Follow Dark Reading:
 June 05, 2021
LATEST SECURITY NEWS & COMMENTARY
Microsoft 365: Most Common Threat Vectors & Defensive Tips
Security pros discuss the most typical ways attackers leverage Microsoft 365 and share their guidance for defenders.
A Wrench and a Screwdriver: Critical Infrastructure's Last, Best Lines of Defense?
Critical infrastructure's cybersecurity problems are complex, deep-rooted, and daunting. Addressing them won't be easy...but it isn't impossible.
Welcome to the New Workplace
The pandemic has changed the landscape in which security pros work. Here are five ways how.
A View From Inside a Deception
Pen-testing today's threat deception technology is not for the faint-hearted. Do modern deception tools truly frustrate adversaries, and are they ready for the enterprise SOC?
Name That Edge Toon: In Tow
Feeling creative? Submit your caption in the comments, and our panel of experts will reward the winner with a $25 Amazon gift card.
Is Your Adversary James Bond or Mr. Bean?
Especially with nation-state attacks, its critical to assess whether you're up against jet fighter strength or a bumbler who tries to pick locks.
Chart: Cloud Concerns
As more organizations make their way to the cloud, their eyes are wide open to the associated cybersecurity risks that tag along for the ride.
MORE NEWS & COMMENTARY
HOT TOPICS

How Are Cyber Insurance Companies Assessing Ransomware Risk?

From limiting claims payments to tying payments to policyholders' actions, the cyber insurance industry is in "a very dynamic place right now," says Corvus Insurance CEO Phil Edmundson.

Cloud Security Blind Spots: Where They Are and How to Protect Them

Security experts discuss oft-neglected areas of cloud security and offer guidance to businesses working to strengthen their security posture.

How to Get Employees to Care About Security

Want to a security awareness program that sticks? Make it fun and personal -- and offer free lunch.

MORE
EDITORS' CHOICE

The Makings of a Better Cybersecurity Hire

Experience counts, but as one CISO has learned, don't overlook a creative, motivated candidate just because their background doesn't match the job description.


Planning Our Passwordless Future

All the talk that passwords could one day go away seemed too good to be true, yet the scales are finally started to tip to a passwordless reality.


FROM THE NEWS DESK

Proposed Sale Casts Cloud Over Future of FireEye's Products
Symphony Technology Group, which is buying FireEye, already owns multiple security companies "with redundancies in numerous areas."
Tech Resources
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By Dark Reading
Informa Tech
303 Second St., Suite 900 South Tower, San Francisco, CA 94107
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.