| LATEST SECURITY FEATURES & COMMENTARY | Europe Sees More Hacktivism, GDPR Echoes, and New Security Laws Ahead for 2024 Political and economic motivations impel nation-state and independent hackers, while the European Union strives to keep its members secure and prepared. AI, Supply Chain Are Fertile Areas for Cybersecurity Investment Cybersecurity continues to be a growing sector, but a lot of investment funding is gravitating toward supply chain security and artificial intelligence (AI) for solving a range of security problems. Cisco Bets Big on Multicloud Security With Isovalent Deal Cisco says Isovalent will help expand the capabilities of Security Cloud, an AI-driven, cloud-delivered integrated security platform. What's the Best Way to Communicate After a Data Breach? So you've had a data breach, and now you need to take the next step. Here's a guide for communicators dealing with security incidents from Ashley Sawatsky of Rootly. How States Help Municipalities Build Their Cyber Defenses State CISOs and cybersecurity task forces are grappling with the best ways to use federal grant money to keep their citizens safe online. GenAI Tools Will Permeate All Areas of the Enterprise Many departments and groups see the benefits of using generative AI tools, which will complicate the security teams' job of protecting the enterprise from data leaks and compliance and privacy violations. MORE FROM THE EDGE / MORE FROM DR TECHNOLOGY | | | PRODUCTS & RELEASES | Palo Alto Networks Closes Talon Cybersecurity Acquisition Survey: 90% of IT Pros Felt Prepared for a Password-Based Cyberattack, Yet More Than Half Fell Victim to One SANS Institute Research Shows What Frameworks, Benchmarks, and Techniques Organizations Use on their Path to Security Maturity Black Hat Europe 2023 Closes on Record-Breaking Event in London MORE PRODUCTS & RELEASES |
| | | | | FEATURED REPORTS | Passwords Are Passe: Next Gen Authentication Addresses Today's Threats How to Use Threat Intelligence to Mitigate Third-Party Risk The report discusses the various steps of a continuous third-party intelligence lifecycle: Data collection, Data classification, Data storage, Data analysis, reporting, dissemination, continuous monitoring, data governance, and choosing the right technology stack. The report also includes information about how attackers ... Concerns Mount Over Ransomware, Zero-Day Bugs, and AI-Enabled Malware | View More Dark Reading Reports >> |
|
|
|
Dark Reading Daily -- Published By Dark Reading Informa Tech Holdings LLC | Registered in the United States with number 7418737 | 605 Third Ave., 22nd Floor, New York, New York 10158, USA
| To opt-out of any future Dark Reading Daily Newsletter emails, please respond here. | Thoughts about this newsletter? Give us feedback. |
Keep This Newsletter Out Of Your SPAM Folder Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list: | If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation. | We take your privacy very seriously. Please review our Privacy Statement. |
|
|