0,i.gD)(e,\"session_trace.enabled\")}function c(e){return!0===(0,i.gD)(e,\"session_replay.preload\")\u0026\u0026s(e)}function u(e,t){const r=t.correctAbsoluteTimestamp(e);return{originalTimestamp:e,correctedTimestamp:r,timestampDiff:e-r,originTime:a.WN,correctedOriginTime:t.correctedOriginTime,originTimeDiff:Math.floor(a.WN-t.correctedOriginTime)}}},3738:(e,t,r)=\u003e{\"use strict\";r.d(t,{He:()=\u003ei,Kp:()=\u003es,Lc:()=\u003eu,Rz:()=\u003ed,TZ:()=\u003en,bD:()=\u003eo,d3:()=\u003ea,jx:()=\u003el,uP:()=\u003ec});const n=r(860).K7.sessionTrace,i=\"bstResource\",o=\"resource\",a=\"-start\",s=\"-end\",c=\"fn\"+a,u=\"fn\"+s,d=\"pushState\",l=1e3},3962:(e,t,r)=\u003e{\"use strict\";r.d(t,{AM:()=\u003eo,O2:()=\u003es,Qu:()=\u003ec,TZ:()=\u003ea,ih:()=\u003eu,tC:()=\u003ei});var n=r(860);const i=[\"click\",\"keydown\",\"submit\"],o=\"api\",a=n.K7.softNav,s={INITIAL_PAGE_LOAD:\"\",ROUTE_CHANGE:1,UNSPECIFIED:2},c={INTERACTION:1,AJAX:2,CUSTOM_END:3,CUSTOM_TRACER:4},u={IP:\"in progress\",FIN:\"finished\",CAN:\"cancelled\"}},7378:(e,t,r)=\u003e{\"use strict\";r.d(t,{$p:()=\u003ex,BR:()=\u003eb,Kp:()=\u003eR,L3:()=\u003ey,Lc:()=\u003ec,NC:()=\u003eo,SG:()=\u003ed,TZ:()=\u003ei,U6:()=\u003ep,UT:()=\u003em,d3:()=\u003ew,dT:()=\u003ef,e5:()=\u003eA,gx:()=\u003ev,l9:()=\u003el,oW:()=\u003eh,op:()=\u003eg,rw:()=\u003eu,tH:()=\u003eE,uP:()=\u003es,wW:()=\u003eT,xq:()=\u003ea});var n=r(384);const i=r(860).K7.spa,o=[\"click\",\"submit\",\"keypress\",\"keydown\",\"keyup\",\"change\"],a=999,s=\"fn-start\",c=\"fn-end\",u=\"cb-start\",d=\"api-ixn-\",l=\"remaining\",f=\"interaction\",h=\"spaNode\",p=\"jsonpNode\",g=\"fetch-start\",m=\"fetch-done\",v=\"fetch-body-\",b=\"jsonp-end\",y=(0,n.dV)().o.ST,w=\"-start\",R=\"-end\",x=\"-body\",T=\"cb\"+R,A=\"jsTime\",E=\"fetch\"},4234:(e,t,r)=\u003e{\"use strict\";r.d(t,{W:()=\u003eo});var n=r(7836),i=r(1687);class o{constructor(e,t){this.agentIdentifier=e,this.ee=n.ee.get(e),this.featureName=t,this.blocked=!1}deregisterDrain(){(0,i.x3)(this.agentIdentifier,this.featureName)}}},7767:(e,t,r)=\u003e{\"use strict\";r.d(t,{V:()=\u003eo});var n=r(9417),i=r(6154);const o=e=\u003ei.RI\u0026\u0026!0===(0,n.gD)(e,\"privacy.cookies_enabled\")},425:(e,t,r)=\u003e{\"use strict\";r.d(t,{j:()=\u003ej});var n=r(860),i=r(2555),o=r(3371),a=r(9908),s=r(7836),c=r(1687),u=r(5289),d=r(6154),l=r(944),f=r(3969),h=r(384),p=r(6344);const g=[\"setErrorHandler\",\"finished\",\"addToTrace\",\"addRelease\",\"addPageAction\",\"setCurrentRouteName\",\"setPageViewName\",\"setCustomAttribute\",\"interaction\",\"noticeError\",\"setUserId\",\"setApplicationVersion\",\"start\",p.G4.RECORD,p.G4.PAUSE,\"log\",\"wrapLogger\"],m=[\"setErrorHandler\",\"finished\",\"addToTrace\",\"addRelease\"];var v=r(1863),b=r(2614),y=r(993),w=r(3785),R=r(2646),x=r(3434);function T(e,t,r,n){if(\"object\"!=typeof t||!t||\"string\"!=typeof r||!r||\"function\"!=typeof t[r])return(0,l.R)(29);const i=function(e){return(e||s.ee).get(\"logger\")}(e),o=(0,x.YM)(i),a=new R.y(s.P);return a.level=n.level,a.customAttributes=n.customAttributes,o.inPlace(t,[r],\"wrap-logger-\",a),i}function A(){const e=(0,h.pV)();g.forEach((t=\u003e{e[t]=(...r)=\u003efunction(t,...r){let n=[];return Object.values(e.initializedAgents).forEach((e=\u003e{e\u0026\u0026e.api?e.exposed\u0026\u0026e.api[t]\u0026\u0026n.push(e.api[t](...r)):(0,l.R)(38,t)})),n.length\u003e1?n:n[0]}(t,...r)}))}const E={};var S=r(9417),N=r(5603),O=r(5284);const _=e=\u003e{const t=e.startsWith(\"http\");e+=\"/\",r.p=t?e:\"https://\"+e};let I=!1;function j(e,t={},g,R){let{init:x,info:j,loader_config:P,runtime:C={},exposed:k=!0}=t;C.loaderType=g;const L=(0,h.pV)();j||(x=L.init,j=L.info,P=L.loader_config),(0,S.xN)(e.agentIdentifier,x||{}),(0,N.a)(e.agentIdentifier,P||{}),j.jsAttributes??={},d.bv\u0026\u0026(j.jsAttributes.isWorker=!0),(0,i.x1)(e.agentIdentifier,j);const H=(0,S.D0)(e.agentIdentifier),D=[j.beacon,j.errorBeacon];I||(H.proxy.assets\u0026\u0026(_(H.proxy.assets),D.push(H.proxy.assets)),H.proxy.beacon\u0026\u0026D.push(H.proxy.beacon),A(),(0,h.US)(\"activatedFeatures\",O.B),e.runSoftNavOverSpa\u0026\u0026=!0===H.soft_navigations.enabled\u0026\u0026H.feature_flags.includes(\"soft_nav\")),C.denyList=[...H.ajax.deny_list||[],...H.ajax.block_internal?D:[]],C.ptid=e.agentIdentifier,(0,o.V)(e.agentIdentifier,C),e.ee=s.ee.get(e.agentIdentifier),void 0===e.api\u0026\u0026(e.api=function(e,t,h=!1){t||(0,c.Ak)(e,\"api\");const g={};var R=s.ee.get(e),x=R.get(\"tracer\");E[e]=b.g.OFF,R.on(p.G4.REPLAY_RUNNING,(t=\u003e{E[e]=t}));var A=\"api-\",S=A+\"ixn-\";function N(t,r,n,o){const a=(0,i.Vp)(e);return null===r?delete a.jsAttributes[t]:(0,i.x1)(e,{...a,jsAttributes:{...a.jsAttributes,[t]:r}}),I(A,n,!0,o||null===r?\"session\":void 0)(t,r)}function O(){}g.log=function(e,{customAttributes:t={},level:r=y.p_.INFO}={}){(0,a.p)(f.xV,[\"API/log/called\"],void 0,n.K7.metrics,R),(0,w.R)(R,e,t,r)},g.wrapLogger=(e,t,{customAttributes:r={},level:i=y.p_.INFO}={})=\u003e{(0,a.p)(f.xV,[\"API/wrapLogger/called\"],void 0,n.K7.metrics,R),T(R,e,t,{customAttributes:r,level:i})},m.forEach((e=\u003e{g[e]=I(A,e,!0,\"api\")})),g.addPageAction=I(A,\"addPageAction\",!0,n.K7.genericEvents),g.setPageViewName=function(t,r){if(\"string\"==typeof t)return\"/\"!==t.charAt(0)\u0026\u0026(t=\"/\"+t),(0,o.f)(e).customTransaction=(r||\"http://custom.transaction\")+t,I(A,\"setPageViewName\",!0)()},g.setCustomAttribute=function(e,t,r=!1){if(\"string\"==typeof e){if([\"string\",\"number\",\"boolean\"].includes(typeof t)||null===t)return N(e,t,\"setCustomAttribute\",r);(0,l.R)(40,typeof t)}else(0,l.R)(39,typeof e)},g.setUserId=function(e){if(\"string\"==typeof e||null===e)return N(\"enduser.id\",e,\"setUserId\",!0);(0,l.R)(41,typeof e)},g.setApplicationVersion=function(e){if(\"string\"==typeof e||null===e)return N(\"application.version\",e,\"setApplicationVersion\",!1);(0,l.R)(42,typeof e)},g.start=()=\u003e{try{(0,a.p)(f.xV,[\"API/start/called\"],void 0,n.K7.metrics,R),R.emit(\"manual-start-all\")}catch(e){(0,l.R)(23,e)}},g[p.G4.RECORD]=function(){(0,a.p)(f.xV,[\"API/recordReplay/called\"],void 0,n.K7.metrics,R),(0,a.p)(p.G4.RECORD,[],void 0,n.K7.sessionReplay,R)},g[p.G4.PAUSE]=function(){(0,a.p)(f.xV,[\"API/pauseReplay/called\"],void 0,n.K7.metrics,R),(0,a.p)(p.G4.PAUSE,[],void 0,n.K7.sessionReplay,R)},g.interaction=function(e){return(new O).get(\"object\"==typeof e?e:{})};const _=O.prototype={createTracer:function(e,t){var r={},i=this,o=\"function\"==typeof t;return(0,a.p)(f.xV,[\"API/createTracer/called\"],void 0,n.K7.metrics,R),h||(0,a.p)(S+\"tracer\",[(0,v.t)(),e,r],i,n.K7.spa,R),function(){if(x.emit((o?\"\":\"no-\")+\"fn-start\",[(0,v.t)(),i,o],r),o)try{return t.apply(this,arguments)}catch(e){const t=\"string\"==typeof e?new Error(e):e;throw x.emit(\"fn-err\",[arguments,this,t],r),t}finally{x.emit(\"fn-end\",[(0,v.t)()],r)}}}};function I(e,t,r,i){return function(){return(0,a.p)(f.xV,[\"API/\"+t+\"/called\"],void 0,n.K7.metrics,R),i\u0026\u0026(0,a.p)(e+t,[(0,v.t)(),...arguments],r?null:this,i,R),r?void 0:this}}function j(){r.e(478).then(r.bind(r,8778)).then((({setAPI:t})=\u003e{t(e),(0,c.Ze)(e,\"api\")})).catch((e=\u003e{(0,l.R)(27,e),R.abort()}))}return[\"actionText\",\"setName\",\"setAttribute\",\"save\",\"ignore\",\"onEnd\",\"getContext\",\"end\",\"get\"].forEach((e=\u003e{_[e]=I(S,e,void 0,h?n.K7.softNav:n.K7.spa)})),g.setCurrentRouteName=h?I(S,\"routeName\",void 0,n.K7.softNav):I(A,\"routeName\",!0,n.K7.spa),g.noticeError=function(t,r){\"string\"==typeof t\u0026\u0026(t=new Error(t)),(0,a.p)(f.xV,[\"API/noticeError/called\"],void 0,n.K7.metrics,R),(0,a.p)(\"err\",[t,(0,v.t)(),!1,r,!!E[e]],void 0,n.K7.jserrors,R)},d.RI?(0,u.GG)((()=\u003ej()),!0):j(),g}(e.agentIdentifier,R,e.runSoftNavOverSpa)),void 0===e.exposed\u0026\u0026(e.exposed=k),I=!0}},8374:(e,t,r)=\u003e{r.nc=(()=\u003e{try{return document?.currentScript?.nonce}catch(e){}return\"\"})()},860:(e,t,r)=\u003e{\"use strict\";r.d(t,{$J:()=\u003eo,K7:()=\u003en,P3:()=\u003ei});const n={ajax:\"ajax\",genericEvents:\"generic_events\",jserrors:\"jserrors\",logging:\"logging\",metrics:\"metrics\",pageAction:\"page_action\",pageViewEvent:\"page_view_event\",pageViewTiming:\"page_view_timing\",sessionReplay:\"session_replay\",sessionTrace:\"session_trace\",softNav:\"soft_navigations\",spa:\"spa\"},i={[n.pageViewEvent]:1,[n.pageViewTiming]:2,[n.metrics]:3,[n.jserrors]:4,[n.spa]:5,[n.ajax]:6,[n.sessionTrace]:7,[n.softNav]:8,[n.sessionReplay]:9,[n.logging]:10,[n.genericEvents]:11},o={[n.pageViewTiming]:\"events\",[n.ajax]:\"events\",[n.spa]:\"events\",[n.softNav]:\"events\",[n.metrics]:\"jserrors\",[n.jserrors]:\"jserrors\",[n.sessionTrace]:\"browser/blobs\",[n.sessionReplay]:\"browser/blobs\",[n.logging]:\"browser/logs\",[n.genericEvents]:\"ins\"}}},n={};function i(e){var t=n[e];if(void 0!==t)return t.exports;var o=n[e]={exports:{}};return r[e](o,o.exports,i),o.exports}i.m=r,i.d=(e,t)=\u003e{for(var r in t)i.o(t,r)\u0026\u0026!i.o(e,r)\u0026\u0026Object.defineProperty(e,r,{enumerable:!0,get:t[r]})},i.f={},i.e=e=\u003ePromise.all(Object.keys(i.f).reduce(((t,r)=\u003e(i.f[r](e,t),t)),[])),i.u=e=\u003e({212:\"nr-spa-compressor\",249:\"nr-spa-recorder\",478:\"nr-spa\"}[e]+\"-1.274.0.min.js\"),i.o=(e,t)=\u003eObject.prototype.hasOwnProperty.call(e,t),e={},t=\"NRBA-1.274.0.PROD:\",i.l=(r,n,o,a)=\u003e{if(e[r])e[r].push(n);else{var s,c;if(void 0!==o)for(var u=document.getElementsByTagName(\"script\"),d=0;d\u003cu.length;d++){var l=u[d];if(l.getAttribute(\"src\")==r||l.getAttribute(\"data-webpack\")==t+o){s=l;break}}if(!s){c=!0;var f={478:\"sha512-1vUqEfJPB8Pihje9mv5CfYgkitO1FWcS+UQb84DbXqP8oYctRv4/lzl/MzNLPlRhcY1WVDBGL20I8vm6s2VV7g==\",249:\"sha512-Y/BeZAh6VSTmUtUNmS5XdyKxL92s30Fyyj8xVW76HSPxcKItL4+x2+kGMZc8pMJnUpZDz1L4eftZQAJh3D8NnA==\",212:\"sha512-Gn2tQ3qog5Yhrx/gRutkSTYPp+7nkKFt4/mIXg99LxcNpMDAYJZDBYmAACdoHNM86+iq1F3cBcQotFNzjIX8bw==\"};(s=document.createElement(\"script\")).charset=\"utf-8\",s.timeout=120,i.nc\u0026\u0026s.setAttribute(\"nonce\",i.nc),s.setAttribute(\"data-webpack\",t+o),s.src=r,0!==s.src.indexOf(window.location.origin+\"/\")\u0026\u0026(s.crossOrigin=\"anonymous\"),f[a]\u0026\u0026(s.integrity=f[a])}e[r]=[n];var h=(t,n)=\u003e{s.onerror=s.onload=null,clearTimeout(p);var i=e[r];if(delete e[r],s.parentNode\u0026\u0026s.parentNode.removeChild(s),i\u0026\u0026i.forEach((e=\u003ee(n))),t)return t(n)},p=setTimeout(h.bind(null,void 0,{type:\"timeout\",target:s}),12e4);s.onerror=h.bind(null,s.onerror),s.onload=h.bind(null,s.onload),c\u0026\u0026document.head.appendChild(s)}},i.r=e=\u003e{\"undefined\"!=typeof Symbol\u0026\u0026Symbol.toStringTag\u0026\u0026Object.defineProperty(e,Symbol.toStringTag,{value:\"Module\"}),Object.defineProperty(e,\"__esModule\",{value:!0})},i.p=\"https://js-agent.newrelic.com/\",(()=\u003e{var e={38:0,788:0};i.f.j=(t,r)=\u003e{var n=i.o(e,t)?e[t]:void 0;if(0!==n)if(n)r.push(n[2]);else{var o=new Promise(((r,i)=\u003en=e[t]=[r,i]));r.push(n[2]=o);var a=i.p+i.u(t),s=new Error;i.l(a,(r=\u003e{if(i.o(e,t)\u0026\u0026(0!==(n=e[t])\u0026\u0026(e[t]=void 0),n)){var o=r\u0026\u0026(\"load\"===r.type?\"missing\":r.type),a=r\u0026\u0026r.target\u0026\u0026r.target.src;s.message=\"Loading chunk \"+t+\" failed.\\n(\"+o+\": \"+a+\")\",s.name=\"ChunkLoadError\",s.type=o,s.request=a,n[1](s)}}),\"chunk-\"+t,t)}};var t=(t,r)=\u003e{var n,o,[a,s,c]=r,u=0;if(a.some((t=\u003e0!==e[t]))){for(n in s)i.o(s,n)\u0026\u0026(i.m[n]=s[n]);if(c)c(i)}for(t\u0026\u0026t(r);u\u003ca.length;u++)o=a[u],i.o(e,o)\u0026\u0026e[o]\u0026\u0026e[o][0](),e[o]=0},r=self[\"webpackChunk:NRBA-1.274.0.PROD\"]=self[\"webpackChunk:NRBA-1.274.0.PROD\"]||[];r.forEach(t.bind(null,0)),r.push=t.bind(null,r.push.bind(r))})(),(()=\u003e{\"use strict\";i(8374);var e=i(944),t=i(6344),r=i(9566);class n{agentIdentifier;constructor(e=(0,r.LA)(16)){this.agentIdentifier=e}#e(t,...r){if(\"function\"==typeof this.api?.[t])return this.api[t](...r);(0,e.R)(35,t)}addPageAction(e,t){return this.#e(\"addPageAction\",e,t)}setPageViewName(e,t){return this.#e(\"setPageViewName\",e,t)}setCustomAttribute(e,t,r){return this.#e(\"setCustomAttribute\",e,t,r)}noticeError(e,t){return this.#e(\"noticeError\",e,t)}setUserId(e){return this.#e(\"setUserId\",e)}setApplicationVersion(e){return this.#e(\"setApplicationVersion\",e)}setErrorHandler(e){return this.#e(\"setErrorHandler\",e)}addRelease(e,t){return this.#e(\"addRelease\",e,t)}log(e,t){return this.#e(\"log\",e,t)}}class o extends n{#e(t,...r){if(\"function\"==typeof this.api?.[t])return this.api[t](...r);(0,e.R)(35,t)}start(){return this.#e(\"start\")}finished(e){return this.#e(\"finished\",e)}recordReplay(){return this.#e(t.G4.RECORD)}pauseReplay(){return this.#e(t.G4.PAUSE)}addToTrace(e){return this.#e(\"addToTrace\",e)}setCurrentRouteName(e){return this.#e(\"setCurrentRouteName\",e)}interaction(){return this.#e(\"interaction\")}wrapLogger(e,t,r){return this.#e(\"wrapLogger\",e,t,r)}}var a=i(860),s=i(9417);const c=Object.values(a.K7);function u(e){const t={};return c.forEach((r=\u003e{t[r]=function(e,t){return!0===(0,s.gD)(t,\"\".concat(e,\".enabled\"))}(r,e)})),t}var d=i(425);var l=i(1687),f=i(4234),h=i(5289),p=i(6154),g=i(5270),m=i(7767),v=i(6389);class b extends f.W{constructor(e,t,r=!0){super(e.agentIdentifier,t),this.auto=r,this.abortHandler=void 0,this.featAggregate=void 0,this.onAggregateImported=void 0,!1===e.init[this.featureName].autoStart\u0026\u0026(this.auto=!1),this.auto?(0,l.Ak)(e.agentIdentifier,t):this.ee.on(\"manual-start-all\",(0,v.J)((()=\u003e{(0,l.Ak)(e.agentIdentifier,this.featureName),this.auto=!0,this.importAggregator(e)})))}importAggregator(t,r={}){if(this.featAggregate||!this.auto)return;let n;this.onAggregateImported=new Promise((e=\u003e{n=e}));const o=async()=\u003e{let o;try{if((0,m.V)(this.agentIdentifier)){const{setupAgentSession:e}=await i.e(478).then(i.bind(i,6526));o=e(t)}}catch(t){(0,e.R)(20,t),this.ee.emit(\"internal-error\",[t]),this.featureName===a.K7.sessionReplay\u0026\u0026this.abortHandler?.()}try{if(t.sharedAggregator)await t.sharedAggregator;else{t.sharedAggregator=i.e(478).then(i.bind(i,9337));const{EventAggregator:e}=await t.sharedAggregator;t.sharedAggregator=new e}if(!this.#t(this.featureName,o))return(0,l.Ze)(this.agentIdentifier,this.featureName),void n(!1);const{lazyFeatureLoader:e}=await i.e(478).then(i.bind(i,6103)),{Aggregate:a}=await e(this.featureName,\"aggregate\");this.featAggregate=new a(t,r),n(!0)}catch(t){(0,e.R)(34,t),this.abortHandler?.(),(0,l.Ze)(this.agentIdentifier,this.featureName,!0),n(!1),this.ee\u0026\u0026this.ee.abort()}};p.RI?(0,h.GG)((()=\u003eo()),!0):o()}#t(e,t){switch(e){case a.K7.sessionReplay:return(0,g.SR)(this.agentIdentifier)\u0026\u0026!!t;case a.K7.sessionTrace:return!!t;default:return!0}}}var y=i(6630);class w extends b{static featureName=y.T;constructor(e,t=!0){super(e,y.T,t),this.importAggregator(e)}}var R=i(384);var x=i(9908),T=i(2843),A=i(3878),E=i(782),S=i(1863);class N extends b{static featureName=E.T;constructor(e,t=!0){super(e,E.T,t),p.RI\u0026\u0026((0,T.u)((()=\u003e(0,x.p)(\"docHidden\",[(0,S.t)()],void 0,E.T,this.ee)),!0),(0,A.sp)(\"pagehide\",(()=\u003e(0,x.p)(\"winPagehide\",[(0,S.t)()],void 0,E.T,this.ee))),this.importAggregator(e))}}var O=i(3969);class _ extends b{static featureName=O.TZ;constructor(e,t=!0){super(e,O.TZ,t),this.importAggregator(e)}}var I=i(6774),j=i(3304);class P{constructor(e,t,r,n,i){this.name=\"UncaughtError\",this.message=\"string\"==typeof e?e:(0,j.A)(e),this.sourceURL=t,this.line=r,this.column=n,this.__newrelic=i}}function C(e){return H(e)?e:new P(void 0!==e?.message?e.message:e,e?.filename||e?.sourceURL,e?.lineno||e?.line,e?.colno||e?.col,e?.__newrelic)}function k(e){const t=\"Unhandled Promise Rejection\";if(!e?.reason)return;if(H(e.reason))try{return e.reason.message=t+\": \"+e.reason.message,C(e.reason)}catch(t){return C(e.reason)}const r=C(e.reason);return r.message=t+\": \"+r?.message,r}function L(e){if(e.error instanceof SyntaxError\u0026\u0026!/:\\d+$/.test(e.error.stack?.trim())){const t=new P(e.message,e.filename,e.lineno,e.colno,e.error.__newrelic);return t.name=SyntaxError.name,t}return H(e.error)?e.error:C(e)}function H(e){return e instanceof Error\u0026\u0026!!e.stack}class D extends b{static featureName=I.T;#r=!1;constructor(e,r=!0){super(e,I.T,r);try{this.removeOnAbort=new AbortController}catch(e){}this.ee.on(\"internal-error\",(e=\u003e{this.abortHandler\u0026\u0026(0,x.p)(\"ierr\",[C(e),(0,S.t)(),!0,{},this.#r],void 0,this.featureName,this.ee)})),this.ee.on(t.G4.REPLAY_RUNNING,(e=\u003e{this.#r=e})),p.gm.addEventListener(\"unhandledrejection\",(e=\u003e{this.abortHandler\u0026\u0026(0,x.p)(\"err\",[k(e),(0,S.t)(),!1,{unhandledPromiseRejection:1},this.#r],void 0,this.featureName,this.ee)}),(0,A.jT)(!1,this.removeOnAbort?.signal)),p.gm.addEventListener(\"error\",(e=\u003e{this.abortHandler\u0026\u0026(0,x.p)(\"err\",[L(e),(0,S.t)(),!1,{},this.