Security stands on the shoulders of giants. We take a moment to remember their contributions toward keeping people, data, and systems safe.
Follow Dark Reading:
 January 07, 2023
LATEST SECURITY NEWS & COMMENTARY
In Memoriam: Remembering Those Who Passed
Security stands on the shoulders of giants. We take a moment to remember their contributions toward keeping people, data, and systems safe.
Name That Edge Toon: The Upside Down
Come up with a clever caption, and our panel of experts will reward the winner with a $25 Amazon gift card.
API Security Is the New Black
API security is so hot right now.
How Confidential Computing Can Change Cybersecurity
Encrypting data while in use, not just in transit and at rest, closes one more avenue of cyberattack.
Threat Actors Evade Detection Through Geofencing & Fingerprinting
Security teams may be missing targeted attacks and advanced exploits if attackers are using evasive techniques to avoid detection. Defenders need to up their game.
What Are Some Ways to Make APIs More Secure?
Developers should go beyond the basics to make it harder to exploit the API.
3 Industries, 3 Security Programs
Security leaders from a media corporation, a commercial real estate company, and an automotive technology company share how they address cyber-risk.
2023 Will See Renewed Focus on Quantum Computing
Adopting post-quantum cryptography has been discussed for years; now it's time for organizations to get to work.
Healthcare Providers and Hospitals Under Ransomware's Siege
According to the FBI and Internet Crime Complaint Center, 25% of ransomware complaints involve healthcare providers.
Effective and Efficient Automation for Security Teams
Even very short tasks may be worth automating if you do them frequently. Here's how to decide what to tackle first.
When CISOs Are Ready to Hunt
This is what happens when a CISO gets tired of reacting to attacks and goes on the offensive.
How to Get the Most Out of UEBA
Security teams are considering how to get the most out of user entity behavior analytics by taking advantage of its strengths and augmenting its limitations.

MORE NEWS / MORE COMMENTARY
HOT TOPICS
Extracting Encrypted Credentials From Common Tools
Attackers are harvesting credentials from compromised systems. Here's how some commonly used tools can enable this.

Adobe, Apple, Cisco, Microsoft Flaws Make Up Half of KEV Catalog
CISA's Known Exploited Vulnerabilities Catalog has become a valuable repository of vulnerabilities to be patched. A pair of reports analyze the vulnerabilities under attack to understand the kind of threats organizations should be prioritizing.

Understanding the 3 Classes of Kubernetes Risk
The first step toward securing Kubernetes environments is understanding the risks they pose and identifying the ways in which those risks can be mitigated.

MORE
EDITORS' CHOICE
Why Attackers Target GitHub, and How You Can Secure It
The unfettered collaboration of the GitHub model creates a security headache. Follow these seven principles to help relieve the pain.
FROM THE NEWS DESK

PurpleUrchin Gang Embraces DevOps In Massive Cloud Malware Campaign
The Automated Libra group is deploying all components of its campaign in an automated manner via containers, stealing free trial resources for cryptomining, but the threat could get larger.
FROM OMDIA

ChatGPT Artificial Intelligence: An Upcoming Cybersecurity Threat?
The role of artificial intelligence in cybersecurity is growing. A new AI model highlights the opportunities and challenges.
WEBINARS
View More Dark Reading Webinars >>
WHITE PAPERS
FEATURED REPORTS
View More Dark Reading Reports >>
PRODUCTS & RELEASES
CURRENT ISSUE
DOWNLOAD THIS ISSUE
VIEW BACK ISSUES
Dark Reading Daily
-- Published By Dark Reading
Informa Tech Holdings LLC | Registered in the United States
with number 7418737 | 605 Third Ave., 22nd Floor, New York, New York 10158, USA
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.