Follow Dark Reading:
 September 25, 2021
LATEST SECURITY NEWS & COMMENTARY
10 Ways to Avoid Zero-Trust Failure
Here are the prerequisites to have in order before getting past the zero-trust gate.
Primer: Microsoft Active Directory Security for AD Admins
Nearly all AD environments are vulnerable to identity attack paths -- a powerful, widespread, and difficult-to-detect attack technique. But we didn't say impossible. Here's how admins can stop them.
What Are the Different Types of Cyber Insurance?
Even with the best cybersecurity defenses in place, organizations can fall victim to a cyberattack.
10 Threat Trends in DNS Security
Cisco Security examines Cisco Umbrella data for trends in malicious DNS activity during 2020.
What Is the Difference Between Security and Resilience?
Resilience shifts the focus toward eliminating the probable impact of the full attack chain.
MORE NEWS / MORE COMMENTARY
HOT TOPICS
How to Bust Through Barriers for a More Diverse Cybersecurity Workforce
Diversity is the topic du jour, but cybersecurity professionals of color still face a lot of hurdles to enter and grow within the industry. Organizations such as Blacks in Cybersecurity are providing some of these under-represented groups with a voice.

Constructive Complaints: 5 Ways to Transform Problems Into Plans
Working in infosec has its challenges, and it's easy enough to complain about them. But that won't solve anything.

How Should the CSO Work With the Chief Privacy Officer?
The chief security officer needs to be in constant communication with the chief privacy officer about what's working or not working.

MORE
EDITORS' CHOICE

A Ransomware Recovery Plan That's Solid Gold
Having a gold copy of critical data offline is essential in every organization's disaster recovery or continuity plan. Follow the 3-2-1-1 rule to secure your data.

5 Things Incident Responders Wish CISOs Would Prioritize

If CISOs places these issues front and center, it would help make security response a whole lot more effective.


FROM THE NEWS DESK

6 Lessons From Major Data Breaches This Year
Though many incidents stemmed from familiar security failures, they served up — or resurfaced — some important takeaways.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Learn Why XDR Delivers Better Outcomes to Secure Your Endpoints

    Endpoint security continues to evolve. The increasing complexity of the threat landscape means we can no longer depend on next-gen antivirus (NGAV) or EDR (Endpoint Detection and Response) alone to protect against sophisticated attacks. It's well known that endpoint attacks ...

  • Ten Hot Talks from Black Hat 2021

    The annual Black Hat USA 2021 in Las Vegas featured a full slate of cybersecurity researchers presenting. They offered up discoveries about new critical security vulnerabilities, new threats, and new security tools that enterprise defenders need to know about as they ...

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By Dark Reading
Informa Tech
303 Second St., Suite 900 South Tower, San Francisco, CA 94107
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.