How lava lamps, pendulums, and suspended rainbows keep the Internet safe.
Follow Dark Reading:
 March 09, 2024
LATEST SECURITY FEATURES & COMMENTARY
Creating Security Through Randomness
How lava lamps, pendulums, and suspended rainbows keep the Internet safe.
Cyber Insurance Strategy Requires CISO-CFO Collaboration
Cyber-risk quantification brings together the CISO's technical expertise and the CFO's focus on financial impact to develop a stronger and better understanding of what's at stake.
How to Ensure Open Source Packages Are Not Landmines
CISA and OpenSSF jointly published new guidance recommending technical controls to make it harder for developers to bring malicious software components into code.
Why Criminals Like AI for Synthetic Identity Fraud
The wide availability of generative AI will make synthetic identity fraud even easier. Organizations need a multilayered defense to protect themselves.
CISO Sixth Sense: NIST CSF 2.0's Govern Function
2024 will redefine CISO leadership while acknowledging the management gap.
The Challenges of AI Security Begin With Defining It
Security for AI is the Next Big Thing! Too bad no one knows what any of that really means.
Name That Edge Toon: How Charming
Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card.
MORE FROM THE EDGE / MORE FROM DR TECHNOLOGY
HOT TOPICS
How CISA Fights Cyber Threats During Election Primary Season
Election cyber threats come from various places, including compromised voting machines, AI deepfakes, and potential physical harm to workers. But CISA has been working diligently with various public and private partners to stymie the risk.

Russia-Sponsored Cyberattackers Infiltrate Microsoft's Code Base
The Midnight Blizzard APT is mounting a sustained, focused cyber campaign against the computing kahuna, using secrets it stole from emails back in January.

Don't Give Your Business Data to AI Companies
Handing over your business data to artificial intelligence companies comes with inherent risks.

MORE
PRODUCTS & RELEASES
EDITORS' CHOICE
It's 10 p.m. Do You Know Where Your AI Models Are Tonight?
Lack of AI model visibility and security puts the software supply chain security problem on steroids.
Cloud Apps Make the Case for Pen-Testing-as-a-Service
Applications are increasingly distributed, expanding companies' cloud attack surfaces and requiring regular testing to find and fix vulnerabilities — and avoid the risk of a growing sprawl of services.
NSA's Zero-Trust Guidelines Focus on Segmentation
Zero-trust architectures are essential protective measures for the modern enterprise. The latest NSA guidance provides detailed recommendations on how to implement the networking angle of the concept.
WEBINARS
WHITE PAPERS
FEATURED REPORTS
View More Dark Reading Reports >>
Dark Reading Daily
-- Published By Dark Reading
Informa Tech Holdings LLC | Registered in the United States
with number 7418737 | 605 Third Ave., 22nd Floor, New York, New York 10158, USA
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.