A new study shows that organizations continued to take an inordinately long time to fix vulnerabilities and fixed fewer known issues in their environments last year than in 2020.
Follow Dark Reading:
 February 22, 2022
LATEST SECURITY NEWS & COMMENTARY
Key Application Security Metrics Show Few Signs of Improvement
A new study shows that organizations continued to take an inordinately long time to fix vulnerabilities and fixed fewer known issues in their environments last year than in 2020.
Ukraine DDoS: 'Cyberattack' or Not?
The country was hit by a distributed denial-of-service attack on Feb. 15, but some say that doesn't rise to the level of "cyberattack." Here's why they're wrong.
If the Cloud Is More Secure, Then Why Is Everything Still Broken?
The sooner we discover sources of risk, the better equipped we will be to create effective mitigations for them.
(Sponsored Article) The Unsettling Reason Why Your Help Desk May Be Your Greatest Security Vulnerability
A rogue help-desk employee could gain access to user accounts through unauthorized password resets. It's time to bring zero trust to the help desk.

Free Cybersecurity Tools and Services List Published by CISA
The Cybersecurity & Infrastructure Security Agency (CISA) says this "living repository" is a mix of popular open source and free tools and services from both the private and public sectors.
MORE NEWS / MORE COMMENTARY
HOT TOPICS
Russian Actors Targeting US Defense Contractors in Cyber Espionage Campaign, CISA Warns
Sensitive data stolen on US weapons development and deployment, product development, foreign partnerships, contracts, and more.

8 of the Biggest Cybersecurity M&As & Investment Deals in 2021
There were more financial deals in cybersecurity last year than in any previous year.

Hybrid Work Accelerated Fraud; Now, CSOs Are Taking a Seat at the Executive Table
The days of security as a second-class citizen are over.

MORE
EDITORS' CHOICE

NSA Issues Guidance for Selecting Strong Cisco Password Types
Poorly protected passwords in device configuration files present a risk of compromise, agency says.
LATEST FROM THE EDGE

Ransomware Adds New Wrinkle in Russian Cybercrime Market
Government crackdowns may destabilize Russian crime rings and strengthen their ties to Chinese allies.
LATEST FROM DR TECHNOLOGY

Enterprises Look Beyond Antivirus Software for Remote Workers
Priorities are shifting, with growing emphasis on endpoint detection and response (EDR) software and multifactor authentication (MFA), a recent survey of IT professionals shows.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Streamlining Your Patch Management Processes

    Patch management is a core element of any security strategy. But patch management is only as effective as the bugs it can identify. Undiscovered vulnerabilities are a massive risk to an organization as bad actors find their way into organizations ...

  • Strategies For Securing Your Supply Chain

    Recent attacks like the zero-day Log4j vulnerability have brought new scrutiny to cyber threats from suppliers and enterprise trading partners. But what does an effective supply-chain security strategy look like? How can you ensure that customers, suppliers, contractors, and ...

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By Dark Reading
Informa Tech Holdings LLC | Registered in the United States
with number 7418737 | 605 Third Ave., 22nd Floor, New York, New York 10158, USA
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.