CISOs currently hold all of the responsibility to stop cyberattacks yet have none of the authority to fund the technological defenses that regulations require.
Follow Dark Reading:
 March 23, 2024
LATEST SECURITY FEATURES & COMMENTARY
New Regulations Make D&O Insurance a Must for CISOs
CISOs currently hold all of the responsibility to stop cyberattacks yet have none of the authority to fund the technological defenses that regulations require.
Using East-West Network Visibility to Detect Threats in Later Stages of MITRE ATT&CK
Ensuring that traffic visibility covers both client-server and server-server communications helps NetOps teams analyze and spot potential threats early on, avoiding catastrophic effects.
How Can We Reduce Threats From the Initial Access Brokers Market?
The ready-made access IABs offer has become an integral part of the ransomware ecosystem. Here's how to stop them before they can profit from your assets.
Strata Identity Releases New Authentication Recipes
The Microsoft Identity Cookbook is a collection of orchestration recipes to help organizations adopt cloud-based identity providers.
Detecting Cloud Threats With CloudGrappler
The open source tool from Permiso can help security teams identify threat actors lurking within their AWS and Azure environments.
MORE FROM THE EDGE / MORE FROM DR TECHNOLOGY
HOT TOPICS
Why AI Obituary Scams Are a Cyber-Risk for Businesses
Scammers now use AI to instantly whip up SEO-friendly bereavement scams, and it's never been easier to swindle mourners or use them to get to their employers.

Federal Warning Highlights Cyber Vulnerability of US Water Systems
The White House urged operators of water and wastewater systems to review and beef up their security controls against attacks by Iran- and China-based groups.

NIST's Vuln Database Downshifts, Prompting Questions About Its Future
NVD may be in peril, and while alternatives exist, enterprise security managers will need to plan accordingly to stay on top of new threats.

MORE
PRODUCTS & RELEASES
EDITORS' CHOICE
Don't Answer the Phone: Inside a Real-Life Vishing Attack
Successful attackers focus on the psychological manipulation of human emotions, which is why anyone, even a tech-savvy person, can become a victim.
10 Tips for Better Security Data Management
CISOs must build out a security data management and security data architecture to get the most out of their security data for the least amount of investment.
Google's Post-Quantum Upgrade Doesn't Mean We're All Protected Yet
Just because Google has put in the work to quantum-proof Chrome doesn't mean post-quantum security is all set.
WEBINARS
WHITE PAPERS
FEATURED REPORTS
View More Dark Reading Reports >>
Dark Reading Daily
-- Published By Dark Reading
Informa Tech Holdings LLC | Registered in the United States
with number 7418737 | 605 Third Ave., 22nd Floor, New York, New York 10158, USA
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.