It's getting hard to buy cyber insurance, but not having it is not always an option. Low-coverage plans could bridge the gap.
It's getting hard to buy cyber insurance, but not having it is not always an option. Low-coverage plans could bridge the gap.
Follow Dark Reading:
 March 11, 2023
LATEST SECURITY NEWS & COMMENTARY
'Skinny' Cyber-Insurance Policies Create Compliance Path
It's getting hard to buy cyber insurance, but not having it is not always an option. Low-coverage plans could bridge the gap.
Name That Edge Toon: Domino Effect
Come up with a clever caption, and our panel of experts will reward the winner with a $25 Amazon gift card.
Machine Learning Improves Prediction of Exploited Vulnerabilities
The third iteration of the Exploit Prediction Scoring System (EPSS) performs 82% better than previous versions, giving companies a better tool for evaluating vulnerabilities and prioritizing patching.
Proposed FCC Rule Redefines Data Breaches for Communications Carriers
If the proposed rule is approved, organizations would need to disclose all data breaches, even ones that don't cause any harm, to affected customers.
Tech Giants Go Cloud-Native Shopping
Cisco’s acquisition of cloud-native firewall provider Valtix and HPE’s deal to buy SSE provider Axis Security fill gaps in their existing portfolios.
MORE NEWS / MORE COMMENTARY
HOT TOPICS
Visibility Is as Vital as Zero Trust for Low-Code/No-Code Security
By authenticating and authorizing every application, and by maintaining data lineage for auditing, enterprises can reduce the chances of data exfiltration.

3 Ways Security Teams Can Use IP Data Context
Innocently or not, residential proxy networks can obscure the actual geolocation of an access point. Here's why that's not great and what you can do about it.

Cris Thomas: Space Rogue, From L0pht Hacker to IBM Security Influencer
Security Pro File: The old-school hacker traces a path from young hardware tinkerer to senior cybersecurity executive.

MORE
EDITORS' CHOICE
CISOs Share Their 3 Top Challenges for Cybersecurity Management
The biggest dilemmas in running a modern cybersecurity team are not all about software, said CISOs from HSBC, Citi, and Sepio.
FROM THE NEWS

Legal Industry Faces Double Jeopardy as a Favorite Cybercrime Target
Hackers are increasingly tantalized by the troves of sensitive data held by lightly protected law firms and legal services organizations.
WEBINARS
  • Building Out the Best Response Playbook for Ransomware Attacks

    When ransomware locks up your business's critical data and essential gear, there is no time to panic. The organization needs answers fast: Is the infection going to spread to other endpoints? Will the attackers publicly dump the stolen information? How ...

  • How Firewalls Fit With Modern Enterprise Security

    With all the focus on the newest security technologies, it is easy to forget that the firewall is still an important part of the enterprise security strategy. In this webinar, experts offer a look at some of the most common ...

View More Dark Reading Webinars >>
WHITE PAPERS
FEATURED REPORTS
View More Dark Reading Reports >>
PRODUCTS & RELEASES
CURRENT ISSUE
DOWNLOAD THIS ISSUE
VIEW BACK ISSUES
Dark Reading Daily
-- Published By Dark Reading
Informa Tech Holdings LLC | Registered in the United States
with number 7418737 | 605 Third Ave., 22nd Floor, New York, New York 10158, USA
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.