Security pros need to look beyond user education to find and disarm fraudulent actors.
Follow Dark Reading:
 February 11, 2023
LATEST SECURITY NEWS & COMMENTARY
5 Ways to Survive Scam Season — or Rather, Tax Season
Security pros need to look beyond user education to find and disarm fraudulent actors.
Name That Edge Toon: For the Birds
Come up with a clever caption, and our panel of experts will reward the winner with a $25 Amazon gift card.
Gigamon Exits NDR Market, Sells ThreatInsight Business to Fortinet
Omdia has learned that Gigamon sold its ThreatInsight NDR business to Fortinet for approximately $31 million. The deal highlights what may be a pivot point for the NDR market.
How Do Playbooks Help CISOs Improve SecOps?
Extended detection and response (XDR) solutions have evolved to offer automated tools, such as playbooks, that enhance context and response.
Cloud Apps Still Demand Way More Privileges Than They Use
Hackers can't steal a credential that doesn't exist.
Keeping KillNet at Bay: Use the IP Address Blocklist
Security teams can use a blocklist containing tens of thousands of proxy IP addresses used by the pro-Russian hacktivist group to defend their organizations from DDoS attacks.
Google Cloud Connects Chronicle to Health ISAC Feed
Members of the Health-ISAC can ingest threat indicators directly into Chronicle to investigate whether the threat is present in their environment.
Why Some Cloud Services Vulnerabilities Are So Hard to Fix
Five months after AWS customers were alerted about three vulnerabilities, nearly none had plugged the holes. The reasons why underline a need for change.
MORE NEWS / MORE COMMENTARY
HOT TOPICS
Make Developers the Driver of Software Security Excellence
Those who are wrangling code every day could fuel a genuinely transformational approach to security — if they are adequately upskilled.

What CISOs Can Do About Brand Impersonation Scam Sites
Apply these nine tips to proactively fight fraudulent websites that use your brand to rip people off.

7 Use Cases for Distributed Cloud Environments
As infrastructure has grown more complex, the need to effectively manage it has grown, too – particularly for applications and APIs.

MORE
EDITORS' CHOICE
Why CISOs Should Care About Brand Impersonation Scam Sites
Enterprises often don't know whose responsibility it is to monitor for spoofed brand sites and scams that steal customers' trust, money, and personally identifiable information.
FROM THE NEWS DESK

7 Critical Cloud Threats Facing the Enterprise in 2023
From shadow data to misconfigurations, and overpermissioning to multicloud sprawl, Dark Reading's cloud security slideshow helps security pros understand the threat horizon.
WEBINARS
  • Deciphering the Hype Around XDR

    Security teams are increasingly being asked about the organization's Extended Detection and Response capabilities. There is still a lot of confusion and misunderstanding about XDR and what it can accomplish. XDR goes beyond endpoint monitoring and detection, while extending visibility ...

  • Rethinking Authentication: MFA, Passwordless, Certificates, and More

    Today's data protection requires stronger, better authentication. What does going beyond passwords look like? What are some of the latest strategies around authentication and authorization? What is continuous authentication and what would it look like in your organization? What kind ...

View More Dark Reading Webinars >>
WHITE PAPERS
FEATURED REPORTS
View More Dark Reading Reports >>
PRODUCTS & RELEASES
CURRENT ISSUE
DOWNLOAD THIS ISSUE
VIEW BACK ISSUES
Dark Reading Daily
-- Published By Dark Reading
Informa Tech Holdings LLC | Registered in the United States
with number 7418737 | 605 Third Ave., 22nd Floor, New York, New York 10158, USA
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.