Follow Dark Reading:
 October 29, 2021
LATEST SECURITY NEWS & COMMENTARY
SEO Poisoning Used to Distribute Ransomware
This tactic — used to distribute REvil ransomware and the SolarMarker backdoor — is part of a broader increase in such attacks in recent months, researchers say.
US to Create Diplomatic Bureau to Lead Cybersecurity Policy
As part of its modernization initiative, the Department of State will increase its IT budget by 50% and add a new bureau to lead cybersecurity and digital policy.
ICS Security Firm Dragos Reaches $1.7B Valuation in Latest Funding Round
The $200M Series D represents the company's largest funding round to date.
You've Just Been Ransomed ... Now What?
Six crucial steps executives and IT teams should be prepared to take immediately after a ransomware attack.
3 Security Lessons Learned From the Kaseya Ransomware Attack
Organizations can better prepare themselves and their customers for these attacks with some strategies to identify threats before they become a widespread issue.
Tech Companies Create Security Baseline for Enterprise Software
The Minimum Viable Secure Product is written as a checklist of minimum-security requirements for business-to-business software.
Top Hardware Weaknesses List Debuts
CWE list aimed at designers and programmers to avoid key hardware weaknesses early in product development.
HelpSystems Acquires Digital Guardian, Extends DLP Capabilities
The acquisition strengthens HelpSystems’ data security portfolio with data loss prevention capabilities across the endpoint, network, and cloud.
MORE NEWS / MORE COMMENTARY
HOT TOPICS
Cybersecurity Talent Gap Narrows as Workforce Grows
Job satisfaction and salaries have both increased for cybersecurity professionals, as younger workers seek specific training to prepare for a cybersecurity career.

What Squid Game Teaches Us About Cybersecurity
When life inside the security operations center feels treacherous, here are some suggestions for getting out alive.

Cybercriminals Ramp Up Attacks on Web APIs
As more organizations use application programming interfaces for Web applications, attacks and security incidents targeting APIs continue to grow.

MORE
LATEST FROM THE EDGE

6 Ways to Rewrite the Impossible Job Description
It's hard enough to fill a cybersecurity position given the talent shortage. But you may be making it harder with a poor job description that turns off would-be candidates.
EDITORS' CHOICE

6 Eye-Opening Statistics About Software Supply Chain Security
The latest facts and figures on the state of software supply chain security in the enterprise.
LATEST FROM DR TECHNOLOGY

Stop Zero-Day Ransomware Cold With AI
AI can help recognize ransomware attacks and stop them at computer speed.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Building Automation Into Secure Application Development

    Creating secure code is crucial to enterprise application development. But many application developers resist taking extra security steps because they add extra work and time to the development process. In this Dark Reading webinar, application security experts discuss ways to ...

  • Zero-Trust in Real Life

    Credential theft, lateral movement and other cyber attack tricks have foiled perimeter security again and again. We know that the old philosophy of trusting everything and everyone inside a network is no longer sound. The zero-trust model - trust nothing, ...

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By Dark Reading
Informa Tech
303 Second St., Suite 900 South Tower, San Francisco, CA 94107
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.