Follow Dark Reading:
 November 20, 2021
LATEST SECURITY NEWS & COMMENTARY
6 Tips To Keep in Mind for Ransomware Defense
Ransomware is everywhere, including the nightly news. Most people know what it is, but how do ransomware attackers get in, and how can we defend against them?
Addressing the Low-Code Security Elephant in the Room
The danger of anyone being able to spin up new applications is that few are thinking about security. Here's why everyone is responsible for the security of low-code/no-code applications.
Suppliers, Cloud Providers Are Threats to Enterprise Data, Survey Says
Other threats to enterprise data include cybercriminals, authorized users, foreign governments, and application vulnerabilities, according to Dark Reading's recent Strategic Security Report.
Can I Have XDR Without EDR?
Yes, extended detection and response is possible without endpoint detection and response, but here's why having both is helpful.
3 Takeaways from the Gartner Risk Management Summit
Security leaders can be treated as partners supporting the business and share accountability by establishing relationships with business stakeholders.
MORE NEWS / MORE COMMENTARY
HOT TOPICS
Edge Chat With Cisco Secure CTO TK Keanini on Achieving Better Security Outcomes
Now is the time for organizations to rethink their security strategies with a platform- and architecture-based approach in mind. Keanini explains.

How Do I Know It's Time to Consider a SASE Migration?
The rapid shift to a hybrid workplace and accelerated adoption of new technologies means it's time to rethink networking security approaches.

SquirrelWaffle Leverages Malspam to Deliver Qakbot, Cobalt Strike
Threat is spreading widely via spam campaigns, infecting systems with a new malware loader.

MORE
EDITORS' CHOICE

Follow the Leaders: A Blueprint for Software Security Success
Organizations can study software security leaders and emulate their habits and initiatives in order to build a successful software security program of their own.
FROM THE NEWS DESK

Is XDR Overhyped?
Security experts weigh in on the value and pitfalls of extended detection and response (XDR), offering consideration and advice on this growing new category.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Preventing Attackers from Navigating Your Enterprise Systems

    Over the past few years, cyber attackers have favored exploits in which they steal a legitimate user's credentials and then navigate enterprise defenses as a trusted end user. This "lateral movement" enables the attacker to quickly gain access to a ...

  • Protecting Enterprise Data from Malicious Insiders

    It's a sad truth: not all employees are nice. Corporate espionage, sabotage and other security incidents could be committed or aided by any insider with something to gain. How do you know when a once-trustworthy employee is about to do ...

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By Dark Reading
Informa Tech
303 Second St., Suite 900 South Tower, San Francisco, CA 94107
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.