Threat actors have focused on two ends of the spectrum — quick, impactful attacks or stealthy intrusions — making strong prevention and faster response more important for enterprises.
Follow Dark Reading:
 March 04, 2022
LATEST SECURITY NEWS & COMMENTARY
Accelerated Ransomware Attacks Pressure Targeted Companies to Speed Response
Threat actors have focused on two ends of the spectrum — quick, impactful attacks or stealthy intrusions — making strong prevention and faster response more important for enterprises.
How to Get One Step Ahead of Mobile Attacks
The advent of so-called "dropper" apps, which deliver and install malware that can also be later updated, is an emerging threat vector for mobile users.
8-Character Passwords Can Be Cracked in Less than 60 Minutes
Researchers say passwords with less than seven characters can be hacked "instantly."
MORE NEWS / MORE COMMENTARY
HOT TOPICS
7 Steps to Take Right Now to Prepare for Cyberattacks by Russia
A lot of the recommended preparation involves measures organizations should have in place already.

Cyberattacks in Ukraine Soon Could Spill Over to Other Countries
Email-borne attacks out of Russia have already targeted at least a few US and European organizations.

3 Ways to Expand Gender Diversity in Cybersecurity
Why this is important: A business that surrounds itself with the same kind of people who work on the same projects will not generate new or original ideas.

Name That Toon: Out in the Cold
Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card.

MORE
EDITORS' CHOICE

7 Ways to Secure Collaboration Tools in Your Organization
The push to embrace Slack, Teams, and Zoom at work comes with new security risks for organizations.
LATEST FROM THE EDGE

What Does Least Privilege Access Mean for Cloud Security?
While traditional security controls are necessary at the perimeter, organizations also need to prevent malicious privileged access.
LATEST FROM DR TECHNOLOGY

Cybersecurity Mesh Architecture: Hope or Hype?
Gartner has touted CSMA as one of the top technology trends for this year. But what is it really?
Tech Resources
ACCESS TECH LIBRARY NOW

  • Making Deception a Part of Your Enterprise Defense Strategy

    Most enterprise defenses focus on preventing attackers from getting in. But what if you could distract and trick attackers by making them think they are advancing their attack-and then mislead them? In this webinar, experts discuss emerging tools and strategies ...

  • Streamlining Your Patch Management Processes

    Patch management is a core element of any security strategy. But patch management is only as effective as the bugs it can identify. Undiscovered vulnerabilities are a massive risk to an organization as bad actors find their way into organizations ...

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By Dark Reading
Informa Tech Holdings LLC | Registered in the United States
with number 7418737 | 605 Third Ave., 22nd Floor, New York, New York 10158, USA
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.