Unless the CEO and other C-suite executives defer to the CISO's decisions on cybersecurity, is the CISO really running things?
Follow Dark Reading:
 August 05, 2023
LATEST SECURITY FEATURES & COMMENTARY
CISOs Need Backing to Take Charge of Security
Unless the CEO and other C-suite executives defer to the CISO's decisions on cybersecurity, is the CISO really running things?
BloodHound Rewrites Open Source Tool, Launches Community Edition
The open source ecosystem for offensive and defensive security technologies is flourishing, giving security teams access to a wide range of tools to do their jobs.
Protecting Intellectual Property When It Needs to Be Shared
Companies should use a variety of tools and strategies, both technical and policy, to protect their IP from third-party risk.
What Implementing Biometrics for Authentication Looks Like
CISOs are incorporating biometrics as part of their multifactor authentication strategies. This is what they should be thinking about during implementation.
MORE FROM THE EDGE / MORE FROM DR TECHNOLOGY
HOT TOPICS
Exclusive: CISA Sounds the Alarm on UEFI Security
Had Microsoft had adopted a more secure update path to mitigate the BlackLotus UEFI bootkit, it might already be eliminated, a CISA official says.

Tesla Jailbreak Unlocks Theft of In-Car Paid Features
Want heated seats for free? Self-driving in Europe despite a regulatory ban? Researchers have discovered the road to free car-modding on the popular Tesla EVs.

Summer Documentary Watch Party: 8 Sizzling Cybersecurity Tales
From the upcoming Billion Dollar Heist to docs on the Ashley Madison breach and Stuxnet, here are a bevy of films that can scratch that wanna-be hacker itch.

MORE
EDITORS' CHOICE
10 Free Purple Team Security Tools to Check Out
Check out this curated list of cool tools and platforms for both offensive security experts and defenders, all of which will be released or demoed at Black Hat USA 2023.
Companies Must Have Corporate Cybersecurity Experts, SEC Says
Enterprises must now describe their management's expertise in cybersecurity. But what exactly does that entail?
Job Seekers, Look Out for Job Scams
Scammers are setting out lures for people looking for work. If a position sounds too good to be true, it probably is.
WEBINARS
  • Protecting the Database: How to Secure Your Enterprise Data

    For many enterprises, the "crown jewels" are found in their database applications - virtual "crown jewels" of data in traditional database applications that are often linked to the Internet. What are the chief threats to today's databases? How can you ...

  • Implementing Zero-Trust With A Remote Workforce

    The shift to remote work and a distributed workforce model highlighted the importance of the zero-trust model for organizations. Corporate endpoint devices are no longer protected behind the enterprise perimeter, connect to routers with unknown levels of security, and share ...

View More Dark Reading Webinars >>
WHITE PAPERS
FEATURED REPORTS
View More Dark Reading Reports >>
PRODUCTS & RELEASES
CURRENT ISSUE
DOWNLOAD THIS ISSUE
VIEW BACK ISSUES
Dark Reading Daily
-- Published By Dark Reading
Informa Tech Holdings LLC | Registered in the United States
with number 7418737 | 605 Third Ave., 22nd Floor, New York, New York 10158, USA
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.