#r],void 0,this.featureName,this.ee)}),(0,A.jT)(!1,this.removeOnAbort?.signal)),this.abortHandler=this.#n,this.importAggregator(e)}#n(){this.removeOnAbort?.abort(),this.abortHandler=void 0}}var M=i(8990);let K=1;const U=\"nr@id\";function V(e){const t=typeof e;return!e||\"object\"!==t\u0026\u0026\"function\"!==t?-1:e===p.gm?0:(0,M.I)(e,U,(function(){return K++}))}function G(e){if(\"string\"==typeof e\u0026\u0026e.length)return e.length;if(\"object\"==typeof e){if(\"undefined\"!=typeof ArrayBuffer\u0026\u0026e instanceof ArrayBuffer\u0026\u0026e.byteLength)return e.byteLength;if(\"undefined\"!=typeof Blob\u0026\u0026e instanceof Blob\u0026\u0026e.size)return e.size;if(!(\"undefined\"!=typeof FormData\u0026\u0026e instanceof FormData))try{return(0,j.A)(e).length}catch(e){return}}}var F=i(8139),B=i(7836),W=i(3434);const z={},q=[\"open\",\"send\"];function Z(t){var r=t||B.ee;const n=function(e){return(e||B.ee).get(\"xhr\")}(r);if(z[n.debugId]++)return n;z[n.debugId]=1,(0,F.u)(r);var i=(0,W.YM)(n),o=p.gm.XMLHttpRequest,a=p.gm.MutationObserver,s=p.gm.Promise,c=p.gm.setInterval,u=\"readystatechange\",d=[\"onload\",\"onerror\",\"onabort\",\"onloadstart\",\"onloadend\",\"onprogress\",\"ontimeout\"],l=[],f=p.gm.XMLHttpRequest=function(t){const r=new o(t),a=n.context(r);try{n.emit(\"new-xhr\",[r],a),r.addEventListener(u,(s=a,function(){var e=this;e.readyState\u003e3\u0026\u0026!s.resolved\u0026\u0026(s.resolved=!0,n.emit(\"xhr-resolved\",[],e)),i.inPlace(e,d,\"fn-\",y)}),(0,A.jT)(!1))}catch(t){(0,e.R)(15,t);try{n.emit(\"internal-error\",[t])}catch(e){}}var s;return r};function h(e,t){i.inPlace(t,[\"onreadystatechange\"],\"fn-\",y)}if(function(e,t){for(var r in e)t[r]=e[r]}(o,f),f.prototype=o.prototype,i.inPlace(f.prototype,q,\"-xhr-\",y),n.on(\"send-xhr-start\",(function(e,t){h(e,t),function(e){l.push(e),a\u0026\u0026(g?g.then(b):c?c(b):(m=-m,v.data=m))}(t)})),n.on(\"open-xhr-start\",h),a){var g=s\u0026\u0026s.resolve();if(!c\u0026\u0026!s){var m=1,v=document.createTextNode(m);new a(b).observe(v,{characterData:!0})}}else r.on(\"fn-end\",(function(e){e[0]\u0026\u0026e[0].type===u||b()}));function b(){for(var e=0;e\u003cl.length;e++)h(0,l[e]);l.length\u0026\u0026(l=[])}function y(e,t){return t}return n}var Y=\"fetch-\",X=Y+\"body-\",J=[\"arrayBuffer\",\"blob\",\"json\",\"text\",\"formData\"],Q=p.gm.Request,ee=p.gm.Response,te=\"prototype\";const re={};function ne(e){const t=function(e){return(e||B.ee).get(\"fetch\")}(e);if(!(Q\u0026\u0026ee\u0026\u0026p.gm.fetch))return t;if(re[t.debugId]++)return t;function r(e,r,n){var i=e[r];\"function\"==typeof i\u0026\u0026(e[r]=function(){var e,r=[...arguments],o={};t.emit(n+\"before-start\",[r],o),o[B.P]\u0026\u0026o[B.P].dt\u0026\u0026(e=o[B.P].dt);var a=i.apply(this,r);return t.emit(n+\"start\",[r,e],a),a.then((function(e){return t.emit(n+\"end\",[null,e],a),e}),(function(e){throw t.emit(n+\"end\",[e],a),e}))})}return re[t.debugId]=1,J.forEach((e=\u003e{r(Q[te],e,X),r(ee[te],e,X)})),r(p.gm,\"fetch\",Y),t.on(Y+\"end\",(function(e,r){var n=this;if(r){var i=r.headers.get(\"content-length\");null!==i\u0026\u0026(n.rxSize=i),t.emit(Y+\"done\",[null,r],n)}else t.emit(Y+\"done\",[e],n)})),t}var ie=i(7485),oe=i(5603);class ae{constructor(e){this.agentIdentifier=e}generateTracePayload(e){if(!this.shouldGenerateTrace(e))return null;var t=(0,oe.o)(this.agentIdentifier);if(!t)return null;var n=(t.accountID||\"\").toString()||null,i=(t.agentID||\"\").toString()||null,o=(t.trustKey||\"\").toString()||null;if(!n||!i)return null;var a=(0,r.ZF)(),s=(0,r.el)(),c=Date.now(),u={spanId:a,traceId:s,timestamp:c};return(e.sameOrigin||this.isAllowedOrigin(e)\u0026\u0026this.useTraceContextHeadersForCors())\u0026\u0026(u.traceContextParentHeader=this.generateTraceContextParentHeader(a,s),u.traceContextStateHeader=this.generateTraceContextStateHeader(a,c,n,i,o)),(e.sameOrigin\u0026\u0026!this.excludeNewrelicHeader()||!e.sameOrigin\u0026\u0026this.isAllowedOrigin(e)\u0026\u0026this.useNewrelicHeaderForCors())\u0026\u0026(u.newrelicHeader=this.generateTraceHeader(a,s,c,n,i,o)),u}generateTraceContextParentHeader(e,t){return\"00-\"+t+\"-\"+e+\"-01\"}generateTraceContextStateHeader(e,t,r,n,i){return i+\"@nr=0-1-\"+r+\"-\"+n+\"-\"+e+\"----\"+t}generateTraceHeader(e,t,r,n,i,o){if(!(\"function\"==typeof p.gm?.btoa))return null;var a={v:[0,1],d:{ty:\"Browser\",ac:n,ap:i,id:e,tr:t,ti:r}};return o\u0026\u0026n!==o\u0026\u0026(a.d.tk=o),btoa((0,j.A)(a))}shouldGenerateTrace(e){return this.isDtEnabled()\u0026\u0026this.isAllowedOrigin(e)}isAllowedOrigin(e){var t=!1,r={};if((0,s.gD)(this.agentIdentifier,\"distributed_tracing\")\u0026\u0026(r=(0,s.D0)(this.agentIdentifier).distributed_tracing),e.sameOrigin)t=!0;else if(r.allowed_origins instanceof Array)for(var n=0;n\u003cr.allowed_origins.length;n++){var i=(0,ie.D)(r.allowed_origins[n]);if(e.hostname===i.hostname\u0026\u0026e.protocol===i.protocol\u0026\u0026e.port===i.port){t=!0;break}}return t}isDtEnabled(){var e=(0,s.gD)(this.agentIdentifier,\"distributed_tracing\");return!!e\u0026\u0026!!e.enabled}excludeNewrelicHeader(){var e=(0,s.gD)(this.agentIdentifier,\"distributed_tracing\");return!!e\u0026\u0026!!e.exclude_newrelic_header}useNewrelicHeaderForCors(){var e=(0,s.gD)(this.agentIdentifier,\"distributed_tracing\");return!!e\u0026\u0026!1!==e.cors_use_newrelic_header}useTraceContextHeadersForCors(){var e=(0,s.gD)(this.agentIdentifier,\"distributed_tracing\");return!!e\u0026\u0026!!e.cors_use_tracecontext_headers}}var se=i(9300),ce=i(7295),ue=[\"load\",\"error\",\"abort\",\"timeout\"],de=ue.length,le=(0,R.dV)().o.REQ,fe=(0,R.dV)().o.XHR;class he extends b{static featureName=se.T;constructor(e,t=!0){super(e,se.T,t),this.dt=new ae(e.agentIdentifier),this.handler=(e,t,r,n)=\u003e(0,x.p)(e,t,r,n,this.ee);try{const e={xmlhttprequest:\"xhr\",fetch:\"fetch\",beacon:\"beacon\"};p.gm?.performance?.getEntriesByType(\"resource\").forEach((t=\u003e{if(t.initiatorType in e\u0026\u00260!==t.responseStatus){const r={status:t.responseStatus},n={rxSize:t.transferSize,duration:Math.floor(t.duration),cbTime:0};pe(r,t.name),this.handler(\"xhr\",[r,n,t.startTime,t.responseEnd,e[t.initiatorType]],void 0,a.K7.ajax)}}))}catch(e){}ne(this.ee),Z(this.ee),function(e,t,r,n){function i(e){var t=this;t.totalCbs=0,t.called=0,t.cbTime=0,t.end=R,t.ended=!1,t.xhrGuids={},t.lastSize=null,t.loadCaptureCalled=!1,t.params=this.params||{},t.metrics=this.metrics||{},e.addEventListener(\"load\",(function(r){T(t,e)}),(0,A.jT)(!1)),p.lR||e.addEventListener(\"progress\",(function(e){t.lastSize=e.loaded}),(0,A.jT)(!1))}function o(e){this.params={method:e[0]},pe(this,e[1]),this.metrics={}}function s(t,r){e.loader_config.xpid\u0026\u0026this.sameOrigin\u0026\u0026r.setRequestHeader(\"X-NewRelic-ID\",e.loader_config.xpid);var i=n.generateTracePayload(this.parsedOrigin);if(i){var o=!1;i.newrelicHeader\u0026\u0026(r.setRequestHeader(\"newrelic\",i.newrelicHeader),o=!0),i.traceContextParentHeader\u0026\u0026(r.setRequestHeader(\"traceparent\",i.traceContextParentHeader),i.traceContextStateHeader\u0026\u0026r.setRequestHeader(\"tracestate\",i.traceContextStateHeader),o=!0),o\u0026\u0026(this.dt=i)}}function c(e,r){var n=this.metrics,i=e[0],o=this;if(n\u0026\u0026i){var a=G(i);a\u0026\u0026(n.txSize=a)}this.startTime=(0,S.t)(),this.body=i,this.listener=function(e){try{\"abort\"!==e.type||o.loadCaptureCalled||(o.params.aborted=!0),(\"load\"!==e.type||o.called===o.totalCbs\u0026\u0026(o.onloadCalled||\"function\"!=typeof r.onload)\u0026\u0026\"function\"==typeof o.end)\u0026\u0026o.end(r)}catch(e){try{t.emit(\"internal-error\",[e])}catch(e){}}};for(var s=0;s\u003cde;s++)r.addEventListener(ue[s],this.listener,(0,A.jT)(!1))}function u(e,t,r){this.cbTime+=e,t?this.onloadCalled=!0:this.called+=1,this.called!==this.totalCbs||!this.onloadCalled\u0026\u0026\"function\"==typeof r.onload||\"function\"!=typeof this.end||this.end(r)}function d(e,t){var r=\"\"+V(e)+!!t;this.xhrGuids\u0026\u0026!this.xhrGuids[r]\u0026\u0026(this.xhrGuids[r]=!0,this.totalCbs+=1)}function l(e,t){var r=\"\"+V(e)+!!t;this.xhrGuids\u0026\u0026this.xhrGuids[r]\u0026\u0026(delete this.xhrGuids[r],this.totalCbs-=1)}function f(){this.endTime=(0,S.t)()}function h(e,r){r instanceof fe\u0026\u0026\"load\"===e[0]\u0026\u0026t.emit(\"xhr-load-added\",[e[1],e[2]],r)}function g(e,r){r instanceof fe\u0026\u0026\"load\"===e[0]\u0026\u0026t.emit(\"xhr-load-removed\",[e[1],e[2]],r)}function m(e,t,r){t instanceof fe\u0026\u0026(\"onload\"===r\u0026\u0026(this.onload=!0),(\"load\"===(e[0]\u0026\u0026e[0].type)||this.onload)\u0026\u0026(this.xhrCbStart=(0,S.t)()))}function v(e,r){this.xhrCbStart\u0026\u0026t.emit(\"xhr-cb-time\",[(0,S.t)()-this.xhrCbStart,this.onload,r],r)}function b(e){var t,r=e[1]||{};if(\"string\"==typeof e[0]?0===(t=e[0]).length\u0026\u0026p.RI\u0026\u0026(t=\"\"+p.gm.location.href):e[0]\u0026\u0026e[0].url?t=e[0].url:p.gm?.URL\u0026\u0026e[0]\u0026\u0026e[0]instanceof URL?t=e[0].href:\"function\"==typeof e[0].toString\u0026\u0026(t=e[0].toString()),\"string\"==typeof t\u0026\u00260!==t.length){t\u0026\u0026(this.parsedOrigin=(0,ie.D)(t),this.sameOrigin=this.parsedOrigin.sameOrigin);var i=n.generateTracePayload(this.parsedOrigin);if(i\u0026\u0026(i.newrelicHeader||i.traceContextParentHeader))if(e[0]\u0026\u0026e[0].headers)s(e[0].headers,i)\u0026\u0026(this.dt=i);else{var o={};for(var a in r)o[a]=r[a];o.headers=new Headers(r.headers||{}),s(o.headers,i)\u0026\u0026(this.dt=i),e.length\u003e1?e[1]=o:e.push(o)}}function s(e,t){var r=!1;return t.newrelicHeader\u0026\u0026(e.set(\"newrelic\",t.newrelicHeader),r=!0),t.traceContextParentHeader\u0026\u0026(e.set(\"traceparent\",t.traceContextParentHeader),t.traceContextStateHeader\u0026\u0026e.set(\"tracestate\",t.traceContextStateHeader),r=!0),r}}function y(e,t){this.params={},this.metrics={},this.startTime=(0,S.t)(),this.dt=t,e.length\u003e=1\u0026\u0026(this.target=e[0]),e.length\u003e=2\u0026\u0026(this.opts=e[1]);var r,n=this.opts||{},i=this.target;\"string\"==typeof i?r=i:\"object\"==typeof i\u0026\u0026i instanceof le?r=i.url:p.gm?.URL\u0026\u0026\"object\"==typeof i\u0026\u0026i instanceof URL\u0026\u0026(r=i.href),pe(this,r);var o=(\"\"+(i\u0026\u0026i instanceof le\u0026\u0026i.method||n.method||\"GET\")).toUpperCase();this.params.method=o,this.body=n.body,this.txSize=G(n.body)||0}function w(e,t){if(this.endTime=(0,S.t)(),this.params||(this.params={}),(0,ce.iW)(this.params))return;let n;this.params.status=t?t.status:0,\"string\"==typeof this.rxSize\u0026\u0026this.rxSize.length\u003e0\u0026\u0026(n=+this.rxSize);const i={txSize:this.txSize,rxSize:n,duration:(0,S.t)()-this.startTime};r(\"xhr\",[this.params,i,this.startTime,this.endTime,\"fetch\"],this,a.K7.ajax)}function R(e){const t=this.params,n=this.metrics;if(!this.ended){this.ended=!0;for(let t=0;t\u003cde;t++)e.removeEventListener(ue[t],this.listener,!1);t.aborted||(0,ce.iW)(t)||(n.duration=(0,S.t)()-this.startTime,this.loadCazptureCalled||4!==e.readyState?null==t.status\u0026\u0026(t.status=0):T(this,e),n.cbTime=this.cbTime,r(\"xhr\",[t,n,this.startTime,this.endTime,\"xhr\"],this,a.K7.ajax))}}function T(e,r){e.params.status=r.status;var n=function(e,t){var r=e.responseType;return\"json\"===r\u0026\u0026null!==t?t:\"arraybuffer\"===r||\"blob\"===r||\"json\"===r?G(e.response):\"text\"===r||\"\"===r||void 0===r?G(e.responseText):void 0}(r,e.lastSize);if(n\u0026\u0026(e.metrics.rxSize=n),e.sameOrigin){var i=r.getResponseHeader(\"X-NewRelic-App-Data\");i\u0026\u0026((0,x.p)(O.rs,[\"Ajax/CrossApplicationTracing/Header/Seen\"],void 0,a.K7.metrics,t),e.params.cat=i.split(\", \").pop())}e.loadCaptureCalled=!0}t.on(\"new-xhr\",i),t.on(\"open-xhr-start\",o),t.on(\"open-xhr-end\",s),t.on(\"send-xhr-start\",c),t.on(\"xhr-cb-time\",u),t.on(\"xhr-load-added\",d),t.on(\"xhr-load-removed\",l),t.on(\"xhr-resolved\",f),t.on(\"addEventListener-end\",h),t.on(\"removeEventListener-end\",g),t.on(\"fn-end\",v),t.on(\"fetch-before-start\",b),t.on(\"fetch-start\",y),t.on(\"fn-start\",m),t.on(\"fetch-done\",w)}(e,this.ee,this.handler,this.dt),this.importAggregator(e)}}function pe(e,t){var r=(0,ie.D)(t),n=e.params||e;n.hostname=r.hostname,n.port=r.port,n.protocol=r.protocol,n.host=r.hostname+\":\"+r.port,n.pathname=r.pathname,e.parsedOrigin=r,e.sameOrigin=r.sameOrigin}const ge={},me=[\"pushState\",\"replaceState\"];function ve(e){const t=function(e){return(e||B.ee).get(\"history\")}(e);return!p.RI||ge[t.debugId]++||(ge[t.debugId]=1,(0,W.YM)(t).inPlace(window.history,me,\"-\")),t}var be=i(3738);const{He:ye,bD:we,d3:Re,Kp:xe,TZ:Te,Lc:Ae,uP:Ee,Rz:Se}=be;class Ne extends b{static featureName=Te;constructor(e,t=!0){super(e,Te,t);if(!(0,m.V)(this.agentIdentifier))return void this.deregisterDrain();const r=this.ee;let n;ve(r),this.eventsEE=(0,F.u)(r),this.eventsEE.on(Ee,(function(e,t){this.bstStart=(0,S.t)()})),this.eventsEE.on(Ae,(function(e,t){(0,x.p)(\"bst\",[e[0],t,this.bstStart,(0,S.t)()],void 0,a.K7.sessionTrace,r)})),r.on(Se+Re,(function(e){this.time=(0,S.t)(),this.startPath=location.pathname+location.hash})),r.on(Se+xe,(function(e){(0,x.p)(\"bstHist\",[location.pathname+location.hash,this.startPath,this.time],void 0,a.K7.sessionTrace,r)}));try{n=new PerformanceObserver((e=\u003e{const t=e.getEntries();(0,x.p)(ye,[t],void 0,a.K7.sessionTrace,r)})),n.observe({type:we,buffered:!0})}catch(e){}this.importAggregator(e,{resourceObserver:n})}}var Oe=i(2614);class _e extends b{static featureName=t.TZ;#i;#o;constructor(e,r=!0){let n;super(e,t.TZ,r),this.replayRunning=!1,this.#o=e;try{n=JSON.parse(localStorage.getItem(\"\".concat(Oe.H3,\"_\").concat(Oe.uh)))}catch(e){}(0,g.SR)(e.agentIdentifier)\u0026\u0026this.ee.on(t.G4.RECORD,(()=\u003ethis.#a())),this.#s(n)?(this.#i=n?.sessionReplayMode,this.#c()):this.importAggregator(e),this.ee.on(\"err\",(e=\u003e{this.replayRunning\u0026\u0026(this.errorNoticed=!0,(0,x.p)(t.G4.ERROR_DURING_REPLAY,[e],void 0,this.featureName,this.ee))})),this.ee.on(t.G4.REPLAY_RUNNING,(e=\u003e{this.replayRunning=e}))}#s(e){return e\u0026\u0026(e.sessionReplayMode===Oe.g.FULL||e.sessionReplayMode===Oe.g.ERROR)||(0,g.Aw)(this.agentIdentifier)}#u=!1;async#c(e){if(!this.#u){this.#u=!0;try{const{Recorder:t}=await Promise.all([i.e(478),i.e(249)]).then(i.bind(i,8589));this.recorder??=new t({mode:this.#i,agentIdentifier:this.agentIdentifier,trigger:e,ee:this.ee}),this.recorder.startRecording(),this.abortHandler=this.recorder.stopRecording}catch(e){}this.importAggregator(this.#o,{recorder:this.recorder,errorNoticed:this.errorNoticed})}}#a(){this.featAggregate?this.featAggregate.mode!==Oe.g.FULL\u0026\u0026this.featAggregate.initializeRecording(Oe.g.FULL,!0):(this.#i=Oe.g.FULL,this.#c(t.Qb.API),this.recorder\u0026\u0026this.recorder.parent.mode!==Oe.g.FULL\u0026\u0026(this.recorder.parent.mode=Oe.g.FULL,this.recorder.stopRecording(),this.recorder.startRecording(),this.abortHandler=this.recorder.stopRecording))}}var Ie=i(3962);class je extends b{static featureName=Ie.TZ;constructor(e,t=!0){if(super(e,Ie.TZ,t),!p.RI||!(0,R.dV)().o.MO)return;const r=ve(this.ee);Ie.tC.forEach((e=\u003e{(0,A.sp)(e,(e=\u003e{a(e)}),!0)}));const n=()=\u003e(0,x.p)(\"newURL\",[(0,S.t)(),\"\"+window.location],void 0,this.featureName,this.ee);r.on(\"pushState-end\",n),r.on(\"replaceState-end\",n);try{this.removeOnAbort=new AbortController}catch(e){}(0,A.sp)(\"popstate\",(e=\u003e(0,x.p)(\"newURL\",[e.timeStamp,\"\"+window.location],void 0,this.featureName,this.ee)),!0,this.removeOnAbort?.signal);let i=!1;const o=new((0,R.dV)().o.MO)(((e,t)=\u003e{i||(i=!0,requestAnimationFrame((()=\u003e{(0,x.p)(\"newDom\",[(0,S.t)()],void 0,this.featureName,this.ee),i=!1})))})),a=(0,v.s)((e=\u003e{(0,x.p)(\"newUIEvent\",[e],void 0,this.featureName,this.ee),o.observe(document.body,{attributes:!0,childList:!0,subtree:!0,characterData:!0})}),100,{leading:!0});this.abortHandler=function(){this.removeOnAbort?.abort(),o.disconnect(),this.abortHandler=void 0},this.importAggregator(e,{domObserver:o})}}var Pe=i(7378);const Ce={},ke=[\"appendChild\",\"insertBefore\",\"replaceChild\"];function Le(e){const t=function(e){return(e||B.ee).get(\"jsonp\")}(e);if(!p.RI||Ce[t.debugId])return t;Ce[t.debugId]=!0;var r=(0,W.YM)(t),n=/[?\u0026](?:callback|cb)=([^\u0026#]+)/,i=/(.*)\\.([^.]+)/,o=/^(\\w+)(\\.|$)(.*)$/;function a(e,t){if(!e)return t;const r=e.match(o),n=r[1];return a(r[3],t[n])}return r.inPlace(Node.prototype,ke,\"dom-\"),t.on(\"dom-start\",(function(e){!function(e){if(!e||\"string\"!=typeof e.nodeName||\"script\"!==e.nodeName.toLowerCase())return;if(\"function\"!=typeof e.addEventListener)return;var o=(s=e.src,c=s.match(n),c?c[1]:null);var s,c;if(!o)return;var u=function(e){var t=e.match(i);if(t\u0026\u0026t.length\u003e=3)return{key:t[2],parent:a(t[1],window)};return{key:e,parent:window}}(o);if(\"function\"!