Recognizing the need to address potential risks and ethical concerns, the draft AI Act represents a significant step in regulating AI technologies.
Follow Dark Reading:
 July 15, 2023
LATEST SECURITY FEATURES & COMMENTARY
How the EU AI Act Will Affect Businesses, Cybersecurity
The draft AI Act represents a significant step in regulating AI technologies, recognizing the need to address the potential risks and ethical concerns.
Microsoft Expands Entra Into Secure Service Edge
Among a handful of product announcements are two new offerings — Entra Internet Access and Entra Private Access — plus Azure AD has been renamed.
10 Features an API Security Service Needs to Offer
Securing APIs is specialized work. Here's what organizations should look for when selecting an outside partner.
SBOMs Still More Mandate Than Security
A software bills of materials standard gets an update, but the driver is compliance rather than security.
Startup Spotlight: Mobb Aims to Be the Fixer
The company, one of four finalists in this year's Black Hat USA Startup Spotlight competition, automates vulnerability remediation using AI.
NIST Launches Generative AI Working Group
The public working group will develop guidance around the special risks of AI technologies that generate content.
MORE FROM THE EDGE / MORE FROM DR TECHNOLOGY
HOT TOPICS
WormGPT Cybercrime Tool Heralds an Era of AI Malware vs. AI Defenses
A black-hat alternative to GPT models specifically designed for malicious activities like BEC, malware, and phishing attacks is here, and will push organizations to level up with generative AI themselves.

Chinese APT Cracks Microsoft Outlook Emails at 25 Government Agencies
Foreign state-sponsored actors likely had access to privileged state emails for weeks, thanks to a token validation vulnerability.

Meta's Rush to Topple Twitter Sets Up Looming Privacy Debate
GDPR is halting Meta's new Threads app from entering EU markets, portending a broader struggle over the right ways to collect user data on social apps.

MORE
EDITORS' CHOICE
Exposure Management Looks to Attack Paths, Identity to Better Measure Risk
Security firms analyze attack paths and seek out weak identities to find compromise vectors and critical assets that need better controls.
Mitigating Risk With Threat Intelligence
Dark Reading's latest special report looks at a missing, but necessary, ingredient to effective third-party risk management.
Name That Edge Toon: Three-Ring Circus
Come up with a clever caption, and our panel of experts will reward the winner with a $25 Amazon gift card.
WEBINARS
  • State of DDoS: Mid-Year Threat Report

    Killnet, REvil and Anonymous Sudan - it's been a busy quarter in the DDoS realm. Threat actor groups have been targeting Western organizations in an attempt to disrupt our way of life. If you're finding it hard to keep track ...

  • Why Threat Intelligence Makes Sense for Your Enterprise Security Strategy

    Threat intelligence -- collecting data about broad trends in online attacks -- helps security teams improve their defenses by identifying online exploits that have the potential to hit their organizations and to prioritize their security resources accordingly. But how should ...

View More Dark Reading Webinars >>
WHITE PAPERS
FEATURED REPORTS
View More Dark Reading Reports >>
PRODUCTS & RELEASES
CURRENT ISSUE
DOWNLOAD THIS ISSUE
VIEW BACK ISSUES
Dark Reading Daily
-- Published By Dark Reading
Informa Tech Holdings LLC | Registered in the United States
with number 7418737 | 605 Third Ave., 22nd Floor, New York, New York 10158, USA
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.