Dark Reading Daily
Follow Dark Reading:
 November 11, 2023
LATEST SECURITY FEATURES & COMMENTARY
When Good Security Awareness Programs Go Wrong
Avoid making these mistakes when crafting a security awareness strategy at your organization.
Name That Edge Toon: Out for the Count
Come up with a clever cybersecurity-related caption, and our panel of experts will reward the winner with a $25 Amazon gift card.
First Wave of Vulnerability-Fixing AIs Available for Developers
GitHub joins a handful of startups and established firms in the market, but all the products are essentially "caveat developer" — let the developer beware.
Securing Remote Workers Through Zero Trust
Dark Reading's special report looks at how enterprises are turning to zero trust to harden the security of their remote workforce. The challenges are steep.
Software Complexity Bedevils Mainframe Security
The high-performance and resilient platforms satisfy critical roles, but software complexity and the graying of the specialist workforce are creating security challenges.
Steps to Follow to Comply With the SEC Cybersecurity Disclosure Rule
Mandiant/Google Cloud's Jill C. Tyson offers up timelines, checklists, and other guidance around enterprisewide readiness to ensure compliance with the new rule.
MORE FROM THE EDGE / MORE FROM DR TECHNOLOGY
HOT TOPICS
ChatGPT: OpenAI Attributes Regular Outages to DDoS Attacks
ChatGPT and the associated APIs have been affected by regular outages, citing DDoS attacks as the reason — the Anonymous Sudan group claimed responsibility.

Worldwide Hacktivists Take Sides Over Gaza, With Little to Show for It
Keyboard warriors are claiming to contribute to the Gaza war with OT attacks. You should be skeptical.

Atlassian Bug Escalated to 10, All Unpatched Instances Vulnerable
Active ransomware attacks against vulnerable Atlassian Confluence Data Center and Servers ratchets up risk to enterprises, now reflected in the bug's revised CVSS score of 10.

MORE
EDITORS' CHOICE
A Ukrainian Company Shares Lessons in Wartime Resilience
The CTO of MacPaw provides a case study in planning for cybersecurity and uptime in the face of armed conflict.
How Do We Truly Make Security 'Everyone's Responsibility'?
When everybody is responsible for a task, sometimes nobody takes ownership. Here are three steps to distribute cybersecurity throughout your organization.
10 Tips for Security Awareness Training That Hits the Target
Try these tricks for devising an education program that gets employees invested — and stays with them after the training is over.
WEBINARS
  • SecOps & DevSecOps in the Cloud

    Security teams today face the dual challenge of securing cloud-native applications as well as their software development processes that increasingly operate in the cloud. At the same time, attacks are rising against misconfigured cloud instances as well as a new ...

  • Hacking Your Digital Identity: How Cybercriminals Can and Will Get Around Your Authentication Methods

    Inadequate authentication measures leave your digital identity vulnerable to cybercriminals. Tools like multi-factor authentication, biometrics, passwords, PINs, and tokens are all more vulnerable to attacks and social engineering than you realize. And one wrong move leaves you and your organization ...

View More Dark Reading Webinars >>
WHITE PAPERS
FEATURED REPORTS
  • What Ransomware Groups Look for in Enterprise Victims

    Ransomware attackers cast a wide net -- they just care about causing damage, making money, and gaining new victims. That means no organization is automatically immune to attack just because of its size or industry. Organizations need to take steps ...

  • How to Use Threat Intelligence to Mitigate Third-Party Risk

    The report discusses the various steps of a continuous third-party intelligence lifecycle: Data collection, Data classification, Data storage, Data analysis, reporting, dissemination, continuous monitoring, data governance, and choosing the right technology stack. The report also includes information about how attackers ...

  • Securing the Remote Worker: How to Mitigate Off-Site Cyberattacks

    The most profound change to enterprise security with the rise of remote work is the way endpoint security has moved from last line of defense to being on the frontline. The user's endpoint is the first device attackers encounter, making ...

View More Dark Reading Reports >>
PRODUCTS & RELEASES
CURRENT ISSUE
DOWNLOAD THIS ISSUE
VIEW BACK ISSUES
Dark Reading Daily
-- Published By Dark Reading
Informa Tech Holdings LLC | Registered in the United States
with number 7418737 | 605 Third Ave., 22nd Floor, New York, New York 10158, USA
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.