Follow Dark Reading:
 September 01, 2021
LATEST SECURITY NEWS & COMMENTARY
CISA and FBI: Be 'Vigilant' About Possible Ransomware Attacks Over Labor Day Weekend
Advisory recommends key defenses for mitigating risk by ransomware and other threats.
Is Security Worth the Cost of a Subscription? Yes, Docker Argues
The cloud-native infrastructure firm aims to add more trusted content to the Docker Hub and more tools to assess security for its users, but the price could be high for some companies.
A CISO's Perspective on Ransomware Payments
How living through the experience of assisting a small business with a ransomware attack changed my perspective on whether to pay.
4 Ways to Reduce the Risk of European Privacy Fines
Privacy compliance is complicated, but there are steps you can take to reduce the risk of fines for noncompliance. Often, European regulators will take your efforts into account when determining enforcement action. Here are four common elements that can have a significant impact on the amount of fines imposed.
Baby Monitor Vulnerable to Attack via Newly Found Bugs
Researchers find holes in Victure IPC360 Camera that could give hackers access to the monitor's camera feed.
MORE NEWS / MORE COMMENTARY
HOT TOPICS

6 Client-Side Security Concerns Enterprises Should Care About

Enterprises have to decide whether to take into account the security of end-customers' devices when building out the application experience, or even whether the application allows or denies access depending on the device.

The Power of Comedy for Cybersecurity Awareness Training
Cybersecurity is serious stuff, but the way we talk about it shouldn't be if we want people to pay attention and remember what they're taught.

7 Tips for Securing the Software Development Environment
Recent attacks have highlighted the need for organizations to pay closer attention to the hardware, software, and networks used in software development.

MORE
EDITORS' CHOICE

Microsoft Azure Cosmos DB Incident Underscores the Need to Closely Watch Cloud Data
Even businesses that do everything right still need to monitor their data and cloud services.
5 Considerations for Flexible Security Planning
From business processes to buying mechanisms and implementation timelines, a host of issues may stand in the way of flexible planning for cyber defense.
LATEST FROM THE EDGE

Chenxi Wang: From Security Research to Developing the Next Generation of Security Leaders
Security Pro File: After stints as an industry analyst and security executive for different companies, Chenxi Wang is developing the next-generation of security companies and women executives in security.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Security Alert Fatigue: How to Wake Up and Take Back Control of your SOC

    In this webinar, learn expert tips on how to improve your processes and use orchestration to relieve security alert fatigue, get the most out of your security investments and improve your cyber incident response.

  • "The New Normal" of Supply Chain Security

    In this webinar, experts discuss potential vulnerabilities in the new supply chain, and potential threats from online attackers. They also discuss the impact of these changes on compliance with industry and regulatory rules that govern the supply chain. You'll learn ...

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By Dark Reading
Informa Tech
303 Second St., Suite 900 South Tower, San Francisco, CA 94107
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.