From shadow data to misconfigurations, and overpermissioning to multicloud sprawl, Dark Reading's cloud security slideshow helps security pros understand the threat horizon.
| LATEST SECURITY NEWS & COMMENTARY | 7 Critical Cloud Threats Facing the Enterprise in 2023 From shadow data to misconfigurations, and overpermissioning to multicloud sprawl, Dark Reading's cloud security slideshow helps security pros understand the threat horizon. Phishing Surges Ahead, as ChatGPT & AI Loom AI and phishing-as-a-service (PaaS) kits are making it easier for threat actors to create malicious email campaigns, which continue to target high-volume applications using popular brand names. Twitter Implements API Paywall, but Will That Solve Its Enormous Bot Crisis? Restricting the Twitter API will have implications across Twitter, the broader Internet, and society, experts say. Is there a cybersecurity silver lining, or will threat actors pay to play? Reddit Breached With Stolen Employee Credentials Reddit code, internal documents, dashboards, and business systems were compromised in the cyberattack. NIST Picks IoT Standard for Small Electronics Cybersecurity NIST announces that it will use Ascon as a cryptography standard for lightweight IoT device protection. Lessons From the Cold War: How Quality Trumps Quantity in Cybersecurity High-quality tools and standards remain critical components in cybersecurity efforts even as budgets decline. It's important that staff knows response procedures and their roles, and also communicates well. In Perfect Harmony: Cybersecurity Regulation Harmonization By simplifying compliance management, security and risk teams can focus on managing operational risk, not compliance risk — and better counter threats. Cryptographers Decode Secret Letters of Mary, Queen of Scots Nearly a half-millennium after her execution, encrypted letters from the imprisoned royal offer a fascinating look into early cryptography. MORE NEWS / MORE COMMENTARY | |
| | WEBINARS | Ten Emerging Vulnerabilities Every Enterprise Should Know Every day, black hat attackers and white hat researchers are discovering new security vulnerabilities in widely-used systems and applications that might be exploited to compromise your data. Are you aware of the newest - and potentially most impactful - vulnerabilities ... The Importance of Bespoke Security In this webinar, you will hear from our subject matter experts, Hanah Darley, Head of Threat Research and Toby Lewis, Global Head of Threat Analysis. The discussion will cover the difference between media coverage of cyber threats compared with the ... | View More Dark Reading Webinars >> | |
| |
|
Dark Reading Daily -- Published By Dark Reading Informa Tech Holdings LLC | Registered in the United States with number 7418737 | 605 Third Ave., 22nd Floor, New York, New York 10158, USA
| To opt-out of any future Dark Reading Daily Newsletter emails, please respond here. | Thoughts about this newsletter? Give us feedback. |
Keep This Newsletter Out Of Your SPAM Folder Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list: | If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation. | We take your privacy very seriously. Please review our Privacy Statement. |
|
|