Researchers find current data protections strategies are failing to get the job done, and IT leaders are concerned, while a lack of qualified IT security talent hampers cyber-defense initiatives.
Follow Dark Reading:
 November 18, 2022
LATEST SECURITY NEWS & COMMENTARY
Zero-Trust Initiatives Stall, as Cyberattack Costs Rocket to $1M per Incident
Researchers find current data protections strategies are failing to get the job done, and IT leaders are concerned, while a lack of qualified IT security talent hampers cyber-defense initiatives.
Instagram Impersonators Target Thousands, Slipping by Microsoft's Cybersecurity
The socially engineered campaign used a legitimate domain to send phishing emails to large swaths of university targets.
Spacecraft Vulnerable to Failure, Thanks to Aerospace Networking Bug
A single device with malicious code can foil a networking protocol used by spacecraft, aircraft, and industrial control systems, resulting in unpredictable operations and possible failures.
Iranian APT Actors Breach US Government Network
CISA says Federal Civilian Executive Branch systems were compromised through a Log4Shell vulnerability in an unpatched VMware Horizon server.
TMI Tech: How to Stop Vulnerable Software from 'Oversharing'
Stop chatty apps from oversharing and eliminate a hacker backdoor — train developers on "security first" while subjecting APIs to least-privilege zero-trust policies.
MORE NEWS / MORE COMMENTARY
HOT TOPICS
Thousands of Amazon RDS Snapshots Are Leaking Corporate PII
A service that allows organizations to back up data in the cloud can accidentally leak sensitive data to the public Internet, paving the way for abuse by threat actors.

MORE
EDITORS' CHOICE
MITRE Engenuity Launches Evaluations for Security Service Providers
The results are labor-intensive to parse, so knowing how to interpret them is key, security experts say.
LATEST THE EDGE

Analysts Welcome NSA's Advice for Developers to Adopt Memory-Safe Languages
Languages such as C and C++ rely too heavily on the programmer not making simple memory-related security errors.
LATEST DR TECHNOLOGY

Cybersecurity 'Nutrition' Labels Still a Work in Progress
Pretty much every aspect of the effort to create easy-to-understand labels for Internet of Things (IoT) products is up in the air, according to participants in the process.
WEBINARS
  • How to Protect Your Legacy Software Applications

    Agile development and continuous integration/continuous deployment have changed the game for application development practices, leading enterprises to "shift left" and build security into the software development lifecycle to catch any vulnerabilities before applications go into production. But what about ...

  • Developing and Testing an Effective Breach Response Plan

    When cyber attackers hit your network and your databases have been breached, do you know what you have to do and who to call? What do you tell your customers, employees, and other stakeholders, and when do you tell them? ...

View More Dark Reading Webinars >>
WHITE PAPERS
FEATURED REPORTS
View More Dark Reading Reports >>
PRODUCTS & RELEASES
CURRENT ISSUE
DOWNLOAD THIS ISSUE
VIEW BACK ISSUES
Dark Reading Daily
-- Published By Dark Reading
Informa Tech Holdings LLC | Registered in the United States
with number 7418737 | 605 Third Ave., 22nd Floor, New York, New York 10158, USA
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.