=typeof u.parent[u.key])return;var d={};function l(){t.emit(\"jsonp-end\",[],d),e.removeEventListener(\"load\",l,(0,A.jT)(!1)),e.removeEventListener(\"error\",f,(0,A.jT)(!1))}function f(){t.emit(\"jsonp-error\",[],d),t.emit(\"jsonp-end\",[],d),e.removeEventListener(\"load\",l,(0,A.jT)(!1)),e.removeEventListener(\"error\",f,(0,A.jT)(!1))}r.inPlace(u.parent,[u.key],\"cb-\",d),e.addEventListener(\"load\",l,(0,A.jT)(!1)),e.addEventListener(\"error\",f,(0,A.jT)(!1)),t.emit(\"new-jsonp\",[e.src],d)}(e[0])})),t}const He={};function De(e){const t=function(e){return(e||B.ee).get(\"promise\")}(e);if(He[t.debugId])return t;He[t.debugId]=!0;var r=t.context,n=(0,W.YM)(t),i=p.gm.Promise;return i\u0026\u0026function(){function e(r){var o=t.context(),a=n(r,\"executor-\",o,null,!1);const s=Reflect.construct(i,[a],e);return t.context(s).getCtx=function(){return o},s}p.gm.Promise=e,Object.defineProperty(e,\"name\",{value:\"Promise\"}),e.toString=function(){return i.toString()},Object.setPrototypeOf(e,i),[\"all\",\"race\"].forEach((function(r){const n=i[r];e[r]=function(e){let i=!1;[...e||[]].forEach((e=\u003e{this.resolve(e).then(a(\"all\"===r),a(!1))}));const o=n.apply(this,arguments);return o;function a(e){return function(){t.emit(\"propagate\",[null,!i],o,!1,!1),i=i||!e}}}})),[\"resolve\",\"reject\"].forEach((function(r){const n=i[r];e[r]=function(e){const r=n.apply(this,arguments);return e!==r\u0026\u0026t.emit(\"propagate\",[e,!0],r,!1,!1),r}})),e.prototype=i.prototype;const o=i.prototype.then;i.prototype.then=function(...e){var i=this,a=r(i);a.promise=i,e[0]=n(e[0],\"cb-\",a,null,!1),e[1]=n(e[1],\"cb-\",a,null,!1);const s=o.apply(this,e);return a.nextPromise=s,t.emit(\"propagate\",[i,!0],s,!1,!1),s},i.prototype.then[W.Jt]=o,t.on(\"executor-start\",(function(e){e[0]=n(e[0],\"resolve-\",this,null,!1),e[1]=n(e[1],\"resolve-\",this,null,!1)})),t.on(\"executor-err\",(function(e,t,r){e[1](r)})),t.on(\"cb-end\",(function(e,r,n){t.emit(\"propagate\",[n,!0],this.nextPromise,!1,!1)})),t.on(\"propagate\",(function(e,r,n){this.getCtx\u0026\u0026!r||(this.getCtx=function(){if(e instanceof Promise)var r=t.context(e);return r\u0026\u0026r.getCtx?r.getCtx():this})}))}(),t}const Me={},Ke=\"setTimeout\",Ue=\"setInterval\",Ve=\"clearTimeout\",Ge=\"-start\",Fe=[Ke,\"setImmediate\",Ue,Ve,\"clearImmediate\"];function Be(e){const t=function(e){return(e||B.ee).get(\"timer\")}(e);if(Me[t.debugId]++)return t;Me[t.debugId]=1;var r=(0,W.YM)(t);return r.inPlace(p.gm,Fe.slice(0,2),Ke+\"-\"),r.inPlace(p.gm,Fe.slice(2,3),Ue+\"-\"),r.inPlace(p.gm,Fe.slice(3),Ve+\"-\"),t.on(Ue+Ge,(function(e,t,n){e[0]=r(e[0],\"fn-\",null,n)})),t.on(Ke+Ge,(function(e,t,n){this.method=n,this.timerDuration=isNaN(e[1])?0:+e[1],e[0]=r(e[0],\"fn-\",this,n)})),t}const We={};function ze(e){const t=function(e){return(e||B.ee).get(\"mutation\")}(e);if(!p.RI||We[t.debugId])return t;We[t.debugId]=!0;var r=(0,W.YM)(t),n=p.gm.MutationObserver;return n\u0026\u0026(window.MutationObserver=function(e){return this instanceof n?new n(r(e,\"fn-\")):n.apply(this,arguments)},MutationObserver.prototype=n.prototype),t}const{TZ:qe,d3:Ze,Kp:Ye,$p:Xe,wW:Je,e5:Qe,tH:$e,uP:et,rw:tt,Lc:rt}=Pe;class nt extends b{static featureName=qe;constructor(e,t=!0){if(super(e,qe,t),!p.RI)return;try{this.removeOnAbort=new AbortController}catch(e){}let r,n=0;const i=this.ee.get(\"tracer\"),o=Le(this.ee),a=De(this.ee),s=Be(this.ee),c=Z(this.ee),u=this.ee.get(\"events\"),d=ne(this.ee),l=ve(this.ee),f=ze(this.ee);function h(e,t){l.emit(\"newURL\",[\"\"+window.location,t])}function g(){n++,r=window.location.hash,this[et]=(0,S.t)()}function m(){n--,window.location.hash!==r\u0026\u0026h(0,!0);var e=(0,S.t)();this[Qe]=~~this[Qe]+e-this[et],this[rt]=e}function v(e,t){e.on(t,(function(){this[t]=(0,S.t)()}))}this.ee.on(et,g),a.on(tt,g),o.on(tt,g),this.ee.on(rt,m),a.on(Je,m),o.on(Je,m),this.ee.on(\"fn-err\",((...t)=\u003e{t[2]?.__newrelic?.[e.agentIdentifier]||(0,x.p)(\"function-err\",[...t],void 0,this.featureName,this.ee)})),this.ee.buffer([et,rt,\"xhr-resolved\"],this.featureName),u.buffer([et],this.featureName),s.buffer([\"setTimeout\"+Ye,\"clearTimeout\"+Ze,et],this.featureName),c.buffer([et,\"new-xhr\",\"send-xhr\"+Ze],this.featureName),d.buffer([$e+Ze,$e+\"-done\",$e+Xe+Ze,$e+Xe+Ye],this.featureName),l.buffer([\"newURL\"],this.featureName),f.buffer([et],this.featureName),a.buffer([\"propagate\",tt,Je,\"executor-err\",\"resolve\"+Ze],this.featureName),i.buffer([et,\"no-\"+et],this.featureName),o.buffer([\"new-jsonp\",\"cb-start\",\"jsonp-error\",\"jsonp-end\"],this.featureName),v(d,$e+Ze),v(d,$e+\"-done\"),v(o,\"new-jsonp\"),v(o,\"jsonp-end\"),v(o,\"cb-start\"),l.on(\"pushState-end\",h),l.on(\"replaceState-end\",h),window.addEventListener(\"hashchange\",h,(0,A.jT)(!0,this.removeOnAbort?.signal)),window.addEventListener(\"load\",h,(0,A.jT)(!0,this.removeOnAbort?.signal)),window.addEventListener(\"popstate\",(function(){h(0,n\u003e1)}),(0,A.jT)(!0,this.removeOnAbort?.signal)),this.abortHandler=this.#n,this.importAggregator(e)}#n(){this.removeOnAbort?.abort(),this.abortHandler=void 0}}var it=i(3333);class ot extends b{static featureName=it.TZ;constructor(e,t=!0){super(e,it.TZ,t);const r=[e.init.page_action.enabled,e.init.performance.capture_marks,e.init.performance.capture_measures,e.init.user_actions.enabled];p.RI\u0026\u0026e.init.user_actions.enabled\u0026\u0026(it.Zp.forEach((e=\u003e(0,A.sp)(e,(e=\u003e(0,x.p)(\"ua\",[e],void 0,this.featureName,this.ee)),!0))),it.qN.forEach((e=\u003e(0,A.sp)(e,(e=\u003e(0,x.p)(\"ua\",[e],void 0,this.featureName,this.ee)))))),r.some((e=\u003ee))?this.importAggregator(e):this.deregisterDrain()}}var at=i(993),st=i(3785);class ct extends b{static featureName=at.TZ;constructor(e,t=!0){super(e,at.TZ,t);const r=this.ee;this.ee.on(\"wrap-logger-end\",(function([e]){const{level:t,customAttributes:n}=this;(0,st.R)(r,e,n,t)})),this.importAggregator(e)}}new class extends o{constructor(t,r){super(r),p.gm?(this.features={},(0,R.bQ)(this.agentIdentifier,this),this.desiredFeatures=new Set(t.features||[]),this.desiredFeatures.add(w),this.runSoftNavOverSpa=[...this.desiredFeatures].some((e=\u003ee.featureName===a.K7.softNav)),(0,d.j)(this,t,t.loaderType||\"agent\"),this.run()):(0,e.R)(21)}get config(){return{info:this.info,init:this.init,loader_config:this.loader_config,runtime:this.runtime}}run(){try{const t=u(this.agentIdentifier),r=[...this.desiredFeatures];r.sort(((e,t)=\u003ea.P3[e.featureName]-a.P3[t.featureName])),r.forEach((r=\u003e{if(!t[r.featureName]\u0026\u0026r.featureName!==a.K7.pageViewEvent)return;if(this.runSoftNavOverSpa\u0026\u0026r.featureName===a.K7.spa)return;if(!this.runSoftNavOverSpa\u0026\u0026r.featureName===a.K7.softNav)return;const n=function(e){switch(e){case a.K7.ajax:return[a.K7.jserrors];case a.K7.sessionTrace:return[a.K7.ajax,a.K7.pageViewEvent];case a.K7.sessionReplay:return[a.K7.sessionTrace];case a.K7.pageViewTiming:return[a.K7.pageViewEvent];default:return[]}}(r.featureName).filter((e=\u003e!(e in this.features)));n.length\u003e0\u0026\u0026(0,e.R)(36,{targetFeature:r.featureName,missingDependencies:n}),this.features[r.featureName]=new r(this)}))}catch(t){(0,e.R)(22,t);for(const e in this.features)this.features[e].abortHandler?.();const r=(0,R.Zm)();delete r.initializedAgents[this.agentIdentifier]?.api,delete r.initializedAgents[this.agentIdentifier]?.features,delete this.sharedAggregator;return r.ee.get(this.agentIdentifier).abort(),!1}}}({features:[he,w,N,Ne,_e,_,D,ot,ct,je,nt],loaderType:\"spa\"})})()})();\n","testAutomationFlags":{"disableAds":false,"disableIirisAuth":false,"disableWelcomeAd":false,"disableBigskyAd":false,"disableIirisRecommend":false,"disableDcts":false,"disableWeatherWidget":false,"disableCashGrainWidget":false,"disableCommoditiesWidget":false,"disableCaptcha":false,"disableCookieBanner":false,"overrideBrandStyling":"","overrideThemeStyling":""},"configState":{"font":{"primary":{"name":"Inter","url":"https://fonts.googleapis.com/css2?family=Inter:wght@100;200;300;400;500;600;700;800;900\u0026display=swap"},"secondary":{"name":"Inter","url":"https://fonts.googleapis.com/css2?family=Inter:wght@100;200;300;400;500;600;700;800;900\u0026display=swap"}},"theme":"theme1","uiBrand":"darkreading","isMarketsDivision":false,"image":{"brand":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/bltc94608acf452fd67/655cf371ab171e040a838b2a/329050_DR23_Graphics_Website_V5_Default_Image_v1.png","contributor":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt171e20ac163e523a/65004ec08c754b16dd16303c/Contributor_Avatar.png"},"media":{"brightcoveAccountId":"1568176135"},"newsletterSignupPromo":{"unbounceURL":"https://dr-resources.darkreading.com/free/w_defa3135/prgm.cgi"},"isOneTrustLoaded":false}},"routes/program.$slug":{"programName":"DR Technology","breadcrumbs":[{"url":"/","title":"Home"},{"url":"/program/dr-technology","title":"DR Technology"}],"moduleIds":[{"uid":"bltad62b8fad41921bc","contentTypeUid":"module_featured"},{"uid":"blt9ad9907cb77f5579","contentTypeUid":"module_content_spotlight"},{"uid":"blt58e6fde21ad78b2a","contentTypeUid":"module_three_column_highlight"},{"uid":"bltcd6630e4ee8adeb1","contentTypeUid":"module_text_box"},{"uid":"blt895cedc90adda7e4","contentTypeUid":"module_video_playlist"},{"uid":"blt876af5a3b6f88c2d","contentTypeUid":"module_content_cards"},{"uid":"blt99b255863a2ce473","contentTypeUid":"module_latest_content"}],"modules":[{"type":"module_top_featured","uid":"bltad62b8fad41921bc","data":{"title":"FEATURED ON DR TECHNOLOGY","features":[{"variant":"normal","contentType":"Article","thumbnail":{"src":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt665c5e44e3b036f8/6706f434d8c4923c6a1a9e28/mundissima-windows-11-photo-shutterstock.jpg","alt":"A screen showing the Windows 11 logo"},"articleName":"Microsoft Finally Releases Recall as Part of Windows Insider Preview","articleUrl":"/endpoint-security/microsoft-releases-recall-windows-insider-preview","listPageUrl":"/endpoint-security/microsoft-releases-recall-windows-insider-preview","linkAttrs":{},"mobileHeadline":"Microsoft Previews Recall in Windows Insider","date":"2024-11-27T13:06:15.000Z","webinarStartTime":"","categoryName":"Endpoint Security","categoryUrl":"/endpoint-security","contributors":[],"timeRead":3,"articleSummary":"The preview version now includes multiple security-focused additions Microsoft had promised to add, such as SecureBoot, BitLocker, and Windows Hello.","paidGating":{"paidContent":false,"paidProductTaxonomy":[]}},{"variant":"normal","contentType":"Article","thumbnail":{"src":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt6b376a9ebdf9876f/674616ddfbdcfd40f7ec33c3/AWS-GK_Images-Alamy.jpg","alt":"AWS logo against a black background."},"articleName":"AWS Rolls Out Updates to Amazon Cognito","articleUrl":"/identity-access-management-security/aws-rolls-out-updates-to-amazon-cognito","listPageUrl":"/identity-access-management-security/aws-rolls-out-updates-to-amazon-cognito","linkAttrs":{},"mobileHeadline":"AWS Rolls Out Updates to Amazon Cognito","date":"2024-11-26T19:02:53.000Z","webinarStartTime":"","categoryName":"Identity \u0026 Access Management Security","categoryUrl":"/cybersecurity-operations/identity-access-management-security","contributors":[{"name":"Jennifer Lawinski","link":"/author/jennifer-lawinski","avatar":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt64edbfe42402bf03/660b3a58f5fc7993e5562490/jennifer-lawinski.jpg","role":"Contributing Writer"}],"timeRead":1,"articleSummary":"Amazon Web Services' identity and access management platform has added new features that help developers implement secure, scalable, and customizable authentication solutions for their applications. ","paidGating":{"paidContent":false,"paidProductTaxonomy":[]}},{"variant":"normal","contentType":"Article","thumbnail":{"src":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt14e1d84c1085acdb/673e64b6791acf8e438a2080/Romolo_Tavani-phishing-credentials-shutterstock.jpg","alt":"phishing login credentials financial services FS-ISAC"},"articleName":"Phishing Prevention Framework Reduces Incidents by Half","articleUrl":"/cybersecurity-operations/phishing-prevention-framework-reduces-incidents-by-half","listPageUrl":"/cybersecurity-operations/phishing-prevention-framework-reduces-incidents-by-half","linkAttrs":{},"mobileHeadline":"Phishing Prevention Framework Cuts Abuse Incidents in Half","date":"2024-11-25T21:40:27.000Z","webinarStartTime":"","categoryName":"Cybersecurity Operations","categoryUrl":"/cybersecurity-operations","contributors":[{"name":"Robert Lemos, Contributing Writer","link":"/author/robert-lemos","avatar":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt28d2c260c33375ea/64f14ff471df6264a382aaa0/Robert-Lemos.png","role":""}],"timeRead":5,"articleSummary":"The anti-fraud plan calls for companies to create a pipeline for compiling attack information, along with formal processes to disseminate that intelligence across business groups.","paidGating":{"paidContent":false,"paidProductTaxonomy":[]}},{"variant":"normal","contentType":"Article","thumbnail":{"src":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt223c311856315d20/6744e00a9d8a1dee88068814/lyftoffice-Askar_Karimullin-alamy.jpg","alt":"Lyft Signage Logo on Top of Glass Building. Workplace Transport Company Office lit by pink sunset."},"articleName":"How AI Is Enhancing Security in Ridesharing","articleUrl":"/vulnerabilities-threats/ai-enhancing-ridesharing-security","listPageUrl":"/vulnerabilities-threats/ai-enhancing-ridesharing-security","linkAttrs":{},"mobileHeadline":"How AI Is Enhancing Security in Ridesharing","date":"2024-11-29T17:00:00.000Z","webinarStartTime":"","categoryName":"Vulnerabilities \u0026 Threats","categoryUrl":"/vulnerabilities-threats","contributors":[{"name":"Rachita Naik","link":"/author/rachita-naik","avatar":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt11960a1d49ec8b9e/6744c98e6614f6544ddb3b49/naik.jfif","role":"Machine Learning Engineer"}],"timeRead":5,"articleSummary":"Whether it's detecting fraudulent activity, preventing phishing, or protecting sensitive data, AI is transforming cybersecurity in ridesharing.","paidGating":{"paidContent":false,"paidProductTaxonomy":[]}},{"variant":"normal","contentType":"Article","thumbnail":{"src":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt6a62663944a43a13/674629fa4b6244f51f919947/TippaPatt-software-development-shutterstock.jpg","alt":"Two hands typing on a laptop's keyboard, with a digital overlay"},"articleName":"Ransomware Gangs Seek Pen Testers to Boost Quality","articleUrl":"/threat-intelligence/ransomware-gangs-seek-pen-testers-boost-professionalism","listPageUrl":"/threat-intelligence/ransomware-gangs-seek-pen-testers-boost-professionalism","linkAttrs":{},"mobileHeadline":"Ransomware Gangs Seek Pen Testers to Boost Quality","date":"2024-11-29T14:00:00.000Z","webinarStartTime":"","categoryName":"Threat Intelligence","categoryUrl":"/threat-intelligence","contributors":[{"name":"Robert Lemos, Contributing Writer","link":"/author/robert-lemos","avatar":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt28d2c260c33375ea/64f14ff471df6264a382aaa0/Robert-Lemos.png","role":""}],"timeRead":4,"articleSummary":"Qualified applicants must be able to test ransomware encryption and find bugs that might enable defenders to jailbreak the malware.","paidGating":{"paidContent":false,"paidProductTaxonomy":[]}}],"latestNews":[],"variant":"featuredWithAds","recentLabel":"","ctaButton":"","ctaButtonLink":"/","dateDisplay":"show","adPosition":"right","rectangleAdPos":"300_1v","moduleLocation":"modular_program","trackGtmUid":"module_featured"}},{"type":"module_content_spotlight","uid":"blt9ad9907cb77f5579","data":{"variant":"reversed","moduleDesign":"standard","mode":"dark","textAlignment":"left","content":{"articleUrl":"/cybersecurity-operations/survey-report-ai-ml-make-soc-better","keywords":[],"image":{"url":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/bltb488b813b54f31ab/673e529f3b1c9479ca463efc/tech-ttrendssoc-fig9.png","altText":"Figure 9. Chart of survey responses to the question \"How has AI/ML improved your SOC operations?\" Responses add up to more than 100 percent."},"articleSummary":"Efficiency is the name of the game for the security operations center — and 91% of cybersecurity pros say artificial intelligence and machine learning are winning that game.","summary":"TECHNOLOGY TRENDS","heading":"It's Near-Unanimous: AI, ML Make the SOC Better","mobileHeading":"It's Near-Unanimous: AI, ML Make the SOC Better","body":"Efficiency is the name of the game for the security operations center — and 91% of cybersecurity pros say artificial intelligence and machine learning are winning that game.","articleBody":[{"type":"paragraph","attrs":{"textAlign":"left"},"content":[{"type":"text","text":"Only 9% of cybersecurity professionals said that new artificial intelligence (AI) and machine learning (ML) tools have not improved their security operations center (SOC) functionality, according to Dark Reading's latest research on enterprise security. The vast majority of respondents saw noticeable rises in speed, accuracy, and efficiency — good news for those frontline workers."