Follow Dark Reading:
 December 30, 2021
LATEST SECURITY NEWS & COMMENTARY
7 of the Most Impactful Cybersecurity Incidents of 2021
There was a lot to learn from breaches, vulnerabilities, and attacks this year.
A Year in Microsoft Bugs: The Most Critical, Overlooked & Hard to Patch
Severe flaws in Microsoft Exchange and Windows Print Spooler stood out amid a wide range of vulnerabilities security teams were forced to prioritize in 2021.
In the Fight Against Cybercrime, Takedowns Are Only Temporary
Disrupting access to servers and infrastructure continues to interfere with cybercrime activity, but it's far from a perfect strategy.
The CISO as Sustaining Force: Helping Infosec Staff Beat Burnout
To protect their staffers, leaders should focus on identifying and alleviating root causes of burnout.
An Adaptive Security Strategy Is Critical for Stopping Advanced Attacks
Ransomware demands a new approach to incident response.
The Future of Work Has Changed, and Your Security Mindset Needs to Follow
VPNs have become a vulnerability that puts organizations at risk of cyberattacks.
Name That Toon: Modern-Day Frosty
Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card.
Why Cyber Due Diligence Is Essential to the M&A Process
That announcement may feel good, but if your prospective acquisition's cybersecurity levels are substandard, it might be best to hold off.
MORE NEWS / MORE COMMENTARY
HOT TOPICS
Log4j Reveals Cybersecurity's Dirty Little Secret
Once the dust settles on Log4j, many IT teams will brush aside the need for the fundamental, not-exciting need for better asset and application management.

Preemptive Strategies to Stop Log4j and Its Variants
Zero trust is key to not falling victim to the next big vulnerability.

After Google's Landmark Settlement, How Ad Networks Should Tackle Child Privacy
To comply with the updated COPPA Rule, online ad platforms need to change how they handle viewers who might be children.

MORE
EDITORS' CHOICE

Log4j: A CISO's Practical Advice
Working together is going to make getting through this problem a lot easier.
LATEST FROM THE EDGE

7 Steps for Navigating a Zero-Trust Journey
Don't think of zero trust as a product. Think of it as "how you actually practice security."
LATEST FROM DR TECHNOLOGY

6 Security-Tech Innovations We're Excited to See in 2022
The details on cybersecurity technologies that we expect to advance rapidly in the coming year.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Beyond Spam and Phishing: Emerging Email-based Threats

    Even as enterprises adopt real-time messaging tools and platforms, email remains the hub of enterprise communications. Adversaries are increasingly targeting the enterprise email inbox, and security teams need to look further than just spam and phishing attacks. In this webinar, ...

  • Cloud Security Strategies for Today's Enterprises

    The typical enterprise relies on dozens, even hundreds, of cloud applications and services sprawled across different platforms and service providers. Security teams need to shoulder the responsibility of coordinating security and incident response and not leave it up to individual ...

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Weekly
-- Published By Dark Reading
Informa Tech
303 Second St., Suite 900 South Tower, San Francisco, CA 94107
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Weekly Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.