Inconsistencies and lack of information in cybersecurity disclosures highlight the need for organizations to establish a robust materiality assessment framework.
Follow Dark Reading:
 August 17, 2024
LATEST SECURITY FEATURES & COMMENTARY
How Can Organizations Navigate SEC's Cyber Materiality Disclosures?
Inconsistencies and lack of information in cybersecurity disclosures highlight the need for organizations to establish a robust materiality assessment framework.
DARPA Announces AI Cyber Challenge Finalists
Teams designed AI systems to secure open source infrastructure software to be used in industries like financial services, utilities, and healthcare. Each finalist was awarded a $2 million prize.
CrowdStrike Tries to Patch Things Up With Cybersecurity Industry
CrowdStrike's president and CEO were both at Black Hat and DEF CON to face direct questions from customers and cybersecurity professionals.
White House Pledges $10 Million for Open Source Initiative
The Open-Source Software Prevalence Initiative, announced at DEF CON, will examine how open source software is used in critical infrastructure.
NIST Releases 3 Post-Quantum Standards, Urges Orgs to Start PQC Journey
Security experts welcome the long-anticipated publication of the first post-quantum cryptographic standards as a significant milestone.
Monitoring Changes in KEV List Can Guide Security Teams
The number of additions to the Known Exploited Vulnerabilities catalog is growing quickly, but even silent changes to already-documented flaws can help security teams prioritize.
It's Time to Promote Security Talent From Within
While there are smart people and good leaders in other fields, we need to cultivate and grow leaders from the existing cybersecurity workforce, too.
Healthcare Providers Must Plan for Ransomware Attacks on Third-Party Suppliers
The American Hospital Association and Health-ISAC issued a joint threat bulletin warning healthcare IT providers that their ransomware plans need to consider third-party risk.
MORE FROM THE EDGE / MORE FROM DR TECHNOLOGY
HOT TOPICS
Are 2024 US Political Campaigns Prepared for the Coming Cyber Threats?
When it comes to this year's candidates and political campaigns fending off major cyberattacks, a lot has changed since the 2016 election cycle.

Ransomware Group Behind Major Indonesian Attack Wears Many Masks
Brain Cipher made a loud entry to the ransomware scene, but it doesn't seem to be quite as sophisticated as its accomplishment would suggest.

SolarWinds: Critical RCE Bug Requires Urgent Patch
The vulnerability was given a high-severity CVSS score, indicating that customers should act swiftly to mitigate the flaw.

MORE
PRODUCTS & RELEASES
EDITORS' CHOICE
Memory Safety Is Key to Preventing Hardware Hacks
Spectre and Meltdown exposed just how easy a target computer memory was for attackers. Several efforts are underway to protect memory.
Name That Edge Toon: Pointing Fingers
Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card.
Knostic Wins 2024 Black Hat Startup Spotlight Competition
During a "Shark Tank"-like final, each startup's representative spent five minutes detailing their company and product, with an additional five minutes to take questions from eight judges from Omdia, investment firms, and top companies in cyber.
Beyond the Hype: Unveiling the Realities of WormGPT in Cybersecurity
Though WormGPT tools may not be a major problem now, organizations can't let their guard down.
WEBINARS
WHITE PAPERS
FEATURED REPORTS
View More Dark Reading Reports >>
Dark Reading Daily
-- Published By Dark Reading
Informa Tech Holdings LLC | Registered in the United States
with number 7418737 | 605 Third Ave., 22nd Floor, New York, New York 10158, USA
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.