}]},{"type":"paragraph","attrs":{"textAlign":"left"},"content":[{"type":"text","text":"In Dark Reading's Artificial Intelligence and Machine Learning in Cybersecurity Survey, an equal number of respondents (31%) said AI and ML tools contributed to SOC performance by improving threat detection, automating routine tasks, and speeding up responses to threats. All of these improvements directly reflect the value that automation brings to improving response accuracy and operational efficiency in the SOC."}]},{"type":"paragraph","attrs":{"textAlign":"left"},"content":[{"type":"text","text":"One of the greatest challenges that "},{"type":"text","marks":[{"type":"link","attrs":{"href":"https://www.darkreading.com/cyberattacks-data-breaches/building-a-strong-soc-starts-with-people","target":"_blank","rel":null,"class":null}}],"text":"SOC analysts"},{"type":"text","text":" face now is an overwhelming volume of false positives raised by their security tools. Analysts have to sift through system alerts and discern which ones are "},{"type":"text","marks":[{"type":"link","attrs":{"href":"https://www.darkreading.com/vulnerabilities-threats/soc-teams-threat-detection-tools-stifling","target":"_blank","rel":null,"class":null}}],"text":"false positives"},{"type":"text","text":" and which ones are potential threats. The tediousness of that work can lead to missed warnings, slower incident response times, and dissatisfaction that can result in burnout. The good news is that AI and ML are perfectly suited for handling this kind of donkeywork."}]},{"type":"paragraph","attrs":{"textAlign":"left"},"content":[{"type":"text","text":"In fact, 24% said that AI and ML tools improved their SOC operations by reducing the volume of false positives."}]},{"type":"paragraph","attrs":{"textAlign":"left"},"content":[{"type":"text","text":"For 28% of Dark Reading respondents, AI and ML tools provided better visibility into "},{"type":"text","marks":[{"type":"link","attrs":{"href":"https://www.darkreading.com/cybersecurity-operations/cloud-security-powershell-expertise-emerge-as-key-soc-analyst-skills","target":"_blank","rel":null,"class":null}}],"text":"security events"},{"type":"text","text":", and 24% cited improved efficiency in handling security events. A quarter of respondents cited quicker response times from SOC personnel as a positive effect of these tools. AI and ML tools are gaining traction in enterprises, and these responses show those technologies are already making a positive impact on enterprise security posture."}]},{"type":"paragraph","attrs":{"textAlign":"left"},"content":[{"type":"text","text":"For more on the impact of AI and ML on cybersecurity, download the Dark Reading report \""},{"type":"text","marks":[{"type":"link","attrs":{"href":"https://dr-resources.darkreading.com/free/w_defa7199/?p=w_defa7199","target":"_blank","rel":null,"class":null}}],"text":"The State of Artificial Intelligence and Machine Learning in Cybersecurity"},{"type":"text","text":".\""}]}],"callToAction":{"text":"Read More","url":"/cybersecurity-operations/survey-report-ai-ml-make-soc-better"},"categoryName":"Cybersecurity Operations","categoryUrl":"/cybersecurity-operations","date":"2024-11-20T21:27:02.000Z","linkAttrs":{},"timeRead":2,"paidGating":{"paidContent":false,"paidProductTaxonomy":[]}},"title":"TECH TRENDS","contentType":"Article","listPageUrl":"","moduleLocation":"modular_program"}},{"type":"module_three_column_highlight","uid":"blt58e6fde21ad78b2a","data":{"title":"DR TECH 3 column highlight","moduleLocation":"modular_program","dateDisplay":"show","data":[{"contents":[{"type":"contentPreview","data":{"contentType":"Article","variant":"card-horizontal","layoutVariant":"horizontal","thumbnail":{"src":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/bltb488b813b54f31ab/673e529f3b1c9479ca463efc/tech-ttrendssoc-fig9.png","alt":"Figure 9. Chart of survey responses to the question \"How has AI/ML improved your SOC operations?\" Responses add up to more than 100 percent."},"articleName":"It's Near-Unanimous: AI, ML Make the SOC Better","articleSummary":"Efficiency is the name of the game for the security operations center — and 91% of cybersecurity pros say artificial intelligence and machine learning are winning that game.","articleBody":[{"type":"paragraph","attrs":{"textAlign":"left"},"content":[{"type":"text","text":"Only 9% of cybersecurity professionals said that new artificial intelligence (AI) and machine learning (ML) tools have not improved their security operations center (SOC) functionality, according to Dark Reading's latest research on enterprise security. The vast majority of respondents saw noticeable rises in speed, accuracy, and efficiency — good news for those frontline workers."}]},{"type":"paragraph","attrs":{"textAlign":"left"},"content":[{"type":"text","text":"In Dark Reading's Artificial Intelligence and Machine Learning in Cybersecurity Survey, an equal number of respondents (31%) said AI and ML tools contributed to SOC performance by improving threat detection, automating routine tasks, and speeding up responses to threats. All of these improvements directly reflect the value that automation brings to improving response accuracy and operational efficiency in the SOC."}]},{"type":"paragraph","attrs":{"textAlign":"left"},"content":[{"type":"text","text":"One of the greatest challenges that "},{"type":"text","marks":[{"type":"link","attrs":{"href":"https://www.darkreading.com/cyberattacks-data-breaches/building-a-strong-soc-starts-with-people","target":"_blank","rel":null,"class":null}}],"text":"SOC analysts"},{"type":"text","text":" face now is an overwhelming volume of false positives raised by their security tools. Analysts have to sift through system alerts and discern which ones are "},{"type":"text","marks":[{"type":"link","attrs":{"href":"https://www.darkreading.com/vulnerabilities-threats/soc-teams-threat-detection-tools-stifling","target":"_blank","rel":null,"class":null}}],"text":"false positives"},{"type":"text","text":" and which ones are potential threats. The tediousness of that work can lead to missed warnings, slower incident response times, and dissatisfaction that can result in burnout. The good news is that AI and ML are perfectly suited for handling this kind of donkeywork."}]},{"type":"paragraph","attrs":{"textAlign":"left"},"content":[{"type":"text","text":"In fact, 24% said that AI and ML tools improved their SOC operations by reducing the volume of false positives."}]},{"type":"paragraph","attrs":{"textAlign":"left"},"content":[{"type":"text","text":"For 28% of Dark Reading respondents, AI and ML tools provided better visibility into "},{"type":"text","marks":[{"type":"link","attrs":{"href":"https://www.darkreading.com/cybersecurity-operations/cloud-security-powershell-expertise-emerge-as-key-soc-analyst-skills","target":"_blank","rel":null,"class":null}}],"text":"security events"},{"type":"text","text":", and 24% cited improved efficiency in handling security events. A quarter of respondents cited quicker response times from SOC personnel as a positive effect of these tools. AI and ML tools are gaining traction in enterprises, and these responses show those technologies are already making a positive impact on enterprise security posture."}]},{"type":"paragraph","attrs":{"textAlign":"left"},"content":[{"type":"text","text":"For more on the impact of AI and ML on cybersecurity, download the Dark Reading report \""},{"type":"text","marks":[{"type":"link","attrs":{"href":"https://dr-resources.darkreading.com/free/w_defa7199/?p=w_defa7199","target":"_blank","rel":null,"class":null}}],"text":"The State of Artificial Intelligence and Machine Learning in Cybersecurity"},{"type":"text","text":".\""}]}],"mobileHeadline":"It's Near-Unanimous: AI, ML Make the SOC Better","articleUrl":"/cybersecurity-operations/survey-report-ai-ml-make-soc-better","listPageUrl":"/cybersecurity-operations/survey-report-ai-ml-make-soc-better","linkAttrs":{},"date":"Nov 20, 2024","timeRead":2,"categoryName":"Cybersecurity Operations","categoryUrl":"/cybersecurity-operations","contributors":[{"name":"Dark Reading Staff","avatar":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt99b391f0439c1434/64f179af7de67f4e4300e517/285801_DR23_Graphics_Website_Author_Logo_0.jpg","link":"/author/dark-reading-staff"}],"paidGating":{"paidContent":false,"paidProductTaxonomy":[]}}},{"type":"contentPreview","data":{"contentType":"Article","variant":"card-horizontal","layoutVariant":"horizontal","thumbnail":{"src":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt57707039dda73ff7/673341c03f9de2939d0bb53f/tech-sans-ics-ot.jpg","alt":""},"articleName":"Incident Response, Anomaly Detection Rank High on Planned ICS Security Spending","articleSummary":"The \"SANS 2024 State of ICS/OT Cybersecurity\" report suggests organizations are going to shift spending from security technologies protecting industrial control systems and operational technology environments to nontechnical activities, such as training and incident response.","articleBody":[{"type":"paragraph","attrs":{"textAlign":"left"},"content":[{"type":"text","text":"In the \""},{"type":"text","marks":[{"type":"link","attrs":{"href":"https://sansorg.egnyte.com/dl/5mD1Yxiybn","target":"_self","rel":null,"class":null}}],"text":"SANS 2024 State of ICS/OT Cybersecurity"},{"type":"text","text":"\" report, 530 professionals working in critical infrastructure sectors were asked which technologies they have in their operational technology (OT) environments and which ones they were planning to add in the next year-and-a-half. The two lists highlight which technologies are widely deployed and what areas security teams are going to focus on next. "}]},{"type":"paragraph","attrs":{"textAlign":"left"},"content":[{"type":"text","text":"The top technologies currently in use are access controls (81%); backup and recovery tools (74.4%); endpoint detection and response (EDR) tools, such as traditional antivirus (73%); segmentation between control systems and higher risk networks (66%); and secure remote access with multifactor authentication (65%). These categories have seen \"massive jumps in implementation,\" SANS said in the report. Just 53% of respondents reported using EDR in 2019, which comes out to a 20% increase in 2024."}]},{"type":"paragraph","attrs":{"textAlign":"left"},"content":[{"type":"text","text":"\"We often describe ICS/OT as the 'M\u0026M' model: hard shell, gooey center. This is why we focus a lot on IT–OT boundaries (i.e., the hard shell),\" the report said. \"However, security professionals need to also focus on toughening up that gooey center.\""}]},{"type":"paragraph","attrs":{"textAlign":"left"},"content":[{"type":"text","text":"Securing that \"gooey center\" may be one of the reasons for a shift suggesting more nontechnology spending, such as for training, simulations, and incident response. Indeed, the five most-planned activities for the next 18 months are implementing industrial control system (ICS) specific cybersecurity metrics or dashboards (37%), deploying ICS network security monitoring and anomaly detection (33%), rolling out control system enhancements and upgrades (32%), conducting ICS-specific cybersecurity training (31%), and running ICS-specific incident response tabletops or simulations (30%). "}]},{"type":"paragraph","attrs":{"textAlign":"left"},"content":[{"type":"text","text":"With the exception of cybersecurity metrics and dashboards, these planned technologies are already in use by nearly half of the respondents. The fact that another 30%-plus are making plans to use them suggests that the industry is on the brink of another jump in implementation in these areas."}]},{"type":"paragraph","attrs":{"textAlign":"left"},"content":[{"type":"text","text":"It's worth noting that the three least deployed technologies for ICS defense had a \"surprisingly\" larger number of respondents planning to invest in them over the next year-and-a-half. Roughly a quarter of respondents have deployed the following technologies and solutions at this time: software bill of materials, or SBOM(25%), industrial cloud security (26%), and security orchestration, automation, and response, or SOAR (28%). A higher-than-average number of respondents have plans to start using SBOM (28%), industrial control security (23%), and SOAR (30%). "}]},{"type":"paragraph","attrs":{"textAlign":"left"},"content":[{"type":"text","text":"The planned rates indicate these technologies may become more common across ICS security programs soon, SANS said."}]}],"mobileHeadline":"Planned ICS Security Spending: Incident Response, Anomaly Detection","articleUrl":"/ics-ot-security/incident-response-anomaly-detection-rank-high-on-planned-ics-security-spending","listPageUrl":"/ics-ot-security/incident-response-anomaly-detection-rank-high-on-planned-ics-security-spending","linkAttrs":{},"date":"Nov 11, 2024","timeRead":2,"categoryName":"ICS/OT Security","categoryUrl":"/ics-ot-security","contributors":[{"name":"Jennifer Lawinski","avatar":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt64edbfe42402bf03/660b3a58f5fc7993e5562490/jennifer-lawinski.jpg","link":"/author/jennifer-lawinski"}],"paidGating":{"paidContent":false,"paidProductTaxonomy":[]}}},{"type":"contentPreview","data":{"contentType":"Article","variant":"card-horizontal","layoutVariant":"horizontal","thumbnail":{"src":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/bltb32c902ebe95128a/67292cedd53ac5549ef0c621/fig2-techtrends110524-darkreading.png","alt":"Figure 2 asks, What AI/ML-enhanced solutions are you using in your cybersecurity operations?"},"articleName":"Antivirus, Anti-Malware Lead Demand for AI/ML Tools","articleSummary":"Companies are attaching the artificial intelligence term to everything these days, but in cybersecurity, machine learning is more than hype.","articleBody":[{"type":"paragraph","attrs":{"textAlign":"left"},"content":[{"type":"text","text":"Artificial intelligence (AI) and machine learning (ML) tools are gaining traction in enterprises, and the rate of adoption is particularly notable in cybersecurity operations, where these technologies are being used to improve enterprise security posture, according to Dark Reading's latest research on enterprise cybersecurity."}]},{"type":"paragraph","attrs":{"textAlign":"left"},"content":[{"type":"text","text":"Dark Reading's Artificial Intelligence and Machine Learning in Cybersecurity Survey found that enterprises are using AI and ML in a range of cybersecurity technologies, such as firewalls, endpoint detection and response platforms, security information and event management systems, and network traffic analyzers. Antivirus/anti-malware was the only security technology enhanced with AI and ML that was used by more than half of the respondents (51%). This is not surprising, as "},{"type":"text","marks":[{"type":"link","attrs":{"href":"https://www.darkreading.com/endpoint-security/antivirus-from-stand-alone-product-to-endpoint-feature","target":"_blank","rel":null,"class":null}}],"text":"back in 2017"},{"type":"text","text":" practitioners were already beginning to implement AI/ML in corporate antivirus measures."}]},{"type":"paragraph","attrs":{"textAlign":"left"},"content":[{"type":"text","text":"Cybersecurity professionals have to match the bad actors who are sourcing AI/ML technologies for their purposes. The arms race between CISOs and their adversaries may be driving adoption of tools with AI and ML capabilities in areas such as phishing detection (49%), threat detection and response (45%), and endpoint security (40%). One-third of the AI/ML integration in real-world security teams comes in the form of malware analysis (38%), intrusion detection and prevention (35%), threat intelligence (35%), identity and access management (34%), network security/network traffic analysis (33%), vulnerability management (32%), and security information and event management (31%)."}]},{"type":"paragraph","attrs":{"textAlign":"left"},"content":[{"type":"text","text":"About a quarter of respondents mentioned using AI/ML in user behavior analytics/predictive analytics (27%), fraud detection (27%), automated security operations (26%), and automated incident response (25%). While that is still a sizable chunk of companies, the slightly lower adoption rate suggests that this grouping represents developing features."