Dark Reading highlights women who are quietly changing the game in cybersecurity.
Follow Dark Reading:
 March 10, 2022
LATEST SECURITY NEWS & COMMENTARY
Log4j and Livestock Apps: APT41 Wages Persistent Cyberattack Campaign on US Government
The group's attack methods have included exploits for a zero-day vulnerability in a livestock-tracking apps as well as for the Apache Log4 flaw.
Google to Buy Mandiant, Aims to Automate Security Response
In a deal worth $5.4 billion, Google would expand its security portfolio with managed detection and response (MDR) and threat intelligence, with an increasing focus on automation.
Most Cybersecurity Vendors at Risk Due to Internet-Exposed IT Assets
Study shows more than 97% have exposed assets on AWS — among a wide range of other issues.
Accelerated Ransomware Attacks Pressure Targeted Companies to Speed Response
Threat actors have focused on two ends of the spectrum — quick, impactful attacks or stealthy intrusions — making strong prevention and faster response more important for enterprises.
Trio of Vendors Offer Free Services to Organizations at Risk of Russian Cyberattacks
CrowdStrike, Cloudflare, and Ping Identity have teamed up with tools and services for the healthcare, power, and water industries as a way to quickly bolster their security on several fronts.
Medical and IoT Devices From More Than 100 Vendors Vulnerable to Attack
PTC has issued patches for seven vulnerabilities — three critical — in its widely used Axeda remote management technology.
Microsoft Patches Critical Exchange Server Flaw
Remote code execution vulnerability among 71 bug fixes issued in March Patch Tuesday.
FBI Alert: Ransomware Attacks Hit Critical Infrastructure Organizations
Bureau releases indicators of compromise for the RagnarLocker ransomware that has hit 10 different critical infrastructure sectors.
Why the World Needs a Global Collective Cyber Defense
This sort of approach would enable cross-company and cross-sector threat information sharing, an effort that would allow companies to easily turn data into actionable insights.
Breaking the Bias for International Women’s Day 2022
The theme of International Women’s Day 2022 is "Break the bias." This is what #BreaktheBias means to me.
How to Get One Step Ahead of Mobile Attacks
The advent of so-called "dropper" apps, which deliver and install malware that can also be later updated, is an emerging threat vector for mobile users.
7 Essentials for More Security-Aware Design Automation
Electronic design automation solutions, software programs that help designers develop electronic systems and semiconductor chips, can be used in service of security assurance.
MORE NEWS / MORE COMMENTARY
HOT TOPICS
3 Ways to Expand Gender Diversity in Cybersecurity
Why this is important: A business that surrounds itself with the same kind of people who work on the same projects will not generate new or original ideas.

Zero Trust Can't Stop at the Federal Level
The federal government must step in to help local and state governments implement zero trust.

MORE
EDITORS' CHOICE

8 More Women in Security You May Not Know but Should
Dark Reading highlights women who are quietly changing the game in cybersecurity. We also revisit some of those we've spoken to in the past to see what they're up to now.
LATEST FROM THE EDGE

Dark Reading Reflects on International Women's Day
A look at how far the information security industry has come — and how far it still has to go.
LATEST FROM DR TECHNOLOGY

Cybersecurity Mesh Architecture: Hope or Hype?
Gartner has touted CSMA as one of the top technology trends for this year. But what is it really?
Tech Resources
ACCESS TECH LIBRARY NOW

  • Making Deception a Part of Your Enterprise Defense Strategy

    Most enterprise defenses focus on preventing attackers from getting in. But what if you could distract and trick attackers by making them think they are advancing their attack-and then mislead them? In this webinar, experts discuss emerging tools and strategies ...

  • Streamlining Your Patch Management Processes

    Patch management is a core element of any security strategy. But patch management is only as effective as the bugs it can identify. Undiscovered vulnerabilities are a massive risk to an organization as bad actors find their way into organizations ...

MORE WEBINARS
FEATURED REPORTS
  • How Enterprises Are Assessing Cybersecurity Risk in Today's Environment

    Many cybersecurity pros expect fundamental, long-term changes to their organization's computing and data security due to the shift to more remote work and accelerated cloud adoption. Download this report from Dark Reading to learn more about their challenges and concerns.

  • How Data Breaches Affect the Enterprise

    Many organizations report that major impacts have declined significantly compared with a year ago, suggesting that many have gotten better at containing breach fallout. Download this report to delve more into this timely topic.

MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Weekly
-- Published By Dark Reading
Informa Tech Holdings LLC | Registered in the United States
with number 7418737 | 605 Third Ave., 22nd Floor, New York, New York 10158, USA
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Weekly Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.