The change paves the way for enterprises to migrate their Active Directory implementations to the cloud.
Follow Dark Reading:
 November 12, 2022
LATEST SECURITY NEWS & COMMENTARY
Cybersecurity 'Nutrition' Labels Still a Work in Progress
Pretty much every aspect of the effort to create easy-to-understand labels for Internet-of-Things (IoT) products is up in the air, according to participants in the process.
Cyberwar and Cybercrime Go Hand in Hand
The line between criminal and political aims has become blurred, but motivations matter less than the effects of a breach.
Understanding the Rise of Risk-Based Vulnerability Management
Risk-based vulnerability management solutions foster the convergence of risk management and vulnerability management. Andrew Braunberg explains what’s driving the emergence of RBVM.
How US Businesses Suffer From the Lack of Personal Data Privacy Laws
The stalling of federal legislation and the continued expansion of data brokers are fueling a phishing epidemic.
Confidence in Data Recovery Tools Low
IT practitioners are developing ransomware response plans, but many of them are not confident in their data resiliency tools.
Okta Launches New Workforce Identity Cloud
Okta Worforce Identity Cloud has all three identity functions – identity access management, identity governance, and privilege access management – under the hood.
How Does DNS Telemetry Help Detect and Stop Threats?
Administrators and security teams who have lost visibility into their own networks can use DNS telemetry to home in on anomalous traffic.
MORE NEWS / MORE COMMENTARY
HOT TOPICS
The Art of Calculating the Cost of Risk
Insurance and legislation affect how enterprises balance between protecting against breaches and recovering from them.

Human Security Tackles Malvertising With Clean.io Buy
Dark Reading's analysis suggests that Human Security's acquisition of clean.io will significantly expand the company's fraud prevention and anti-malvertising portfolio.

Now That EDR Is Obvious, What Comes Next?
First in our series addressing the top 10 unanswered questions in security: What's going to replace EDR?

MORE
EDITORS' CHOICE
Name That Edge Toon: Talk Turkey
Come up with a clever caption, and our panel of experts will reward the winner with a $25 Amazon gift card.
FROM THE NEWS DESK

Veterans Day Salute: 6 Reasons Why You Want Vets in Your Cyber Platoon
We commend vets in cyber, with this slideshow look at how the training and experience of former military personnel can be a big, differentiating asset in cybersecurity environments.
WEBINARS
  • How to Protect Your Legacy Software Applications

    Agile development and continuous integration/continuous deployment have changed the game for application development practices, leading enterprises to "shift left" and build security into the software development lifecycle to catch any vulnerabilities before applications go into production. But what about ...

  • Cybersecurity: What You Don't Know Can Hurt You

    Do your attackers have a better view of your risks in your environment than you? With the aggressive move to the cloud comes an expanding and complex attack surface that adversaries are waiting to exploit. As a result, organizations are ...

View More Dark Reading Webinars >>
WHITE PAPERS
FEATURED REPORTS
View More Dark Reading Reports >>
PRODUCTS & RELEASES
CURRENT ISSUE
DOWNLOAD THIS ISSUE
VIEW BACK ISSUES
Dark Reading Daily
-- Published By Dark Reading
Informa Tech Holdings LLC | Registered in the United States
with number 7418737 | 605 Third Ave., 22nd Floor, New York, New York 10158, USA
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.