}]},{"type":"paragraph","attrs":{"textAlign":"left"},"content":[{"type":"text","text":"For more on the impact of AI/ML on cybersecurity, download the Dark Reading report \""},{"type":"text","marks":[{"type":"link","attrs":{"href":"https://dr-resources.darkreading.com/free/w_defa7199/?p=w_defa7199","target":"_blank","rel":null,"class":null}}],"text":"The State of Artificial Intelligence and Machine Learning in Cybersecurity"},{"type":"text","text":".\""}]}],"mobileHeadline":"Antivirus, Anti-Malware Lead Demand for AI/ML Tools","articleUrl":"/cybersecurity-operations/antivirus-antimalware-demand-ai-ml-tools","listPageUrl":"/cybersecurity-operations/antivirus-antimalware-demand-ai-ml-tools","linkAttrs":{},"date":"Nov 4, 2024","timeRead":2,"categoryName":"Cybersecurity Operations","categoryUrl":"/cybersecurity-operations","contributors":[{"name":"Dark Reading Staff","avatar":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt99b391f0439c1434/64f179af7de67f4e4300e517/285801_DR23_Graphics_Website_Author_Logo_0.jpg","link":"/author/dark-reading-staff"}],"paidGating":{"paidContent":false,"paidProductTaxonomy":[]}}}],"title":"DR Technology Trends","moreContent":{"title":"MORE DR TECHNOLOGY TRENDS","url":"/program/dr-tech-trends"}},{"contents":[{"type":"contentPreview","data":{"contentType":"Article","variant":"card-horizontal","layoutVariant":"horizontal","thumbnail":{"src":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt13bf1affe8923637/67350f06072cb331ecd50aea/cloud-connections_Zoonar_GmbH_Alamy_Stock_Photo.jpg","alt":"Scene of blue skiy with wispy clouds"},"articleName":"DeepTempo Launches AI-Based Security App for Snowflake","articleSummary":"DeepTempo's Tempo is a deep learning-based Snowflake native app that allows organizations to detect and respond to evolving threats directly within their Snowflake environments. ","articleBody":[{"type":"paragraph","attrs":{"textAlign":"left"},"content":[{"type":"text","text":"Organizations are harnessing artificial intelligence (AI) to boost their security teams' productivity and detect potential threats. DeepTempo emerged from stealth on Nov. 12 with Tempo, a deep learning-based Snowflake native app. Tempo helps security teams maintain data privacy and compliance while boosting enterprise defenses, the company in a statement. DeepTempo is integrating AI-powered security capabilities into an established cloud environment, in this case, Snowflake."}]},{"type":"paragraph","attrs":{"textAlign":"left"},"content":[{"type":"text","text":"Organizations benefit from faster detection of attack indicators, including new and and evolving threats, within their Snowflake environments, the company said. They can also optimize security spending by running Tempo on existing security data lakes."}]},{"type":"paragraph","attrs":{"textAlign":"left"},"content":[{"type":"text","text":"DeepTempo built and trained a log language model (LLGM) to detects anomalies in network traffic and other services. The algorithm was pretrained on large amounts of log data to focus on the pattern of events, including relative and absolute time. Tempo has been optimized to work with Netflow data, and the company is recruiting teams with similar logs, such as VPC Flow, as design partners. Interested security teams can "},{"type":"text","marks":[{"type":"link","attrs":{"href":"https://quickstarts.snowflake.com/guide/getting_started_with_tempo_and_snowflake/index.html#0","target":"_self","rel":null,"class":null}}],"text":"try out with Tempo"},{"type":"text","text":" with a sample data set from the Canadian Institute for Cybersecurity and view the output in Splunk."}]},{"type":"paragraph","attrs":{"textAlign":"left"},"content":[{"type":"text","text":"Along with detecting anomalies, Tempo provides additional context that can be used for security triage and response, such as looking up similar patterns from the MITRE ATT\u0026CK framework and listing potentially impacted entities. Tempo also allows \"organizations to keep more of their logs within Snowflake and use their SIEMs primarily for incident response rather than log storage,\" the company said. DeepTempo said a large financial institution projected savings of \"several million dollars, representing up to 45 percent of their existing SIEM spending\" by using Snowflake as its system of record and not relying on a separate security information and event management (SIEM) system."}]},{"type":"paragraph","attrs":{"textAlign":"left"},"content":[{"type":"text","text":"\"Tempo has demonstrated a unique blend of accuracy and practicality, with false positive and false negative rates lower than one percent after adaptation to a new user’s domain,\" the company said, noting that Tempo doesn't need to know the different attack patterns. \"It simply recognizes when activities deviate from the norm, triggering detection for any threat that emerges.\""}]}],"mobileHeadline":"DeepTempo Launches AI-Based Security App for Snowflake","articleUrl":"/cybersecurity-operations/untitled","listPageUrl":"/cybersecurity-operations/untitled","linkAttrs":{},"date":"Nov 20, 2024","timeRead":2,"categoryName":"Cybersecurity Operations","categoryUrl":"/cybersecurity-operations","contributors":[{"name":"Dark Reading Staff","avatar":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt99b391f0439c1434/64f179af7de67f4e4300e517/285801_DR23_Graphics_Website_Author_Logo_0.jpg","link":"/author/dark-reading-staff"}],"paidGating":{"paidContent":false,"paidProductTaxonomy":[]}}},{"type":"contentPreview","data":{"contentType":"Article","variant":"card-horizontal","layoutVariant":"horizontal","thumbnail":{"src":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt2e083f08865b175c/66f2c37003ecc04ce5a19432/Risk(1800)-Olekcii_Mach_Alamy.jpg","alt":"A keyboard with a red key marked RISK"},"articleName":"RIIG Launches With Risk Intelligence Solutions","articleSummary":"RIIG is a risk intelligence and cybersecurity solutions provider offering open source intelligence solutions designed for zero-trust environments. ","articleBody":[{"type":"paragraph","attrs":{"textAlign":"left"},"content":[{"type":"text","text":"As cyber threats get more sophisticated and the volume of attacks increase, organizations are looking at how artificial intelligence (AI) can help beef up defenses. RIIG, a risk intelligence and cybersecurity solutions provider, combines AI And machine learning technologies with network threat detection to provide risk intelligence. With access to 17 intelligence agencies and collaborations with commercial partners, RIIG provides organizations with high-quality, verifiable data and advanced intelligence, the company said in a statement."}]},{"type":"paragraph","attrs":{"textAlign":"left"},"content":[{"type":"text","text":"Charlottesville-Va.-based RIIG, which emerged from stealth today, specializes in \"white hat data trust services\" and offers open source risk intelligence for "},{"type":"text","marks":[{"type":"link","attrs":{"href":"https://www.darkreading.com/cybersecurity-operations/6-ciso-takeaways-nsa-zero-trust-guidance","target":"_self","rel":null,"class":null}}],"text":"zero-trust environments"},{"type":"text","text":", the company said. RIIG offers both risk intelligence offerings, such as open source intelligence, regulation, and forensics, as well as cybersecurity solutions, such as vulnerability assessments, strategic implementation, and tech validation. "}]},{"type":"paragraph","attrs":{"textAlign":"left"},"content":[{"type":"text","text":"RIIG plans to partner with local academic institutions for access to industry-leading research and "},{"type":"text","marks":[{"type":"link","attrs":{"href":"https://www.darkreading.com/cybersecurity-operations/uva-wins-second-consecutive-national-collegiate-cyber-defense-championship","target":"_self","rel":null,"class":null}}],"text":"talent"},{"type":"text","text":". "}]},{"type":"paragraph","attrs":{"textAlign":"left"},"content":[{"type":"text","text":"The company also announced it raised $3 million in seed funding, led by the Felton Group. The funds will be used to accelerate product development and expand client support."}]}],"mobileHeadline":"RIIG Launches With Risk Intelligence Solutions ","articleUrl":"/cyber-risk/riig-launches-risk-intelligence-solutions","listPageUrl":"/cyber-risk/riig-launches-risk-intelligence-solutions","linkAttrs":{},"date":"Nov 20, 2024","timeRead":1,"categoryName":"Cyber Risk","categoryUrl":"/cyber-risk","contributors":[{"name":"Dark Reading Staff","avatar":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt99b391f0439c1434/64f179af7de67f4e4300e517/285801_DR23_Graphics_Website_Author_Logo_0.jpg","link":"/author/dark-reading-staff"}],"paidGating":{"paidContent":false,"paidProductTaxonomy":[]}}},{"type":"contentPreview","data":{"contentType":"Article","variant":"card-horizontal","layoutVariant":"horizontal","thumbnail":{"src":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt25563b5d5c98516a/66f475229441d64a76fe188c/trophy1800_Zoonar_GmbH_alamy.jpg","alt":"a brass two-handled trophy against a red curtain in the background."},"articleName":"Frenos Takes Home the Prize at 2024 DataTribe Challenge","articleSummary":"Frenos offers a zero-impact, continuous security assessment platform for operational technology environments. ","articleBody":[{"type":"paragraph","attrs":{"textAlign":"left"},"content":[{"type":"text","text":"Continuous security assessment platform newcomer Frenos narrowly edged out the competition to win this year's DataTribe Challenge, held by seed-stage venture capital firm DataTribe."}]},{"type":"paragraph","attrs":{"textAlign":"left"},"content":[{"type":"text","text":"Four finalists were chosen from hundreds of preseed and seed stage cybersecurity and data science startups, and each got to present their case during Wednesday's finals. The finalists, who will split part of a $25,000 prize, presented their businesses to a panel of judges, investors, and industry leaders. They also received one-on-one messaging and strategy coaching from DataTribe."}]},{"type":"paragraph","attrs":{"textAlign":"left"},"content":[{"type":"text","text":"Whether the finalists had the right teams in place and were truly experts in their fields played a big part in their evaluations, says DataTribe chief innovation officer Leo Scott. The judges also assessed the addressable market for their offering and how well they meet that need. "}]},{"type":"paragraph","attrs":{"textAlign":"left"},"content":[{"type":"text","text":"Frenos, based in Charlotte, NC, did both. The startup created a zero-impact, continuous security assessment platform for operational technology (OT) environments, giving organizations the ability to perform attack simulations and penetration testing. "}]},{"type":"paragraph","attrs":{"textAlign":"left"},"content":[{"type":"text","text":"\"They are truly leading experts in the OT environment,\" Scott says. \"And if you look into the geopolitical landscape, it is a pretty important space, from broad national security to literally keeping the lights on.\""}]},{"type":"paragraph","attrs":{"textAlign":"left"},"content":[{"type":"text","text":"The three others finalists were Austin, Texas-based DataMonstr, Red Bank, NJ-based Force Field, and San Francisco-based Validia."}]},{"type":"bulletList","content":[{"type":"listItem","content":[{"type":"paragraph","attrs":{"textAlign":"left"},"content":[{"type":"text","text":"DataMonstr provides protection to the developer environment, both at developer endpoints and at the source code repository level. "}]}]},{"type":"listItem","content":[{"type":"paragraph","attrs":{"textAlign":"left"},"content":[{"type":"text","text":"Force Field offers a system that verifies the authenticity of photos, videos, and audio to reduce fraud in areas like insurance claims. "}]}]},{"type":"listItem","content":[{"type":"paragraph","attrs":{"textAlign":"left"},"content":[{"type":"text","text":"Validia provides real-time identify verification to combat deepfakes and impersonation in remote work environments. "}]}]}]},{"type":"paragraph","attrs":{"textAlign":"left"},"content":[{"type":"text","text":"Brian Proctor, founder and CEO of Frenos, says "},{"type":"text","marks":[{"type":"link","attrs":{"href":"https://frenos.io/blog/proactive-defense-zero-disruption-why-frenos-won-the-datatribe-challenge","target":"_self","rel":null,"class":null}}],"text":"participating in the competition"},{"type":"text","text":" has helped his company on its road to landing seed funding. "}]},{"type":"paragraph","attrs":{"textAlign":"left"},"content":[{"type":"text","text":"\"One of the great things about it, which we really liked, is that every finalist is assigned an adviser from DataTribe. So they really work hand in hand with you to refine the pitch [and give] feedback on your presentation,\" Proctor says. \"We had an excellent adviser, David, who was part of our team. Honestly, without David, I'm not sure what the outcome would have been. He was a huge help.\""}]},{"type":"paragraph","attrs":{"textAlign":"left"},"content":[{"type":"text","text":"DataTribe has invested in eight of the finalists from its six previous competitions, and more than 20 companies have received funding after participating in the competition, Scott says."}]},{"type":"paragraph","attrs":{"textAlign":"left"},"content":[{"type":"text","marks":[{"type":"italic"}],"text":"Check out what DataTribe's Leo Scott had to say regarding the DataTribe Challenge in this Dark Reading News Desk segment from Black Hat USA 2024."}]},{"type":"paragraph","attrs":{"textAlign":"left"}},{"type":"iframe","attrs":{"width":"100%","height":"nullpx","scrolling":null,"frameBorder":"0","allow":null,"src":"https://www.youtube.com/embed/mhC-8qw5D9w","loading":"lazy"}}],"mobileHeadline":"Frenos Takes Home the Prize at 2024 DataTribe Challenge","articleUrl":"/ics-ot-security/frenos-takes-home-prize-2024-datatribe-challenge","listPageUrl":"/ics-ot-security/frenos-takes-home-prize-2024-datatribe-challenge","linkAttrs":{},"date":"Nov 14, 2024","timeRead":2,"categoryName":"ICS/OT Security","categoryUrl":"/ics-ot-security","contributors":[{"name":"Jennifer Lawinski","avatar":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt64edbfe42402bf03/660b3a58f5fc7993e5562490/jennifer-lawinski.jpg","link":"/author/jennifer-lawinski"}],"paidGating":{"paidContent":false,"paidProductTaxonomy":[]}}}],"title":"DR Emerging Tech","moreContent":{"title":"MORE DR EMERGING TECH","url":"/program/dr-emerging-tech"}},{"contents":[{"type":"contentPreview","data":{"contentType":"Video","variant":"card-horizontal","layoutVariant":"horizontal","thumbnail":{"src":"","alt":""},"articleName":"Darktrace's Tony Jarvis on Shifting Security Gears as We Move to the Cloud","articleSummary":"In this new episode of Tech Talks, Darktrace's Tony Jarvis and Dark Reading's Terry Sweeney discuss how to protect networks after the death of the perimeter.","articleBody":[{"type":"paragraph","attrs":{"textAlign":"left"},"content":[{"type":"text","text":"The pandemic-propelled shift to work-from-home and bring-your-own-devices accelerated the already expanding move to the cloud. IDC predicts that global cloud spending will grow from $703 billion in 2021 to "},{"type":"text","marks":[{"type":"link","attrs":{"href":"https://www.idc.com/getdoc.jsp?containerId=prUS48208321","target":"_blank","rel":null,"class":null}}],"text":"$1.3 trillion in 2025"},{"type":"text","text":". Statista reports that the percentage of corporate data stored on the cloud rose from 30% in 2015 to 48% at the beginning of the COVID-19 crisis in 2019; so far in 2022, "},{"type":"text","marks":[{"type":"link","attrs":{"href":"https://www.statista.com/statistics/1062879/worldwide-cloud-storage-of-corporate-data/","target":"_blank","rel":null,"class":null}}],"text":"60% of corporate data lives in the cloud"},{"type":"text","text":" rather than on-premises networks."}]},{"type":"paragraph","attrs":{"textAlign":"left"},"content":[{"type":"text","text":"In this installment of Tech Talks, Tony Jarvis, director of enterprise security for Asia Pacific and Japan for Darktrace, and Dark Reading contributing editor Terry Sweeney discuss the rise of the cloud, the decline of on-premises, and the possible death of the traditional perimeter in the wake of those technological shifts. "}]},{"type":"paragraph","attrs":{"textAlign":"left"},"content":[{"type":"text","text":"\"There's a lot of digital transformation that's taken place virtually overnight,\" Jarvis says. \"Some organizations are struggling with this. And for that reason, they're not going to fully abandon on-premise networks anytime soon.