New technologies designed into processors allow enterprises to leverage cloud advantages while meeting privacy regulations.
Follow Dark Reading:
 October 29, 2022
LATEST SECURITY NEWS & COMMENTARY
Cloud Providers Throw Their Weight Behind Confidential Computing
New technologies designed into processors allow enterprises to leverage cloud advantages while meeting privacy regulations.
Equifax's Lessons Are Still Relevant, 5 Years Later
Cybersecurity pros discuss a trio of lessons from the Equifax hack and how to prevent similar attacks in the enterprise.
IoT Fingerprinting Helps Authenticate and Secure All Those Devices
For organizations struggling to protect a rapidly expanding volume of IoT devices, IoT fingerprinting could help with security and management.
Wanted: Cybersecurity Training That Breaks Down Silos
The next generation of cybersecurity pros will need to participate frequently in relevant training to expand their skills and stay engaged.
Apple Launches New Security Research Hub
Apple engineers share technical details about the team's work on memory safety features on the new Apple Security Research site.
3 Steps Small Businesses Can Take to Prevent Cyberattacks
Setting priorities for internal security measures and outsourcing complex practices help protect small and midsize businesses.
Embracing the Next Generation of Business Developers
Security teams that embrace low-code/no-code can change the security mindset of business users.
GitLab Adds Governance, Software Supply Chain Enhancements
Developers will be able to scan for vulnerabilities in source code, containers, dependencies, and applications in production.
MORE NEWS / MORE COMMENTARY
HOT TOPICS
Security Awareness Urged to Grow Beyond Compliance
Increasingly vendors are looking for ways to take security awareness beyond checkbox compliance courses to more context-dependent interactions — a "shift left" to the average worker.

What Fast-Talkers Can Teach Us About Vetting Vendors
Here's how to differentiate vendors that can back up their words with solutions and those that cannot.

Passkey Demos Hint at What's Ahead for Passwordless Authentication
At the Authenticate Conference, Google and Microsoft demonstrated their passkey prototypes. Apple, meanwhile, already launched its version in iOS 16.

MORE
EDITORS' CHOICE
Top 10 Kubernetes Security Risks Every DevSecOps Pro Should Know
The mission to run any containerized application on any infrastructure makes security a challenge on Kubernetes.
FROM THE NEWS DESK

Prepare Now for Critical Flaw in OpenSSL, Security Experts Warn
Even if the security bug is not another Heartbleed, prepare like it might be, they note — it has potentially sprawling ramifications.
WEBINARS
  • Analyzing and Correlating Security Operations Data

    Most security operations centers aren't failing because they don't have enough data - they are failing because they have too much data. In this webinar, experts recommend tools and best practices for correlating information from multiple security systems so that ...

  • Cybersecurity Outlook 2023

    On December 13, Cybersecurity Outlook 2023 will look at some of the new threats posed by cybercriminals and nation-states, as well as evolving products and technologies that may help mitigate those threats. You'll hear from some of the cybersecurity industry's leading experts, ...

View More Dark Reading Webinars >>
WHITE PAPERS
FEATURED REPORTS
View More Dark Reading Reports >>
PRODUCTS & RELEASES
CURRENT ISSUE
DOWNLOAD THIS ISSUE
VIEW BACK ISSUES
Dark Reading Daily
-- Published By Dark Reading
Informa Tech Holdings LLC | Registered in the United States
with number 7418737 | 605 Third Ave., 22nd Floor, New York, New York 10158, USA
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.