Now That EDR Is Obvious, What Comes Next?
Follow Dark Reading:
 November 05, 2022
LATEST SECURITY NEWS & COMMENTARY
Now That EDR Is Obvious, What Comes Next?
First in our series addressing the top 10 unanswered questions in security: What's going to replace EDR?
Name That Edge Toon: Talk Turkey
Come up with a clever caption, and our panel of experts will reward the winner with a $25 Amazon gift card.
The Art of Calculating the Cost of Risk
Insurance and legislation affect how enterprises balance between protecting against breaches and recovering from them.
How Chipmakers Are Implementing Confidential Computing
On-chip solutions aim to prevent breaches by separating the computing element and keeping data in the secure vault at all times.
Why Are Zombie APIs and Shadow APIs So Scary?
A lax API governance strategy can lead to abandoned or overlooked APIs that open up organizations to security threats.
Detecting Malicious User Behavior Within and Across Applications
The solution lies in analyzing sequences of activities as user journeys, instead of analyzing each activity on its own.
MORE NEWS / MORE COMMENTARY
HOT TOPICS
Wanted: Cybersecurity Training That Breaks Down Silos
The next generation of cybersecurity pros will need to participate frequently in relevant training to expand their skills and stay engaged.

Cloud Providers Throw Their Weight Behind Confidential Computing
New technologies designed into processors allow enterprises to leverage cloud advantages while meeting privacy regulations.

Credential Harvesting Is Retail Industry's Top Threat
Why bother with new tactics and exploits when the old tricks are still effective?

MORE
EDITORS' CHOICE
Equifax's Lessons Are Still Relevant, 5 Years Later
Cybersecurity pros discuss a trio of lessons from the Equifax hack and how to prevent similar attacks in the enterprise.
FROM THE NEWS DESK

Supply Chain Attack Pushes Out Malware to More than 250 Media Websites
TA569 has modified the JavaScript of a legitimate content and advertising engine used by news affiliates, in order to spread the FakeUpdates initial access framework.
WEBINARS
  • Analyzing and Correlating Security Operations Data

    Most security operations centers aren't failing because they don't have enough data - they are failing because they have too much data. In this webinar, experts recommend tools and best practices for correlating information from multiple security systems so that ...

  • State of Bot Attacks: What to Expect in 2023

    Malicious bots have moved past distributed denial-of-service and credential-stuffing attacks and are now capable of launching sophisticated attacks such as performing reconnaissance for future attacks, committing shopping cart and ticketing fraud, and engaging in clickjacking. Bot attacks are highly profitable ...

View More Dark Reading Webinars >>
WHITE PAPERS
FEATURED REPORTS
View More Dark Reading Reports >>
PRODUCTS & RELEASES
CURRENT ISSUE
DOWNLOAD THIS ISSUE
VIEW BACK ISSUES
Dark Reading Daily
-- Published By Dark Reading
Informa Tech Holdings LLC | Registered in the United States
with number 7418737 | 605 Third Ave., 22nd Floor, New York, New York 10158, USA
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.