\""}]},{"type":"paragraph","attrs":{"textAlign":"left"},"content":[{"type":"text","text":"Indeed, a recent InformationWeek report shows that while IT pros widely use cloud services, they believe the "},{"type":"text","marks":[{"type":"link","attrs":{"href":"/cloud-security/it-pros-may-use-cloud-but-they-trust-on-prem-more","target":"_blank","rel":null,"class":null}}],"text":"cloud is less secure"},{"type":"text","text":" than their traditional on-premises systems. Over half of respondents (55%) would keep sensitive data on-prem if they could, the report indicates."}]},{"type":"paragraph","attrs":{"textAlign":"left"},"content":[{"type":"text","text":"As on-premises networks decline in favor of cloud resources, however, those IT departments need new security measures to accommodate the new IT environment. "}]},{"type":"paragraph","attrs":{"textAlign":"left"},"content":[{"type":"text","text":"\"There's no real perimeter anymore — not in the traditional sense — and that means that things can get in through a number of different ways. We need to get better at detecting that,\" Jarvis says."}]},{"type":"paragraph","attrs":{"textAlign":"left"},"content":[{"type":"text","text":"New incursion paths require new ways to guard against invasion. At the beginning of 2022, the US Office of Management and Budget released a "},{"type":"text","marks":[{"type":"link","attrs":{"href":"/endpoint-security/the-zero-trust-timer-is-on-for-federal-agencies-how-ready-are-they-","target":"_blank","rel":null,"class":null}}],"text":"detailed blueprint for security measures"},{"type":"text","text":" it requires government agencies and vendors to implement, and zero-trust policies ranked prominently. Sweeney asked Jarvis whether he thinks zero-trust architectures can keep endpoint devices secure when they're away from VPNs."}]},{"type":"paragraph","attrs":{"textAlign":"left"},"content":[{"type":"text","text":"\"I think of zero trust almost like a new set of rules or a new perimeter. And we want to be looking for anomalies taking place within that perimeter,\" Jarvis says. That means looking for unusual behaviors that will give away an attacker's motivations, such as "},{"type":"text","marks":[{"type":"link","attrs":{"href":"/cyberattacks-data-breaches/stop-zero-day-ransomware-cold-with-ai","target":"_blank","rel":null,"class":null}}],"text":"lateral movement"},{"type":"text","text":" and "},{"type":"text","marks":[{"type":"link","attrs":{"href":"/cyber-risk/how-to-stop-hackers-from-turning-your-systems-against-you","target":"_blank","rel":null,"class":null}}],"text":"living-off-the-land"},{"type":"text","text":" techniques. Artificial intelligence tools can automatically look for deviations from the norm and cut off those actions."}]},{"type":"paragraph","attrs":{"textAlign":"left"},"content":[{"type":"text","text":"Of course, cloud security means accepting that attackers don't care if they are targeting cloud or on-premises systems. Focusing on one at the expense of the other is a problem. The attacks will focus on wherever they see weakness."}]},{"type":"paragraph","attrs":{"textAlign":"left"},"content":[{"type":"text","text":"\"We're always thinking not in terms of good or bad per se, but more in terms of normal — Does this belong in the environment? — and then, by association, unusual,\" Jarvis said. \"Attackers will always go after the weak spots; they'll go after whatever gives them the greatest chance of getting in, no matter where that is.\""}]}],"mobileHeadline":"Darktrace's Tony Jarvis on Shifting Security Gears as We Move to the Cloud","articleUrl":"/cloud-security/tony-jarvis-on-shifting-security-gears-as-we-move-to-the-cloud","listPageUrl":"/cloud-security/tony-jarvis-on-shifting-security-gears-as-we-move-to-the-cloud","linkAttrs":{},"date":"Jun 13, 2022","timeRead":0,"categoryName":"Сloud Security","categoryUrl":"/cloud-security","contributors":[{"name":"Dark Reading Staff","avatar":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt99b391f0439c1434/64f179af7de67f4e4300e517/285801_DR23_Graphics_Website_Author_Logo_0.jpg","link":"/author/dark-reading-staff"}],"paidGating":null}},{"type":"contentPreview","data":{"contentType":"Video","variant":"card-horizontal","layoutVariant":"horizontal","thumbnail":{"src":"","alt":""},"articleName":"Darktrace's Brianna Leddy on How Ransomware Groups Adapt to New Defenses","articleSummary":"In this Tech Talk, Darktrace's Brianna Leddy and Dark Reading's Terry Sweeney discuss ways ransomware groups adapt their activities as enterprise security teams evolve their defenses and controls.","articleBody":[{"type":"paragraph","attrs":{"textAlign":"left"},"content":[{"type":"text","text":"Ransomware groups are difficult to shut down because they are constantly adapting their techniques to evade newer security defenses and controls. In this Tech Talk, Brianna Leddy, director of analysis at Darktrace, says that just because an attack group ceases operations doesn't mean they won't reemerge in a different form."}]},{"type":"paragraph","attrs":{"textAlign":"left"},"content":[{"type":"text","text":"For example, researchers believe that the DarkSide group behind the ransomware attack against Colonial Pipeline "},{"type":"text","marks":[{"type":"link","attrs":{"href":"https://www.darkreading.com/threat-intelligence/who-is-blackmatter-researchers-piece-together-new-threat-group","target":"_blank","rel":null,"class":null}}],"text":"returned as BlackMatter"},{"type":"text","text":", a ransomware-as-a-service group. DarkSide shut down its operations, presumably because of investigations by law enforcement and the US federal government "},{"type":"text","marks":[{"type":"link","attrs":{"href":"/cyberattacks-data-breaches/doj-seizes-2-3m-in-bitcoin-paid-to-colonial-pipeline-attackers","target":"_blank","rel":null,"class":null}}],"text":"clawing back the ransom payments"},{"type":"text","text":"."}]},{"type":"paragraph","attrs":{"textAlign":"left"},"content":[{"type":"text","text":"This past year, several affiliate groups working with the group behind REvil ransomware "},{"type":"text","marks":[{"type":"link","attrs":{"href":"https://www.darkreading.com/threat-intelligence/revil-arrests-trigger-uncertainty-concern-in-cybercrime-forums","target":"_blank","rel":null,"class":null}}],"text":"were arrested"},{"type":"text","text":". Even so, the fact that a site affiliated with REvil recently started "},{"type":"text","marks":[{"type":"link","attrs":{"href":"https://www.darkreading.com/threat-intelligence/revil-revival-ransomware-gangs-gone","target":"_blank","rel":null,"class":null}}],"text":"redirecting to a new site"},{"type":"text","text":" seems like an indicator that the group is back in operation."}]},{"type":"paragraph","attrs":{"textAlign":"left"},"content":[{"type":"text","text":"\"I don't think it's the last that we've heard of this name,\" Leddy says."}]},{"type":"paragraph","attrs":{"textAlign":"left"},"content":[{"type":"text","text":"Rebranding can also reflect a shift in tactics, Leddy says. As more organizations are scanning networks to look for malicious traffic, more attackers are beginning to \"live off the land,\" Leddy says. "},{"type":"text","marks":[{"type":"link","attrs":{"href":"/cyber-risk/catching-the-evasive-revil-ransomware-gang-with-ai","target":"_self","rel":null,"class":null}}],"text":"Living off the land"},{"type":"text","text":" refers to abusing legitimate administrator tools and services to blend in their malicious activities among all other normal, day-to-day network traffic. Attackers are also increasingly targeting cloud services and backup servers to make it more difficult for organizations to recover their encrypted files from the attack group."}]}],"mobileHeadline":"Darktrace's Brianna Leddy on How Ransomware Groups Adapt to New Defenses","articleUrl":"/cyberattacks-data-breaches/darktrace-s-brianna-leddy-on-how-ransomware-groups-adapt-to-new-defenses","listPageUrl":"/cyberattacks-data-breaches/darktrace-s-brianna-leddy-on-how-ransomware-groups-adapt-to-new-defenses","linkAttrs":{},"date":"Jun 8, 2022","timeRead":0,"categoryName":"Cyberattacks \u0026 Data Breaches","categoryUrl":"/cyberattacks-data-breaches","contributors":[{"name":"Dark Reading Staff","avatar":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt99b391f0439c1434/64f179af7de67f4e4300e517/285801_DR23_Graphics_Website_Author_Logo_0.jpg","link":"/author/dark-reading-staff"}],"paidGating":null}},{"type":"contentPreview","data":{"contentType":"Video","variant":"card-horizontal","layoutVariant":"horizontal","thumbnail":{"src":"","alt":""},"articleName":"Darktrace's David Masson on What Attacks on Critical Infrastructure Look Like","articleSummary":"In this Tech Talk, Darktrace's David Masson and Dark Reading's Terry Sweeney discuss the rise of destructive attacks against critical infrastructure.","articleBody":[{"type":"paragraph","attrs":{"textAlign":"left"},"content":[{"type":"text","text":"For years government regulators and security experts have been sounding the alarm about attacks that could cripple critical infrastructure — the assets and systems that support the functioning of a modern society and economy — but it took the attack against Colonial Pipeline for people to really pay attention, says David Masson, director of enterprise security with Darktrace."}]},{"type":"paragraph","attrs":{"textAlign":"left"},"content":[{"type":"text","text":"That ransomware attack showed people firsthand how a cyber threat actually stopped gas from coming out of the pump, says Masson in this Tech Talk conversation with Dark Reading's Terry Sweeney. It doesn't even matter that the attackers behind Colonial Pipeline likely did not intend that outcome."}]},{"type":"paragraph","attrs":{"textAlign":"left"},"content":[{"type":"text","marks":[{"type":"link","attrs":{"href":"/cyber-risk/what-we-ve-learned-in-the-12-months-since-the-colonial-pipeline-attack","target":"_blank","rel":null,"class":null}}],"text":"Since then"},{"type":"text","text":", several other critical infrastructure organizations have been hit by ransomware and other attacks. There is also a worrisome trend toward more destructive attacks, Masson said. As an example, he points to the Russians trying to take down the "},{"type":"text","marks":[{"type":"link","attrs":{"href":"/cyberattacks-data-breaches/how-mobile-networks-have-become-a-front-in-the-battle-for-ukraine","target":"_blank","rel":null,"class":null}}],"text":"telecommunications network in Ukraine"},{"type":"text","text":" to disrupt communications within the country. When their attempts failed, the Russians "},{"type":"text","marks":[{"type":"link","attrs":{"href":"https://www.wired.com/story/mariupol-ukraine-war/","target":"_blank","rel":null,"class":null}}],"text":"shot missiles directly at the cell towers"},{"type":"text","text":" and destroyed them, Masson notes."}]},{"type":"paragraph","attrs":{"textAlign":"left"},"content":[{"type":"text","text":"About 85% of critical national infrastructure is under private control in North America, Masson says, which makes regulating critical infrastructure a bit of a challenge. The shift to public-private partnership, where infrastructure operators share threat information and intelligence with government agencies, is essential to understand the scale of the threat, he says."}]},{"type":"paragraph","attrs":{"textAlign":"left"},"content":[{"type":"text","text":"President Dwight D. Eisenhower famously said that plans are worthless, but planning is indispensable. That mindset should drive security preparations: Deploy technology that gives visibility into the network, train people to recognize attacks, and maintain good backups so you can rebuild the infrastructure when needed."}]},{"type":"paragraph","attrs":{"textAlign":"left"},"content":[{"type":"text","text":"\"Start practicing and get ready so you don't end up being a rabbit stuck in the headlights,\" Masson says."}]}],"mobileHeadline":"Darktrace's David Masson on What Attacks on Critical Infrastructure Look Like","articleUrl":"/cyberattacks-data-breaches/darktrace-s-dave-masson-on-what-attacks-on-critical-infrastructure-looks-like","listPageUrl":"/cyberattacks-data-breaches/darktrace-s-dave-masson-on-what-attacks-on-critical-infrastructure-looks-like","linkAttrs":{},"date":"Jun 1, 2022","timeRead":0,"categoryName":"Cyberattacks \u0026 Data Breaches","categoryUrl":"/cyberattacks-data-breaches","contributors":[{"name":"Dark Reading Staff","avatar":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt99b391f0439c1434/64f179af7de67f4e4300e517/285801_DR23_Graphics_Website_Author_Logo_0.jpg","link":"/author/dark-reading-staff"}],"paidGating":null}}],"title":"DR Tech Talks","moreContent":{"title":"MORE DR TECH TALKS","url":"/program/dr-tech-talks"}}]},"adConfig":{"nativeAdOption":false}},{"type":"module_text_box","uid":"bltcd6630e4ee8adeb1","data":{"title":"Overheard This Week","displayTitle":"Overheard This Week","textSectionJson":[{"type":"paragraph","attrs":{"textAlign":"left"},"content":[{"type":"text","text":"\"Authentication and authorization in the world of API is critical.\" Jonathan Care during a June 6 webinar \"Assessing Software Supply Chain Risk.\""}]}],"ctaButton":{"ctaButtonText":"Listen to the Discussion","ctaButtonUrl":"https://dr-resources.darkreading.com/free/w_apii05/?p=w_apii05"},"moduleDisplayOptions":{"textAlignment":"center"},"moduleLocation":"modular_program"}},{"type":"module_video_playlist","uid":"blt895cedc90adda7e4","data":{"title":"Featured Video Playlist","displayOptions":"dark","moduleLocation":"modular_program","videos":[{"thumbnail":{"src":"","alt":""},"videoTitle":"VMware Offers Up New Ground Truth for Improved Cloud Security","mobileVideoTitle":"VMware Offers Up New Ground Truth for Improved Cloud Security","video":{"brightcoveAccountId":null,"videoId":"ygTPfBz5Mk0","videoService":"youtube","videoEmbedCode":"\u003ciframe width=\"560\" height=\"315\" src=\"https://www.youtube.com/embed/ygTPfBz5Mk0\" title=\"YouTube video player\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" allowfullscreen\u003e\u003c/iframe\u003e","videoUrl":null,"videoCredit":"Source: Informa Tech","duration":null},"videoUrl":"/cloud-security/vmware-offers-up-new-ground-truth-for-improved-cloud-security","duration":"00:00:00","publishedDate":"Apr 28, 2023","uid":"blt0a20834b0f994fe2","isSponsored":false,"paidGating":null},{"thumbnail":{"src":"","alt":""},"videoTitle":"JupiterOne Weighs In on the Need For Unified Cyber Insights","mobileVideoTitle":"JupiterOne Weighs In on the Need For Unified Cyber Insights","video":{"brightcoveAccountId":null,"videoId":"sIH2woyaY2I","videoService":"youtube","videoEmbedCode":"\u003ciframe width=\"560\" height=\"315\" src=\"https://www.youtube.com/embed/sIH2woyaY2I\" title=\"YouTube video player\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" allowfullscreen\u003e\u003c/iframe\u003e","videoUrl":null,"videoCredit":"Source: Informa Tech","duration":null},"videoUrl":"/cloud-security/jupiterone-weighs-in-on-the-need-for-unified-cyber-insights","duration":"00:00:00","publishedDate":"Apr 28, 2023","uid":"bltf31904f986848937","isSponsored":false,"paidGating":null},{"thumbnail":{"src":"","alt":""},"videoTitle":"Darktrace Takes a Closer Look at the Shifting Email Security Conversation","mobileVideoTitle":"Darktrace Takes a Closer Look at the Shifting Email Security Conversation","video":{"brightcoveAccountId":null,"videoId":"4truZb5KBLo","videoService":"youtube","videoEmbedCode":"\u003ciframe width=\"560\" height=\"315\" src=\"https://www.youtube.com/embed/4truZb5KBLo\" title=\"YouTube video player\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" allowfullscreen\u003e\u003c/iframe\u003e","videoUrl":null,"videoCredit":"Source: Informa Tech","duration":null},"videoUrl":"/cloud-security/darktrace-takes-a-closer-look-at-the-shifting-email-security-conversation","duration":"00:00:00","publishedDate":"Apr 28, 2023","uid":"blt9f727ffd4c7abb4e","isSponsored":false,"paidGating":null},{"thumbnail":{"src":"","alt":""},"videoTitle":"AT\u0026T: What Security Pros Should Know About the Evolving Edge Ecosystem","mobileVideoTitle":"AT\u0026T: What Security Pros Should Know About the Evolving Edge Ecosystem","video":{"brightcoveAccountId":null,"videoId":"ogKJXkemtEs","videoService":"youtube","videoEmbedCode":"\u003ciframe width=\"560\" height=\"315\" src=\"https://www.youtube.com/embed/ogKJXkemtEs\" title=\"YouTube video player\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" allowfullscreen\u003e\u003c/iframe\u003e","videoUrl":null,"videoCredit":"Source: Informa Tech","duration":null},"videoUrl":"/cloud-security/att-what-security-pros-should-know-about-the-evolving-edge-ecosystem","duration":"00:00:00","publishedDate":"Apr 28, 2023","uid":"blt075d37de4e988105","isSponsored":false,"paidGating":null},{"thumbnail":{"src":"","alt":""},"videoTitle":"OpenText Cybersecurity: