Why and how "unqualified" candidates will fill the reservoir with the security workers America is thirsty for.
Follow Dark Reading:
 September 09, 2023
LATEST SECURITY FEATURES & COMMENTARY
3 Ways to Expand the Cyber Talent Pool From Splash Pad to Watering Hole
Why and how "unqualified" candidates will fill the reservoir with the security workers America is thirsty for.
Thoma Bravo Makes 'Practical' Decision to Merge ForgeRock Into Ping Identity
The private equity from has invested billions of dollars in identity and access management (IAM), but now it's on Ping founder and CEO Andre Durand and his team to rationalize overlapping product lines.
Software Supply Chain Strategies to Parry Dependency Confusion Attacks
Bad actors practice to deceive package managers with a tangled web of methods. Here's how to hoist them by their own petard.
6 Ways AI Can Revolutionize Digital Forensics
Artificial intelligence tools can automate the analysis of logs, video, and other important but tedious aspects of investigations.
Microsoft, Google Take on Obsolete TLS Protocols
Google shortened the lifetime of Transport Layer Security (TLS) certificates, and Microsoft plans to downgrade support for older versions, giving companies more data security but also removing visibility into their own traffic.
Name That Edge Toon: Prized Possessions
Come up with a clever caption, and our panel of experts will reward the winner with a $25 Amazon gift card.
Cybersecurity Builds Trust in Critical Infrastructure
Improving an energy company's resistance to cyberattack does more than protect vital resources — it enhances trust from customers and investors.
Coding Tips to Sidestep JavaScript Vulnerabilities
This Tech Tip focuses on best security practices to write secure JavaScript code.
MOVEit Breach Shows Us SQL Injections Are Still Our Achilles' Heel
SQL injection and its ilk will stop being "a thing" only after organizations focus on security by construction.
Authentication Outage Underscores Why 'Fail Safe' Is Key
Duo's service outage last week, impacting schools and businesses, highlights how companies should build in resiliency and business continuity into their authentication schemes.
MORE FROM THE EDGE / MORE FROM DR TECHNOLOGY
HOT TOPICS
'Evil Telegram' Spyware Campaign Infects 60K+ Mobile Users
Legitimate-seeming Telegram "mods" available in the official Google Play store for the encrypted messaging app signal the rise of a new enterprise threat.

Microsoft IDs Security Gaps that Let Threat Actors Steal Signing Key
China's Storm-0558 accessed user emails at some 25 enterprise organizations earlier this year using forged tokens.

AtlasVPN Linux Zero-Day Disconnects Users, Reveals IP Addresses
All it takes is a simple copy-paste to undo a VPN service used by millions worldwide.

MORE
EDITORS' CHOICE
Vendors Training AI With Customer Data Is an Enterprise Risk
While Zoom has scrapped plans to harvest customer content for use in its AI and ML models, the incident should raise concerns for enterprises and consumers alike.
8 AI Risk and Resilience Firms CISOs Should Track
Check out our list of emerging firms that are building technology and services to assess the risk posture of AI systems and ML models.
Will the AI Arms Race Lead to the Pollution of the Internet?
Content creators want to protect their intellectual property from AI by poisoning data. Could this destroy the machine learning ecosystem?
WEBINARS
  • Cyber Risk Assessment Secrets From the Pros

    Executives want to know whether they should worry about an attack that hit another organization. They worry how safe they are from a breach. But it can be difficult for security teams to quantitatively measure risk, or even say with ...

  • How Businesses Can Counterpunch against Generative AI-Powered Ransomware

    Join industry experts in AI and cybersecurity as they examine how ChatGPT and other generative AI tools are currently being used to improve the efficacy of ransomware attacks, how that will affect the cyber risk posture of most businesses, and ...

View More Dark Reading Webinars >>
WHITE PAPERS
FEATURED REPORTS
View More Dark Reading Reports >>
PRODUCTS & RELEASES
CURRENT ISSUE
DOWNLOAD THIS ISSUE
VIEW BACK ISSUES
Dark Reading Daily
-- Published By Dark Reading
Informa Tech Holdings LLC | Registered in the United States
with number 7418737 | 605 Third Ave., 22nd Floor, New York, New York 10158, USA
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.