Dark Reading Daily
Follow Dark Reading:
 September 14, 2024
LATEST SECURITY FEATURES & COMMENTARY
UnDisruptable27 Project Wants to Shore Up Critical Infrastructure Security
The Institute for Security and Technology's UnDisruptable27 project connects technology firms with the public sector to strengthen US cyber defenses in case of attacks on critical infrastructure.
SOAR Is Dead, Long Live SOAR
Business intelligence firm Gartner labels security orchestration, automation, and response as "obsolete," but the fight to automate and simplify security operations is here to stay.
When Startup Founders Should Start Thinking About Cybersecurity
Most investors aren't demanding cybersecurity preparedness from startups, but founders should still be worried about the risks.
How a Centuries-Old Company Reached Security Maturity
In this case study, a 180-year-old life and pension insurer brought its security infrastructure into the modern age.
Compliance Automation Pays Off for a Growing Company
In this case study, a CISO helps a B2B marketing automation company straighten out its manual compliance process by automating it.
10 Writing Tips for Cybersecurity Professionals
It takes more than technical knowledge to write about cybersecurity in a way people want to read. It takes creativity, discipline, and other key skills.
Google Updates Cloud Backup, Disaster Recovery Service
The combination of immutability, indelibility, centralized governance, and user empowerment provides a comprehensive backup strategy, Google said.
Wiz Launches Wiz Code Application Security Tool
Wiz Code identifies and flags cloud risks in code to help improve collaboration between security and development teams.
MORE FROM THE EDGE / MORE FROM DR TECHNOLOGY
HOT TOPICS
Socially Savvy Scattered Spider Traps Cloud Admins in Web
The dangerous ransomware group is targeting financial and insurance sectors using smishing and vishing against IT service desk administrators, cybersecurity teams, and other employees with top-level privileges.

Cyber Staffing Shortages Remain CISOs' Biggest Challenge
Besides operational issues connected to a talent shortage, the cost of running security platforms — and their training costs — also keeps CISOs up at night.

Microsoft VS Code Undermined in Asian Spy Attack
A technique to abuse Microsoft's built-in source code editor has finally made it into the wild, thanks to China's Mustang Panda APT.

MORE
PRODUCTS & RELEASES
EDITORS' CHOICE
Name That Edge Toon: Bug Off
Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card.
Open Source Tool Allows Voters to Verify Election Results
The ElectionGuard project allows anyone — voters, campaign staffers, and election officials — to cryptographically verify ballots, a promise that may bolster faith in election integrity.
Hardware Supply Chain Threats Can Undermine Endpoint Infrastructure
To prevent this, organizations should focus on developing secure hardware and firmware foundations, enabling them to manage, monitor, and remediate hardware and firmware security.
Dark Reading Expands Its Coverage to the Asia-Pacific Region
The latest step in a journey to serve cybersecurity professionals in other regions of the world.
WEBINARS
WHITE PAPERS
FEATURED REPORTS
View More Dark Reading Reports >>
Dark Reading Daily
-- Published By Dark Reading
Informa Tech Holdings LLC | Registered in the United States
with number 7418737 | 605 Third Ave., 22nd Floor, New York, New York 10158, USA
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.