Integrating Processes — and Strategy — Is Still the Best Defense","mobileVideoTitle":"OpenText Cybersecurity: Integrating Processes — and Strategy — Is Still the Best Defense","video":{"brightcoveAccountId":null,"videoId":"WnOf-Qr3584","videoService":"youtube","videoEmbedCode":"\u003ciframe width=\"560\" height=\"315\" src=\"https://www.youtube.com/embed/WnOf-Qr3584\" title=\"YouTube video player\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" allowfullscreen\u003e\u003c/iframe\u003e","videoUrl":null,"videoCredit":"Source: Informa Tech","duration":null},"videoUrl":"/vulnerabilities-threats/opentext-integrating-processes-and-strategy-is-still-the-best-defense","duration":"00:00:00","publishedDate":"Apr 28, 2023","uid":"blt7d3350cbe5eca2ef","isSponsored":false,"paidGating":null},{"thumbnail":{"src":"","alt":""},"videoTitle":"Sophos Reveals New Insights for Protecting Against Active Adversaries","mobileVideoTitle":"Sophos Reveals New Insights for Protecting Against Active Adversaries","video":{"brightcoveAccountId":null,"videoId":"DuLXSw5vqY4","videoService":"youtube","videoEmbedCode":"\u003ciframe width=\"560\" height=\"315\" src=\"https://www.youtube.com/embed/DuLXSw5vqY4\" title=\"YouTube video player\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" allowfullscreen\u003e\u003c/iframe\u003e","videoUrl":null,"videoCredit":"Source: Informa Tech","duration":null},"videoUrl":"/cyberattacks-data-breaches/sophos-reveals-new-insights-for-protecting-against-active-adversaries","duration":"00:00:00","publishedDate":"Apr 28, 2023","uid":"blt4c80efafbc7ee047","isSponsored":false,"paidGating":null},{"thumbnail":{"src":"","alt":""},"videoTitle":"Automox: Getting Smarter Where Endpoint Management's Concerned","mobileVideoTitle":"Automox: Getting Smarter Where Endpoint Management's Concerned","video":{"brightcoveAccountId":null,"videoId":"5FGJEUAxGq0","videoService":"youtube","videoEmbedCode":"\u003ciframe width=\"560\" height=\"315\" src=\"https://www.youtube.com/embed/5FGJEUAxGq0\" title=\"YouTube video player\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" allowfullscreen\u003e\u003c/iframe\u003e","videoUrl":null,"videoCredit":"Source: Informa Tech","duration":null},"videoUrl":"/cyber-risk/automox-getting-smarter-where-endpoint-management-s-concerned","duration":"00:00:00","publishedDate":"Apr 28, 2023","uid":"blte4bad52185684b50","isSponsored":false,"paidGating":null},{"thumbnail":{"src":"","alt":""},"videoTitle":"Sumo Logic Ponders Why We Aren't There Yet With Security Automation","mobileVideoTitle":"Sumo Logic Ponders Why We Aren't There Yet With Security Automation","video":{"brightcoveAccountId":null,"videoId":"UqL7JhCNsTA","videoService":"youtube","videoEmbedCode":"\u003ciframe width=\"560\" height=\"315\" src=\"https://www.youtube.com/embed/UqL7JhCNsTA\" title=\"YouTube video player\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" allowfullscreen\u003e\u003c/iframe\u003e","videoUrl":null,"videoCredit":"Source: Informa Tech","duration":null},"videoUrl":"/cyber-risk/sumo-logic-ponders-why-we-arent-there-yet-with-security-automation","duration":"00:00:00","publishedDate":"Apr 28, 2023","uid":"bltd14bf4bdc94a4c38","isSponsored":false,"paidGating":null},{"thumbnail":{"src":"","alt":""},"videoTitle":"Beyond Identity: What Is Zero-Trust Authentication and Why Does It Matter?","mobileVideoTitle":"Beyond Identity: What Is Zero-Trust Authentication and Why Does It Matter?","video":{"brightcoveAccountId":null,"videoId":"1L2ixJkvYME","videoService":"youtube","videoEmbedCode":"\u003ciframe width=\"560\" height=\"315\" src=\"https://www.youtube.com/embed/1L2ixJkvYME\" title=\"YouTube video player\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" allowfullscreen\u003e\u003c/iframe\u003e","videoUrl":null,"videoCredit":"Source: Informa Tech","duration":null},"videoUrl":"/cloud-security/beyond-identity-what-is-zero-trust-authentication-and-why-does-it-matter","duration":"00:00:00","publishedDate":"Apr 28, 2023","uid":"blt1e13800572887655","isSponsored":false,"paidGating":null},{"thumbnail":{"src":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt3e12fb388947d16b/6560a137a223a2040af160f9/Capture.jpg","alt":""},"videoTitle":"SlashNext: How Generative AI Is Changing the Threat Landscape","mobileVideoTitle":"SlashNext: How Generative AI Is Changing the Threat Landscape","video":{"brightcoveAccountId":null,"videoId":"h240iSrtTqA","videoService":"youtube","videoEmbedCode":"\u003ciframe width=\"560\" height=\"315\" src=\"https://www.youtube.com/embed/h240iSrtTqA\" title=\"YouTube video player\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" allowfullscreen\u003e\u003c/iframe\u003e","videoUrl":"","videoCredit":"Source: Informa Tech","duration":{"duration":""}},"videoUrl":"/threat-intelligence/slashnext-how-generative-ai-is-changing-the-threat-landscape","duration":"00:00:00","publishedDate":"Apr 28, 2023","uid":"blt5ca26d29c8b7baa1","isSponsored":false,"paidGating":null}],"ctaButton":{"buttonTitle":"See All RSAC Videos","buttonUrl":"https://www.darkreading.com/cloud-security/security-leaders-discuss-industry-trends-at-dark-reading-news-desk-at-rsac-2023"}}},{"type":"module_contents_card","uid":"blt876af5a3b6f88c2d","data":{"title":"DR Technology Trends","moduleLabel":"DR Technology Trends","link":{"href":"/program/dr-technology-trends","label":"READ MORE DR TECHNOLOGY TRENDS"},"variant":"vertical","contents":[{"type":"contentPreview","data":{"contentType":"Article","variant":"card-vertical","layoutVariant":"vertical","thumbnail":{"src":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/bltb488b813b54f31ab/673e529f3b1c9479ca463efc/tech-ttrendssoc-fig9.png","alt":"Figure 9. Chart of survey responses to the question \"How has AI/ML improved your SOC operations?\" Responses add up to more than 100 percent."},"articleName":"It's Near-Unanimous: AI, ML Make the SOC Better","mobileHeadline":"It's Near-Unanimous: AI, ML Make the SOC Better","articleUrl":"/cybersecurity-operations/survey-report-ai-ml-make-soc-better","listPageUrl":"/cybersecurity-operations/survey-report-ai-ml-make-soc-better","linkAttrs":{},"date":"Nov 20, 2024","webinarStartTime":"","categoryName":"Cybersecurity Operations","categoryUrl":"/cybersecurity-operations","contributors":[{"name":"Dark Reading Staff","link":"/author/dark-reading-staff","avatar":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt99b391f0439c1434/64f179af7de67f4e4300e517/285801_DR23_Graphics_Website_Author_Logo_0.jpg"}],"timeRead":2,"paidGating":{"paidContent":false,"paidProductTaxonomy":[]}}},{"type":"contentPreview","data":{"contentType":"Article","variant":"card-vertical","layoutVariant":"vertical","thumbnail":{"src":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt57707039dda73ff7/673341c03f9de2939d0bb53f/tech-sans-ics-ot.jpg","alt":""},"articleName":"Incident Response, Anomaly Detection Rank High on Planned ICS Security Spending","mobileHeadline":"Planned ICS Security Spending: Incident Response, Anomaly Detection","articleUrl":"/ics-ot-security/incident-response-anomaly-detection-rank-high-on-planned-ics-security-spending","listPageUrl":"/ics-ot-security/incident-response-anomaly-detection-rank-high-on-planned-ics-security-spending","linkAttrs":{},"date":"Nov 11, 2024","webinarStartTime":"","categoryName":"ICS/OT Security","categoryUrl":"/ics-ot-security","contributors":[{"name":"Jennifer Lawinski","link":"/author/jennifer-lawinski","avatar":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt64edbfe42402bf03/660b3a58f5fc7993e5562490/jennifer-lawinski.jpg"}],"timeRead":2,"paidGating":{"paidContent":false,"paidProductTaxonomy":[]}}},{"type":"contentPreview","data":{"contentType":"Article","variant":"card-vertical","layoutVariant":"vertical","thumbnail":{"src":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/bltb32c902ebe95128a/67292cedd53ac5549ef0c621/fig2-techtrends110524-darkreading.png","alt":"Figure 2 asks, What AI/ML-enhanced solutions are you using in your cybersecurity operations?"},"articleName":"Antivirus, Anti-Malware Lead Demand for AI/ML Tools","mobileHeadline":"Antivirus, Anti-Malware Lead Demand for AI/ML Tools","articleUrl":"/cybersecurity-operations/antivirus-antimalware-demand-ai-ml-tools","listPageUrl":"/cybersecurity-operations/antivirus-antimalware-demand-ai-ml-tools","linkAttrs":{},"date":"Nov 4, 2024","webinarStartTime":"","categoryName":"Cybersecurity Operations","categoryUrl":"/cybersecurity-operations","contributors":[{"name":"Dark Reading Staff","link":"/author/dark-reading-staff","avatar":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt99b391f0439c1434/64f179af7de67f4e4300e517/285801_DR23_Graphics_Website_Author_Logo_0.jpg"}],"timeRead":2,"paidGating":{"paidContent":false,"paidProductTaxonomy":[]}}},{"type":"contentPreview","data":{"contentType":"Article","variant":"card-vertical","layoutVariant":"vertical","thumbnail":{"src":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/bltfd06af8af256e09b/6709a18bb40de2271b260b60/Skills-gap-1800_designer491_Alamy.jpg","alt":"The words \"skills gap\" in a green cloud against a dark background."},"articleName":"AI Hype Drives Demand For ML SecOps Skills","mobileHeadline":"AI Hype Drives Demand For ML SecOps Skills","articleUrl":"/cybersecurity-careers/ai-hype-drives-demand-ml-secops-skills","listPageUrl":"/cybersecurity-careers/ai-hype-drives-demand-ml-secops-skills","linkAttrs":{},"date":"Oct 11, 2024","webinarStartTime":"","categoryName":"Cybersecurity Careers","categoryUrl":"/cybersecurity-operations/cybersecurity-careers","contributors":[{"name":"Dark Reading Staff","link":"/author/dark-reading-staff","avatar":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt99b391f0439c1434/64f179af7de67f4e4300e517/285801_DR23_Graphics_Website_Author_Logo_0.jpg"}],"timeRead":3,"paidGating":{"paidContent":false,"paidProductTaxonomy":[]}}}],"displayAd":{"position":"none"},"dateDisplay":"hide","contributorDisplay":"hide","moduleLocation":"modular_program"},"adConfig":{"displayAdOption":"none","nativeAdOption":false}},{"type":"module_latest_and_featured","uid":"blt99b255863a2ce473","data":{"title":"DR Technology Latest Content","leftColumnData":{"title":"Latest DR Technology Articles","contents":[{"type":"contentPreview","data":{"thumbnail":{"alt":"A screen showing the Windows 11 logo","src":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt665c5e44e3b036f8/6706f434d8c4923c6a1a9e28/mundissima-windows-11-photo-shutterstock.jpg"},"articleName":"Microsoft Finally Releases Recall as Part of Windows Insider Preview","mobileHeadline":"Microsoft Previews Recall in Windows Insider","articleUrl":"/endpoint-security/microsoft-releases-recall-windows-insider-preview","listPageUrl":"/endpoint-security/microsoft-releases-recall-windows-insider-preview","linkAttrs":{},"contentType":"Article","date":"Nov 27, 2024","webinarStartTime":"","categoryName":"Endpoint Security","categoryUrl":"/endpoint-security","variant":"small","contributors":[],"timeRead":3,"paidGating":{"paidContent":false,"paidProductTaxonomy":[]}}},{"type":"contentPreview","data":{"thumbnail":{"alt":"AWS logo against a black background.","src":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt6b376a9ebdf9876f/674616ddfbdcfd40f7ec33c3/AWS-GK_Images-Alamy.jpg"},"articleName":"AWS Rolls Out Updates to Amazon Cognito","mobileHeadline":"AWS Rolls Out Updates to Amazon Cognito","articleUrl":"/identity-access-management-security/aws-rolls-out-updates-to-amazon-cognito","listPageUrl":"/identity-access-management-security/aws-rolls-out-updates-to-amazon-cognito","linkAttrs":{},"contentType":"Article","date":"Nov 26, 2024","webinarStartTime":"","categoryName":"Identity \u0026 Access Management Security","categoryUrl":"/cybersecurity-operations/identity-access-management-security","variant":"small","contributors":[{"name":"Jennifer Lawinski","link":"/author/jennifer-lawinski","avatar":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt64edbfe42402bf03/660b3a58f5fc7993e5562490/jennifer-lawinski.jpg","title":"Contributing Writer","role":"Contributing Writer"}],"timeRead":1,"paidGating":{"paidContent":false,"paidProductTaxonomy":[]}}},{"type":"contentPreview","data":{"thumbnail":{"alt":"phishing login credentials financial services FS-ISAC","src":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt14e1d84c1085acdb/673e64b6791acf8e438a2080/Romolo_Tavani-phishing-credentials-shutterstock.jpg"},"articleName":"Phishing Prevention Framework Reduces Incidents by Half","mobileHeadline":"Phishing Prevention Framework Cuts Abuse Incidents in Half","articleUrl":"/cybersecurity-operations/phishing-prevention-framework-reduces-incidents-by-half","listPageUrl":"/cybersecurity-operations/phishing-prevention-framework-reduces-incidents-by-half","linkAttrs":{},"contentType":"Article","date":"Nov 25, 2024","webinarStartTime":"","categoryName":"Cybersecurity Operations","categoryUrl":"/cybersecurity-operations","variant":"small","contributors":[{"name":"Robert Lemos, Contributing Writer","link":"/author/robert-lemos","avatar":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt28d2c260c33375ea/64f14ff471df6264a382aaa0/Robert-Lemos.png","title":"","role":""}],"timeRead":5,"paidGating":{"paidContent":false,"paidProductTaxonomy":[]}}},{"type":"contentPreview","data":{"thumbnail":{"alt":"Digital magnifying glass","src":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt804d71f24ae24a3f/6740d9b25ae7e10170cea67c/magnifyingglass-WavebreakMedialtd-AlamyStockPhoto.jpg"},"articleName":"Microsoft Highlights Security Exposure Management at Ignite","mobileHeadline":"Microsoft Highlights Security Exposure Management at Ignite","articleUrl":"/cloud-security/microsoft-highlights-security-exposure-management-ignite","listPageUrl":"/cloud-security/microsoft-highlights-security-exposure-management-ignite","linkAttrs":{},"contentType":"Article","date":"Nov 22, 2024","webinarStartTime":"","categoryName":"Сloud Security","categoryUrl":"/cloud-security","variant":"small","contributors":[{"name":"Jeffrey Schwartz","link":"/author/jeffrey-schwartz","avatar":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blte815fe009d8ac172/64f1536fc3efae477df0ee60/Jeff_Schwartz_headshot-sq.png","title":"Contributing Writer","role":"Contributing Writer"}],"timeRead":4,"paidGating":{"paidContent":false,"paidProductTaxonomy":[]}}},{"type":"contentPreview","data":{"thumbnail":{"alt":"cloud with padlocks","src":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt65a16548ab4f4863/66fea28f3b9eea4d4ab5da42/Cloud(1800)_John_Williams_RF_Alamy.jpg"},"articleName":"Cloud Security Startup Wiz to Acquire Dazz in Risk Management Play","mobileHeadline":"Cloud Security Startup Wiz to Acquire Dazz","articleUrl":"/cloud-security/cloud-security-startup-wiz-to-acquire-dazz-in-risk-management-play","listPageUrl":"/cloud-security/cloud-security-startup-wiz-to-acquire-dazz-in-risk-management-play","linkAttrs":{},"contentType":"Article","date":"Nov 21, 2024","webinarStartTime":"","categoryName":"Сloud Security","categoryUrl":"/cloud-security","variant":"small","contributors":[{"name":"Jennifer Lawinski","link":"/author/jennifer-lawinski","avatar":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt64edbfe42402bf03/660b3a58f5fc7993e5562490/jennifer-lawinski.jpg","title":"Contributing Writer","role":"Contributing Writer"}],"timeRead":2,"paidGating":{"paidContent":false,"paidProductTaxonomy":[]}}},{"type":"contentPreview","data":{"thumbnail":{"alt":"Figure 9. Chart of survey responses to the question \"How has AI/ML improved your SOC operations?