Follow Dark Reading:
 November 06, 2021
LATEST SECURITY NEWS & COMMENTARY
Simulation Game Teaches Non-Security Staff How to Handle a Cyber Crisis
In this card-based game from Kaspersky, players work through a cyberattack scenario and learn how each decision they make has consequences.
Who's Minding Your Company's Crypto Decisions?
Security teams must first evaluate security protocols and the reputation of the cryptocurrency payment platform before their companies can proceed to accept the alternative currency as payment.
5 MITRE ATT&CK Tactics Most Frequently Detected by Cisco Secure Firewalls
Cisco Security examines the most frequently encountered MITRE ATT&CK tactics and techniques.
How Is Zero Trust Different From Traditional Security?
Unlike traditional security approaches, the zero-trust security model verifies a user's identity each and every time they need specific system access.
Name That Edge Toon: Parting Thoughts
Feeling creative? Come up with a clever caption, and our panel of experts will reward the winner with a $25 Amazon gift card.
MORE NEWS / MORE COMMENTARY
HOT TOPICS
5 Ways CMMC Security Requirements May Impact Universities
The Cybersecurity Maturity Model Certification puts research universities in a position where they must validate the effectiveness of their security controls before applying for a grant or bidding on a government contract.

What Exactly Is Secure Access Service Edge (SASE)?
Any company that supports a hybrid workforce should at least be familiar with this relatively new security approach.

Defenders Worry Orgs Are More Vulnerable Than Last Year
Most IT and security leaders are confident their cybersecurity strategies are on the right track, but they still believe their organizations are as vulnerable as they were a year ago.

MORE
EDITORS' CHOICE

6 Ways to Rewrite the Impossible Job Description
It's hard enough to fill a cybersecurity position given the talent shortage. But you may be making it harder with a poor job description that turns off would-be candidates.
FROM THE NEWS DESK

CISA Issues New Directive for Patching Known Exploited Vulnerabilities
The goal is to reduce civilian federal agency exposure to attacks that threat actors are actively using in campaigns, agency says.
Tech Resources
ACCESS TECH LIBRARY NOW

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By Dark Reading
Informa Tech
303 Second St., Suite 900 South Tower, San Francisco, CA 94107
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.