Follow Dark Reading:
 September 18, 2021
LATEST SECURITY NEWS & COMMENTARY
A Ransomware Recovery Plan That's Solid Gold
Having a gold copy of critical data offline is essential in every organization's disaster recovery or continuity plan. Follow the 3-2-1-1 rule to secure your data.
How Should the CSO Work With the Chief Privacy Officer?
The chief security officer needs to be in constant communication with the chief privacy officer about what's working or not working.
Reported Rates of Major Security Incidents by Market
In the "Proven Success Factors for Endpoint Security" report, Cisco Security shares a global perspective on reported cyber events in the past two years.
Constructive Complaints: 5 Ways to Transform Problems Into Plans
Working in infosec has its challenges, and it's easy enough to complain about them. But that won't solve anything.
Name That Edge Toon: Security Goals
Feeling creative? Come up with a clever caption, and our panel of experts will reward the winner with a $25 Amazon gift card.
MORE NEWS / MORE COMMENTARY
HOT TOPICS
How to Bust Through Barriers for a More Diverse Cybersecurity Workforce
Diversity is the topic du jour, but cybersecurity professionals of color still face a lot of hurdles to enter and grow within the industry. Organizations such as Blacks in Cybersecurity are providing some of these under-represented groups with a voice.

10 Obstacles That Prevent Security Pros From Doing Their Jobs

As if fighting against cyberattacks weren't hard enough, security teams also have to contend with other issues that prevent them from doing their jobs effectively.

Edge Chat with Cisco Secure's TK Keanini on Achieving Better Security Outcomes
The latest installment of Edge Chats focuses on how security teams can achieve better security outcomes with an open platform.

MORE
EDITORS' CHOICE

7 Old IT Things Every New InfoSec Pro Should Know

Beneath all those containers and IoT devices, there's a rich patchwork of gear, protocols, and guidelines that have been holding it together since before you were born. Knowledge of those fundamentals is growing more valuable, not less.


FROM THE NEWS DESK

Microsoft Warns of Uptick in MSHTML Attacks
Attackers leveraging the flaw are using infrastructure associated with other criminal groups, including ransomware-as-a-service operators, the company says.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Ten Hot Talks from Black Hat 2021

    The annual Black Hat USA 2021 in Las Vegas featured a full slate of cybersecurity researchers presenting. They offered up discoveries about new critical security vulnerabilities, new threats, and new security tools that enterprise defenders need to know about as they ...

  • Detecting and Stopping Online Attacks

    Today's cyber attackers can compromise your systems using a variety of methods, from well-disguised malware to sophisticated, targeted exploits aimed right at your company. How can you identify these attacks quickly and respond effectively? In this Dark Reading webinar, top ...

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By Dark Reading
Informa Tech
303 Second St., Suite 900 South Tower, San Francisco, CA 94107
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.