SANS Institute experts weigh in on the top threat vectors faced by enterprises and the public at large.
Follow Dark Reading:
 May 18, 2024
LATEST SECURITY FEATURES & COMMENTARY
Top 5 Most Dangerous Cyber Threats in 2024
SANS Institute experts weigh in on the top threat vectors faced by enterprises and the public at large.
Heartbleed: When Is It Good to Name a Vulnerability?
Ten years have passed since Heartbleed was first identified, but the security industry is still grappling with the question of branded vulnerabilities and naming vulnerabilities appropriately.
A Cost-Effective Encryption Strategy Starts With Key Management
Key management is more complex than ever. Your choices are to rely on your cloud provider or manage keys locally, encrypt only the most critical data, or encrypt everything.
10 Ways a Digital Shield Protects Apps and APIs
Layers of protection can bring defense-in-depth practices to distributed clouds and other modern network architectures.
Addressing the Cybersecurity Vendor Ecosystem Disconnect
How security teams can bridge the gap between short-term profits and long-term business needs.
Google's AI Watermarks Will Identify Deepfakes
The SynthID line of watermarking techniques can be used to identify images, video, and text generated by artificial intelligence.

MORE FROM THE EDGE / MORE FROM DR TECHNOLOGY
HOT TOPICS
Microsoft Has Yet to Patch 7 Pwn2Own Zero-Days
A number of serious Windows bugs still haven't made their way into criminal circles, but that won't remain the case forever — and time is running short before ZDI releases exploit details.

CISOs and Their Companies Struggle to Comply With SEC Disclosure Rules
Most companies still can't determine whether a breach is material within the four days mandated by the SEC, skewing incident response.

Scammers Fake Docusign Templates to Blackmail & Steal From Companies
Cybercriminals are trafficking Docusign assets that allow for easy extortion and business email compromise.
MORE
PRODUCTS & RELEASES
EDITORS' CHOICE
CISO as a CTO: When and Why It Makes Sense
Enterprises are increasingly recognizing that a CISO's skills and experience building risk-based cyber programs translate well to other C-suite positions.
Reality Defender Wins RSAC Innovation Sandbox Competition
In a field thick with cybersecurity startups showing off how they use AI and LLMs, Reality Defender stood out for its tool for detecting and labeling deepfakes and other artificial content.
There Is No Cyber Labor Shortage
There are plenty of valuable candidates on the market. Hiring managers are simply looking in the wrong places.
WEBINARS
WHITE PAPERS
FEATURED REPORTS
View More Dark Reading Reports >>
Dark Reading Daily
-- Published By Dark Reading
Informa Tech Holdings LLC | Registered in the United States
with number 7418737 | 605 Third Ave., 22nd Floor, New York, New York 10158, USA
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.