Part 2 in our series addressing the top 10 unanswered questions in security: How will TPGRM evolve?
Follow Dark Reading:
 November 19, 2022
LATEST SECURITY NEWS & COMMENTARY
Where Can Third-Party Governance and Risk Management Take Us?
Part 2 in our series addressing the top 10 unanswered questions in security: How will TPGRM evolve?
Modern CISO: More Than a Security Officer
YL Ventures CISO-in-residence Frank Kim weighs in on the top security concerns facing CISOs in a Dark Reading interview.
Analysts Welcome NSA's Advice for Developers to Adopt Memory-Safe Languages
Languages such as C and C++ rely too heavily on the programmer not making simple memory-related security errors.
Amid Legal Fallout, Cyber Insurers Redefine State-Sponsored Attacks as Act of War
As carriers rewrite their act-of-war exclusions following the NotPetya settlement between Mondelez and Zurich, organizations should read their cyber insurance policies carefully to see what is still covered.
Swimlane Introduces Low-Code, Automation Approach to OT Security
Automating security for OT infrastructure can help organizations combat a rising volume of cyber threats in an era when security professionals are in short supply.
Are We Ready for AI-Generated Code?
Autocompleted code is convenient and quick, but it may expose your organization to security and compliance risks.
How APIs and Applications Can Live Happily Ever After
Solutions that allow businesses to reduce complexity, develop and deploy applications and APIs, and protect those applications and APIs are no fairy tale.
MORE NEWS / MORE COMMENTARY
HOT TOPICS
Cybersecurity 'Nutrition' Labels Still a Work in Progress
Pretty much every aspect of the effort to create easy-to-understand labels for Internet of Things (IoT) products is up in the air, according to participants in the process.

Confidence in Data Recovery Tools Low
IT practitioners are developing ransomware response plans, but many of them are not confident in their data resiliency tools.

Why Cybersecurity Should Highlight Veteran-Hiring Programs
Military veterans tend to have the kind of skills that would make them effective cybersecurity professionals, but making the transition is not that easy.

MORE
EDITORS' CHOICE
Cyberwar and Cybercrime Go Hand in Hand
The line between criminal and political aims has become blurred, but motivations matter less than the effects of a breach.
Name That Edge Toon: Talk Turkey
Come up with a clever caption, and our panel of experts will reward the winner with a $25 Amazon gift card.
FROM THE NEWS DESK

Secure Offboarding in the Spotlight as Tech Layoffs Mount
A secure-by-design culture is needed to develop a comprehensive offboarding and identity management strategy that limits potential for broader compromise in case of unauthorized access.
WEBINARS
  • Security Considerations for Working with Cloud Services Providers

    With so many workloads in the could these days, enterprises are working with one or more of the major cloud services providers. How you can be ensured that these providers are handling data securely? What is the plan if there ...

  • Cybersecurity: What You Don't Know Can Hurt You

    Do your attackers have a better view of your risks in your environment than you? With the aggressive move to the cloud comes an expanding and complex attack surface that adversaries are waiting to exploit. As a result, organizations are ...

View More Dark Reading Webinars >>
WHITE PAPERS
FEATURED REPORTS
View More Dark Reading Reports >>
PRODUCTS & RELEASES
CURRENT ISSUE
DOWNLOAD THIS ISSUE
VIEW BACK ISSUES
Dark Reading Daily
-- Published By Dark Reading
Informa Tech Holdings LLC | Registered in the United States
with number 7418737 | 605 Third Ave., 22nd Floor, New York, New York 10158, USA
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.