A new study coincides with OMB’s finalization of its zero-trust strategy through 2024
Follow Dark Reading:
 February 01, 2022
LATEST SECURITY NEWS & COMMENTARY
The Zero-Trust Timer Is on for Federal Agencies — How Ready Are They?
A new study coincides with OMB’s finalization of its zero-trust strategy through 2024.
7 Privacy Tips for Security Pros
How best to integrate privacy into your organization's security program.
Aggressive BlackCat Ransomware on the Rise
The cybercriminals behind the malware claim to have compromised more than a dozen companies; they have aggressively outed victims and purportedly paid a significant share of ransoms back to affiliates.
Crypto Agility: Solving for the Inevitable
The advent of viable quantum computers will threaten today’s encryption standards, which are the basis of Internet security. Cryptographic agility is the key to post-quantum computing security, although implementing it will be a formidable challenge.

(Sponsored Article) 4 Steps Toward Knowing Your Exploitable Attack Surface

Actionable steps you can take today to identify the true risk your organization faces — learn how to separate the exploitable vulnerabilities from the rest.


Mandiant: 1 in 7 Ransomware Extortion Attacks Exposes OT Data
Analysis of "shaming site" data dumps found sensitive documentation from OT organizations, including oil and gas.
MORE NEWS / MORE COMMENTARY
HOT TOPICS
Phishing Simulation Study Shows Why These Attacks Remain Pervasive
Email purportedly from human resources convinced more than one-fifth of recipients to click, the majority of whom did so within an hour of receiving the fraudulent message.

Cybersecurity Is Broken: How We Got Here & How to Start Fixing It
It's not just your imagination — malicious threats have exponentially increased organizational risk.

Experts Urge Firms to Patch Trivial-to-Exploit Flaw in Linux PolicyKit
The memory corruption vulnerability in a policy component installed by default on most Linux distributions allows any user to become root. Researchers have already reproduced the exploit.

MORE
EDITORS' CHOICE

More Security Flaws Found in Apple's OS Technologies
Apple's updates this week included fixes for two zero-day flaws, several code execution bugs, and vulnerabilities that allowed attackers to bypass its core security protections.
LATEST FROM THE EDGE

The Looming CISO Mental Health Crisis — and What to Do About It, Part 2
Letting mental health issues fester may result in burnout and attrition, which affect both the company and the humans it employs.
LATEST FROM DR TECHNOLOGY

Security Service Edge Boosters Form New Forum to Encourage Adoption
IT leaders who formed the SSE Forum say the technology offers cloud-forward security for modern workplaces.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Best Practices for Extending Identity & Access Management to the Cloud

    Managing and securing user credentials was never easy, and now that they are scattered across cloud platforms, software-as-a-service tools, mobile devices, and on-premises systems, the task has become even more complex. With adversaries increasingly targeting their attention to credential theft, ...

  • 2021 DDoS Attack Trends: Year in Review

    2021 was an exceptionally busy year for attackers. From some of the largest volumetric DDoS attacks launched by historically large swarms of botnets, to massive ransomware and ransom DDoS attack campaigns that interrupted aspects of critical infrastructure around the world, DDoS ...

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By Dark Reading
Informa Tech
303 Second St., Suite 900 South Tower, San Francisco, CA 94107
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.