Organizations in "essential" sectors have until October 2024 to comply with the Network and Information Systems Directive 2022 (NIS2).
Follow Dark Reading:
 November 18, 2023
LATEST SECURITY FEATURES & COMMENTARY
EU Tightens Cybersecurity Requirements for Critical Infrastructure and Services
Organizations in "essential" sectors have until October 2024 to comply with the Network and Information Systems Directive 2022 (NIS2).
A Closer Look at State and Local Government Cybersecurity Priorities
Complexity impedes the universal and consistent application of security policies, which is an obstacle to adequately securing government environments.
Actions to Take to Defeat Initial Access Brokers
Initial access brokers (IAB) are often difficult to track. This Tech Tip spells out some countermeasures enterprises need to defend against stolen credentials.
IT Pros Worry Generative AI Will Be a Major Driver of Cybersecurity Threats
Organizations are concerned about generative AI technologies as being a major driver of cybersecurity threats in 2024.
HARmor Cleans, Sanitizes, Encrypts HAR Files
Okta's breach highlights the importance of sanitizing the data logged in HAR files before sharing them.
Cybersecurity Investment Involves More Than Just Technology
Organizations are also looking at threat intelligence, risk assessment, cyber insurance, and third-party risk management.
Make Changes to Be Ready for the New SEC Cybersecurity Disclosure Rule
Mandiant/Google Cloud's Jill C. Tyson and Dark Reading's Terry Sweeney on how companies can better plan and prepare for the Securities and Exchange Commission's new cybersecurity disclosure rule.
MORE FROM THE EDGE / MORE FROM DR TECHNOLOGY
HOT TOPICS
'CacheWarp' AMD VM Bug Opens the Door to Privilege Escalation
Academics in Germany figured out how to reverse time in AMD virtualization environments, then reap the spoils.

Rackspace Ransomware Costs Soar to Nearly $12M
Rackspace's 2022 ransomware attack costs only continue to mount, with lawsuits in the offing — and show the long-tail costs of a cyberattack.

Microsoft Zero-Days Allow Defender Bypass, Privilege Escalation
Another two bugs in this month's set of fixes for 63 CVEs were publicly disclosed previously but have not been exploited yet.

MORE
EDITORS' CHOICE
When Good Security Awareness Programs Go Wrong
Avoid making these mistakes when crafting a security awareness strategy at your organization.
Name That Edge Toon: Out for the Count
Come up with a clever cybersecurity-related caption, and our panel of experts will reward the winner with a $25 Amazon gift card.
First Wave of Vulnerability-Fixing AIs Available for Developers
GitHub joins a handful of startups and established firms in the market, but all the products are essentially "caveat developer" — let the developer beware.
WEBINARS
  • SecOps & DevSecOps in the Cloud

    Security teams today face the dual challenge of securing cloud-native applications as well as their software development processes that increasingly operate in the cloud. At the same time, attacks are rising against misconfigured cloud instances as well as a new ...

  • Reducing Cyber Risk in Enterprise Email Systems: It's Not Just Spam and Phishing

    Many of today's most damaging cyberattacks begin with a phishing lure delivered over corporate email. The attacks against Microsoft Exchange illustrated the extent of damage attackers can inflict by targeting enterprise email servers. Many enterprises still don't have a unified ...

View More Dark Reading Webinars >>
WHITE PAPERS
FEATURED REPORTS
View More Dark Reading Reports >>
PRODUCTS & RELEASES
CURRENT ISSUE
DOWNLOAD THIS ISSUE
VIEW BACK ISSUES
Dark Reading Daily
-- Published By Dark Reading
Informa Tech Holdings LLC | Registered in the United States
with number 7418737 | 605 Third Ave., 22nd Floor, New York, New York 10158, USA
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.