| LATEST SECURITY NEWS & COMMENTARY | Inside the Famed Black Hat NOC Network operations center managers Bart Stump and Neil Wyler (aka Grifter) again head up the show network, but with a new hybrid twist. 101: Why BGP Hijacking Just Won't Die A look at the dangers of attacks on the Internet's Border Gateway Protocol and what ISPs and enterprises can do about them. When Software Updates Get Hacked Darned if you do, darned if you don't: Software fixes have become extensively automated, which works when software supply chains are secure. Yet with attackers focused on compromising those pipelines, is automated patching such a good idea? Phishing, Viruses Continue to Dominate the Malware Landscape Despite concerns over widely publicized ransomware and supply chain attacks, most enterprises report that phishing attacks and viruses are the most common threats they face. How Do I Let Go of 'Human Error' as an Explanation for Incidents? Successfully learning from incidents requires a deeper and more expansive perspective of them. MORE NEWS & COMMENTARY | | | | HOT TOPICS | Top Security Leaders Share Management Tips, Lessons, and Stories A panel of experts from Microsoft, Twitter, Cisco, and MongoDB share their thoughts on non-technical CISOs, managing through crises, and how they wish people communicated with them. How to Secure Your Cryptocurrency Wallet With your investments in a digital wallet, under your control, you are the sole owner and can have the peace of mind that no institution can confiscate your digital assets. When Ransomware Comes to (Your) Town While steps for defending against a ransomware attack vary based on the size of the government entity and the resources available to each one, rooting out ransomware ultimately will come down to two things: system architecture and partnerships. MORE |
|
| | Tech Resources | The New Risk Equation: Motives, Means, Opportunity Today's Hybrid Work Model Requires a Hybrid Approach to Security Accelerate Network Operations Efficiency with AIOps Ransomware, the Exploding Cyber Threat Case Study: What Elite Threat Hunters See That Others Miss Incident Readiness and Building Response Playbook GRC Buyer's Guide - 5 Steps to Success | ACCESS TECH LIBRARY NOW
|
| External Threat Hunting - Reduce Supply Chain Risk In this webinar, we'll look at how one Fortune 100 organization transformed its security program by investing in external threat hunting, establishing a world class threat reconnaissance program that now has proven ROI. With no-touch monitoring of its third parties' networks, ... Making Security Orchestration Automation and Response (SOAR) Work in Your Enterprise Over the past few years, many enterprises have been improving cybersecurity by implementing the Security Orchestration, Automation, and Response (SOAR) framework, which provides a path to collect threat data from multiple sources and respond to some security events automatically. How ... | MORE WEBINARS | |
|
|
Dark Reading Daily -- Published By Dark Reading Informa Tech 303 Second St., Suite 900 South Tower, San Francisco, CA 94107 | To update your profile, change your e-mail address, or unsubscribe, click here. | To opt-out of any future Dark Reading Daily Newsletter emails, please respond here. | Thoughts about this newsletter? Give us feedback. |
Keep This Newsletter Out Of Your SPAM Folder Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list: | If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation. | We take your privacy very seriously. Please review our Privacy Statement. |
|
|