If your security team is considering, planning, building, or operating a threat intelligence capability, this advice can help.
Follow Dark Reading:
 October 08, 2022
LATEST SECURITY NEWS & COMMENTARY
7 Practical Considerations for Effective Threat Intelligence
If your security team is considering, planning, building, or operating a threat intelligence capability, this advice can help.
Name That Edge Toon: Mumbo Dumbo
Come up with a clever caption, and our panel of experts will reward the winner with a $25 Amazon gift card.
Sharing Knowledge at 44CON
The infosec conference named after the UK's calling code returned this year with a focus on building a healthy community.
Exposure Management? Understanding the Attacker Takes Center Stage
Announcing its exposure management platform, Tenable joins other companies in offering ways — such as attack surface management — to look at business networks through the eyes of attackers.
Cybersecurity Will Account for Nearly One-Quarter of AI Software Market Through 2025
A boom in artificial intelligence-powered detection and remediation tools pushes security spending to the top of the AI market, according to Forrester.
Growing Reliance on Cloud Brings New Security Challenges
With organizations expanding their cloud operations, cloud security is imperative to protect applications and data.
The Insecurities of Cybersecurity Success
Becoming a big wheel doesn't have to cost your happiness, but grind culture makes that likely.
MORE NEWS / MORE COMMENTARY
HOT TOPICS
Worried About the Exchange Zero-Day? Here's What to Do
While organizations wait for an official patch for the two zero-day flaws in Microsoft Exchange, they should scan their networks for signs of exploitation and apply these mitigations.

We're Thinking About SaaS the Wrong Way
Many enterprise applications are built outside of IT, but we still treat the platforms they're built with as point solutions.

No Motivation for Quantum Without Regulatory Push
What's it going to take to prod organizations to implement a post-quantum security plan? Legislative pressure.

MORE
EDITORS' CHOICE
Fake Accounts Are Not Your Friends!
Inflated user bases and fake engagement cause more harm than good, especially when the artificial accounts are based on stolen human identities.
FROM THE NEWS DESK

7 IoT Devices That Make Security Pros Cringe
A look at everything from truly dumb smart devices to cool-looking IoT tech with huge cybersecurity and privacy implications.
WEBINARS
View More Dark Reading Webinars >>
WHITE PAPERS
FEATURED REPORTS
View More Dark Reading Reports >>
PRODUCTS & RELEASES
CURRENT ISSUE
DOWNLOAD THIS ISSUE
VIEW BACK ISSUES
Dark Reading Daily
-- Published By Dark Reading
Informa Tech Holdings LLC | Registered in the United States
with number 7418737 | 605 Third Ave., 22nd Floor, New York, New York 10158, USA
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.