\" Responses add up to more than 100 percent.","src":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/bltb488b813b54f31ab/673e529f3b1c9479ca463efc/tech-ttrendssoc-fig9.png"},"articleName":"It's Near-Unanimous: AI, ML Make the SOC Better","mobileHeadline":"It's Near-Unanimous: AI, ML Make the SOC Better","articleUrl":"/cybersecurity-operations/survey-report-ai-ml-make-soc-better","listPageUrl":"/cybersecurity-operations/survey-report-ai-ml-make-soc-better","linkAttrs":{},"contentType":"Article","date":"Nov 20, 2024","webinarStartTime":"","categoryName":"Cybersecurity Operations","categoryUrl":"/cybersecurity-operations","variant":"small","contributors":[{"name":"Dark Reading Staff","link":"/author/dark-reading-staff","avatar":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt99b391f0439c1434/64f179af7de67f4e4300e517/285801_DR23_Graphics_Website_Author_Logo_0.jpg","title":"Dark Reading","role":"Dark Reading"}],"timeRead":2,"paidGating":{"paidContent":false,"paidProductTaxonomy":[]}}},{"type":"contentPreview","data":{"thumbnail":{"alt":"preying mantis","src":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt51f83c6a1967e8be/67352468b8302e7a69cdc2e7/Valentin_Baciu-preying-mantis-shutterstock.jpg"},"articleName":"AI About-Face: 'Mantis' Turns LLM Attackers Into Prey","mobileHeadline":"AI About-Face: 'Mantis' Turns LLM Attackers Into Prey","articleUrl":"/cybersecurity-operations/deceptive-framework-defense-mislead-attacking-ai","listPageUrl":"/cybersecurity-operations/deceptive-framework-defense-mislead-attacking-ai","linkAttrs":{},"contentType":"Article","date":"Nov 18, 2024","webinarStartTime":"","categoryName":"Cybersecurity Operations","categoryUrl":"/cybersecurity-operations","variant":"small","contributors":[{"name":"Robert Lemos, Contributing Writer","link":"/author/robert-lemos","avatar":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt28d2c260c33375ea/64f14ff471df6264a382aaa0/Robert-Lemos.png","title":"","role":""}],"timeRead":5,"paidGating":{"paidContent":false,"paidProductTaxonomy":[]}}},{"type":"contentPreview","data":{"thumbnail":{"alt":"Concept art of chain formed from glowy blue numbers","src":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt4ac69d7dd44e00e1/67357aa7cc5c0136a87148b9/Chain_Andrey_Kryuchkov_Alamy.jpg"},"articleName":"Lessons From OSC\u0026R on Protecting the Software Supply Chain","mobileHeadline":"Lessons From OSC\u0026R on Protecting the Software Supply Chain","articleUrl":"/application-security/lessons-from-osc-r-on-protecting-the-software-supply-chain","listPageUrl":"/application-security/lessons-from-osc-r-on-protecting-the-software-supply-chain","linkAttrs":{},"contentType":"Article","date":"Nov 15, 2024","webinarStartTime":"","categoryName":"Application Security","categoryUrl":"/application-security","variant":"small","contributors":[{"name":"Neatsun Ziv","link":"/author/neatsun-ziv","avatar":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt18fabc8af8a4ebec/660d94dac9baecfd4a406733/Neatsun_Ziv.jpg","title":"CEO \u0026 Co-Founder, Ox Security","role":"CEO \u0026 Co-Founder, Ox Security"}],"timeRead":5,"paidGating":{"paidContent":false,"paidProductTaxonomy":[]}}},{"type":"contentPreview","data":{"thumbnail":{"alt":"Two blue puzzle pieces joining together in a cityscape setting.","src":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt7e9171327ad49fa7/6735edb4fdb3eab0327e3262/merger-nespix-AdobeStock_172180231CP.jpg"},"articleName":"Trustwave-Cybereason Merger Boosts MDR Portfolio","mobileHeadline":"Trustwave-Cybereason Merger Boosts MDR Portfolio","articleUrl":"/endpoint-security/trustwave-cybereason-merger-boost-mdr-portfolio","listPageUrl":"/endpoint-security/trustwave-cybereason-merger-boost-mdr-portfolio","linkAttrs":{},"contentType":"Article","date":"Nov 13, 2024","webinarStartTime":"","categoryName":"Endpoint Security","categoryUrl":"/endpoint-security","variant":"small","contributors":[{"name":"Dark Reading Staff","link":"/author/dark-reading-staff","avatar":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt99b391f0439c1434/64f179af7de67f4e4300e517/285801_DR23_Graphics_Website_Author_Logo_0.jpg","title":"Dark Reading","role":"Dark Reading"}],"timeRead":1,"paidGating":{"paidContent":false,"paidProductTaxonomy":[]}}},{"type":"contentPreview","data":{"thumbnail":{"alt":"Silhouettes of people standing next to padlocks in a circle.","src":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt7ea610a15c2e225b/6706fbc3dd85ad377e33a095/identity-ArtemisDiana-alamy.jpg"},"articleName":"CrowdStrike Spends to Boost Identity Threat Detection","mobileHeadline":"CrowdStrike Spends to Boost Identity Threat Detection","articleUrl":"/identity-access-management-security/crowdstrike-spends-boost-identity-threat-detection","listPageUrl":"/identity-access-management-security/crowdstrike-spends-boost-identity-threat-detection","linkAttrs":{},"contentType":"Article","date":"Nov 12, 2024","webinarStartTime":"","categoryName":"Identity \u0026 Access Management Security","categoryUrl":"/cybersecurity-operations/identity-access-management-security","variant":"small","contributors":[{"name":"Jeffrey Schwartz","link":"/author/jeffrey-schwartz","avatar":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blte815fe009d8ac172/64f1536fc3efae477df0ee60/Jeff_Schwartz_headshot-sq.png","title":"Contributing Writer","role":"Contributing Writer"}],"timeRead":5,"paidGating":{"paidContent":false,"paidProductTaxonomy":[]}}}],"moreContent":{"title":"READ MORE FROM DR TECHNOLOGY","url":"/program/dr-technology-articles"}},"rightColumnData":{"title":"Emerging Technology","contents":[{"type":"contentPreview","data":{"thumbnail":{"alt":"Scene of blue skiy with wispy clouds","src":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt13bf1affe8923637/67350f06072cb331ecd50aea/cloud-connections_Zoonar_GmbH_Alamy_Stock_Photo.jpg"},"articleName":"DeepTempo Launches AI-Based Security App for Snowflake","mobileHeadline":"DeepTempo Launches AI-Based Security App for Snowflake","articleUrl":"/cybersecurity-operations/untitled","listPageUrl":"/cybersecurity-operations/untitled","linkAttrs":{},"contentType":"Article","date":"Nov 20, 2024","webinarStartTime":"","categoryName":"Cybersecurity Operations","categoryUrl":"/cybersecurity-operations","variant":"contributor-focused","contributors":[{"name":"Dark Reading Staff","link":"/author/dark-reading-staff","avatar":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt99b391f0439c1434/64f179af7de67f4e4300e517/285801_DR23_Graphics_Website_Author_Logo_0.jpg","title":"Dark Reading","role":"Dark Reading"}],"timeRead":2,"paidGating":{"paidContent":false,"paidProductTaxonomy":[]}}},{"type":"contentPreview","data":{"thumbnail":{"alt":"A keyboard with a red key marked RISK","src":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt2e083f08865b175c/66f2c37003ecc04ce5a19432/Risk(1800)-Olekcii_Mach_Alamy.jpg"},"articleName":"RIIG Launches With Risk Intelligence Solutions","mobileHeadline":"RIIG Launches With Risk Intelligence Solutions ","articleUrl":"/cyber-risk/riig-launches-risk-intelligence-solutions","listPageUrl":"/cyber-risk/riig-launches-risk-intelligence-solutions","linkAttrs":{},"contentType":"Article","date":"Nov 20, 2024","webinarStartTime":"","categoryName":"Cyber Risk","categoryUrl":"/cyber-risk","variant":"contributor-focused","contributors":[{"name":"Dark Reading Staff","link":"/author/dark-reading-staff","avatar":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt99b391f0439c1434/64f179af7de67f4e4300e517/285801_DR23_Graphics_Website_Author_Logo_0.jpg","title":"Dark Reading","role":"Dark Reading"}],"timeRead":1,"paidGating":{"paidContent":false,"paidProductTaxonomy":[]}}},{"type":"contentPreview","data":{"thumbnail":{"alt":"a brass two-handled trophy against a red curtain in the background.","src":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt25563b5d5c98516a/66f475229441d64a76fe188c/trophy1800_Zoonar_GmbH_alamy.jpg"},"articleName":"Frenos Takes Home the Prize at 2024 DataTribe Challenge","mobileHeadline":"Frenos Takes Home the Prize at 2024 DataTribe Challenge","articleUrl":"/ics-ot-security/frenos-takes-home-prize-2024-datatribe-challenge","listPageUrl":"/ics-ot-security/frenos-takes-home-prize-2024-datatribe-challenge","linkAttrs":{},"contentType":"Article","date":"Nov 14, 2024","webinarStartTime":"","categoryName":"ICS/OT Security","categoryUrl":"/ics-ot-security","variant":"contributor-focused","contributors":[{"name":"Jennifer Lawinski","link":"/author/jennifer-lawinski","avatar":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt64edbfe42402bf03/660b3a58f5fc7993e5562490/jennifer-lawinski.jpg","title":"Contributing Writer","role":"Contributing Writer"}],"timeRead":2,"paidGating":{"paidContent":false,"paidProductTaxonomy":[]}}},{"type":"contentPreview","data":{"thumbnail":{"alt":"A screen full of code that has already been written","src":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt8b8a660bebae6ed7/672cc09ee6bed3d9186e0e5d/coding-Kirbyphoto-iStock_86724133_SMALL.jpg"},"articleName":"Symbiotic Security Launches Scanning Tool to Help Fix Flaws in Code","mobileHeadline":"Symbiotic Security Launches Scanning Tool to Fix Flaws in Code","articleUrl":"/application-security/symbiotic-code-security-tool-fix-flaws","listPageUrl":"/application-security/symbiotic-code-security-tool-fix-flaws","linkAttrs":{},"contentType":"Article","date":"Nov 7, 2024","webinarStartTime":"","categoryName":"Application Security","categoryUrl":"/application-security","variant":"contributor-focused","contributors":[{"name":"Fahmida Y. Rashid","link":"/author/fahmida-y-rashid","avatar":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blta4695bcb7a96b293/64f0c7c615ed143d78ad5df7/fahmida.png","title":"Managing Editor, Features","role":"Managing Editor, Features"}],"timeRead":2,"paidGating":{"paidContent":false,"paidProductTaxonomy":[]}}},{"type":"contentPreview","data":{"thumbnail":{"alt":"A city view with multiple screens showing data charts and measurements.","src":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt794939a32f209be4/6722ed0b1359197f7910d0fa/data-BillionPhotos.com-AdobeStock_242784692CP.jpg"},"articleName":"Noma Launches With Plans to Secure Data, AI Life Cycle","mobileHeadline":"Noma Launches With Plans to Secure Data, AI Life Cycle","articleUrl":"/application-security/noma-launches-secure-data-ai-lifecycle","listPageUrl":"/application-security/noma-launches-secure-data-ai-lifecycle","linkAttrs":{},"contentType":"Article","date":"Oct 31, 2024","webinarStartTime":"","categoryName":"Application Security","categoryUrl":"/application-security","variant":"contributor-focused","contributors":[{"name":"Dark Reading Staff","link":"/author/dark-reading-staff","avatar":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt99b391f0439c1434/64f179af7de67f4e4300e517/285801_DR23_Graphics_Website_Author_Logo_0.jpg","title":"Dark Reading","role":"Dark Reading"}],"timeRead":1,"paidGating":{"paidContent":false,"paidProductTaxonomy":[]}}},{"type":"contentPreview","data":{"thumbnail":{"alt":"Data representations such as zero and ones and graphs are overlayed against a purple background.","src":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt9d095681f2da9562/6722e11f21f0d3a9721b17bb/data-points-cybersecurity_YAY_Media_AS_via_Alamy_Stock_Photo.jpg"},"articleName":"MIND Launches 'Intelligent' DLP Platform","mobileHeadline":"MIND Launches 'Intelligent' DLP Platform ","articleUrl":"/cyberattacks-data-breaches/mind-launches-intelligent-dlp-platform","listPageUrl":"/cyberattacks-data-breaches/mind-launches-intelligent-dlp-platform","linkAttrs":{},"contentType":"Article","date":"Oct 31, 2024","webinarStartTime":"","categoryName":"Cyberattacks \u0026 Data Breaches","categoryUrl":"/cyberattacks-data-breaches","variant":"contributor-focused","contributors":[{"name":"Dark Reading Staff","link":"/author/dark-reading-staff","avatar":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt99b391f0439c1434/64f179af7de67f4e4300e517/285801_DR23_Graphics_Website_Author_Logo_0.jpg","title":"Dark Reading","role":"Dark Reading"}],"timeRead":1,"paidGating":{"paidContent":false,"paidProductTaxonomy":[]}}}],"moreContent":{"title":"READ MORE EMERGING TECHNOLOGY","url":"/program/dr-emerging-technology"}},"displayAds":{"position":"None"},"moduleLocation":"modular_program"},"adConfig":{"displayAdOption":"none","nativeAdOption":false}}],"sidebarModules":[{"type":"module_link_list","data":{"listOption":"Dynamic","listTitle":"Latest Articles in DR Technology","icon":"Trending","externalFeed":"","ctaButton":{"ctaButtonLink":"/program/dr-technology","ctaButtonText":"Read More DR Technology"},"openInNewTab":false,"articles":[{"contentType":"Article","title":"Microsoft Finally Releases Recall as Part of Windows Insider Preview","url":"/endpoint-security/microsoft-releases-recall-windows-insider-preview","isExternalLink":false,"readTime":3,"publishedDate":"2024-11-27T13:06:15.000Z","eventDate":"","webinarStartTime":""},{"contentType":"Article","title":"AWS Rolls Out Updates to Amazon Cognito","url":"/identity-access-management-security/aws-rolls-out-updates-to-amazon-cognito","isExternalLink":false,"readTime":1,"publishedDate":"2024-11-26T19:02:53.000Z","eventDate":"","webinarStartTime":""},{"contentType":"Article","title":"Phishing Prevention Framework Reduces Incidents by Half","url":"/cybersecurity-operations/phishing-prevention-framework-reduces-incidents-by-half","isExternalLink":false,"readTime":5,"publishedDate":"2024-11-25T21:40:27.000Z","eventDate":"","webinarStartTime":""},{"contentType":"Article","title":"Microsoft Highlights Security Exposure Management at Ignite","url":"/cloud-security/microsoft-highlights-security-exposure-management-ignite","isExternalLink":false,"readTime":4,"publishedDate":"2024-11-22T13:25:42.000Z","eventDate":"","webinarStartTime":""}]}}],"sidebarModuleIds":["blta0de8437c264a0eb"],"sidebarOptions":"custom","programHeader":{"programName":"DR Technology","logo":{"url":"https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt4c091cd3ac9935ea/653a71456ad0f6040a6f71bd/Dark_Reading_Logo_Technology_0.png"},"logoAltText":"DR Technology Logo","tagline":"\u003cp\u003eNews, news analysis, and commentary on the latest trends in cybersecurity technology.\u003c/p\u003e","backgroundColor":"","mode":"dark","url":""},"isBranded":true,"isModular":true,"latestBigContents":[],"latestSmallContents":[],"content1":[],"content2":[],"content3":[],"socialShare":[{"type":"Linkedin","url":"https://www.linkedin.com/sharing/share-offsite/?url=https://www.darkreading.com/program/dr-technology"},{"type":"Facebook","url":"http://www.facebook.com/sharer/sharer.php?u=https://www.darkreading.com/program/dr-technology"},{"type":"Twitter","url":"http://www.twitter.com/intent/tweet?url=https://www.darkreading.com/program/dr-technology"},{"type":"Reddit","url":"https://www.reddit.com/submit?url=https://www.darkreading.com/program/dr-technology\u0026title=DR%20Technology"},{"type":"Email","url":"mailto:?subject=DR Technology\u0026body=I%20thought%20the%20following%20from%20Dark%20Reading%20might%20interest%20you.%0D%0A%0D%0A%20DR%20Technology%0D%0Ahttps%3A%2F%2Fwww.darkreading.com%2Fprogram%2Fdr-technology"},{"type":"Print","url":"/"}],"newsletterSignUpPromo":{"title":"Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.","message":"","newsletterId":"bltdcb90f81b445a744","buttonText":"Subscribe","variant":"vertical","mode":"dark"},"pagination":{"totalCount":0,"currentPage":1},"schema":[{"@context":"https://schema.org","@type":"BreadcrumbList","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https://www.darkreading.com"},{"@type":"ListItem","position":2,"name":"DR Technology","item":"https://www.darkreading.com/program/dr-technology"}]}],"seo":{"metaTitle":"DR Technology","metaDescription":"DR Technology","noIndex":false,"canonicalUrl":"https://www.darkreading.com/program/dr-technology","imageUrl":"https://www.darkreading.com/build/_assets/darkreading-DSJITCUD.ico","siteName":"Dark Reading"},"entryTitle":"DR Technology","iirisRecommendationConfig":{"id":"widget-1700562861264","division":"it","brandFamily":"cybersecurity","entityTagBackground":"#333333BF","dateFormat":"Month DD, YYYY","showBy":"","showTime":"","borderRadius":"5","imageWidth":"324","imageHeight":"182","dateTimeBgcolor":"#ffffff","dateTimeFontColor":"#767676","imagePosition":"vertical","dropShadow":"","dateTimeFontsize":"12","entityTagBorderColor":"#333333BF","borderColor":"#e6e6e6","showdate":"","redirectMode":"same","recipe":"similar-items"}}},"actionData":null,"errors":null}};</script><script type="module" async="">import "/build/manifest-A2F38A42.js"; import * as route0 from "/build/root-TPDAOOC5.js"; import * as route1 from "/build/routes/program.$slug-YSGWY6HN.js"; window.__remixRouteModules = {"root":route0,"routes/program.$slug":route1}; import("/build/entry.client-SFHSSSEN.js");</script><script async="" defer="" src="https://connect.facebook.net/en_US/sdk.js#xfbml=1&version=v3.2"></script><script async="" defer="" src="https://www.instagram.com/embed.js"></script><script>(function(){function c(){var b=a.contentDocument||a.contentWindow.document;if(b){var d=b.createElement('script');d.innerHTML="window.__CF$cv$params={r:'8eb320721bd0cdd1',t:'MTczMzA1NjYyOS4wMDAwMDA='};var a=document.createElement('script');a.nonce='';a.src='/cdn-cgi/challenge-platform/scripts/jsd/main.js';document.getElementsByTagName('head')[0].appendChild(a);";b.getElementsByTagName('head')[0].appendChild(d)}}if(document.body){var a=document.createElement('iframe');a.height=1;a.width=1;a.style.position='absolute';a.style.top=0;a.style.left=0;a.style.border='none';a.style.visibility='hidden';document.body.appendChild(a);if('loading'!==document.readyState)c();else if(window.addEventListener)document.addEventListener('DOMContentLoaded',c);else{var e=document.onreadystatechange||function(){};document.onreadystatechange=function(b){e(b);'loading'!==document.readyState&&(document.onreadystatechange=e,c())}}}})();</script></body></html>