Adaptive Shield is the third security posture management provider the company has acquired in the past 14 months as identity-based attacks continue to rise.
Follow Dark Reading:
 November 16, 2024
LATEST SECURITY FEATURES & COMMENTARY
CrowdStrike Spends to Boost Identity Threat Detection
Adaptive Shield is the third security posture management provider the company has acquired in the past 14 months as identity-based attacks continue to rise.
AI & LLMs Show Promise in Squashing Software Bugs
Large language models (LLMs) can help app security firms find and fix software vulnerabilities. Malicious actors are on to them, too, but here's why defenders may retain the edge.
TSA Proposes Cyber-Risk Mandates for Pipelines, Transportation Systems
The proposed rules codify existing temporary directives requiring pipeline and railroad operators to report cyber incidents and create cyber-risk management plans.
5 Ways to Save Your Organization From Cloud Security Threats
The shift to cloud means securing your organization's digital assets requires a proactive, multilayered approach.
Lessons From OSC&R on Protecting the Software Supply Chain
A new report from the Open Software Supply Chain Attack Reference (OSC&R) team provides a framework to reduce how much vulnerable software reaches production.
What Listening to My Father Taught Me About Cybersecurity
It's polite to listen to advice that people are willing to share, but not all of it will be useful for you. Here's how to separate the wheat from the chaff.
Trustwave-Cybereason Merger Boosts MDR Portfolio
The consolidation folds Cybereason's endpoint detection and response (EDR) platform into Trustwave's managed security services offerings, such as managed detection and response (MDR).
New Essay Competition Explores AI's Role in Cybersecurity
The essays are to focus on the impact that artificial intelligence will have on European policy.
Frenos Takes Home the Prize at 2024 DataTribe Challenge
Frenos offers a zero-impact, continuous security assessment platform for operational technology environments.
MORE FROM THE EDGE / MORE FROM DR TECHNOLOGY
HOT TOPICS
Microsoft Power Pages Leak Millions of Private Records
Less-experienced users of Microsoft's website building platform may not understand all the implications of the access controls in its low- or no-code environment.

Trump 2.0 May Mean Fewer Cybersecurity Regs, Shift in Threats
Given increased tensions with China over tariffs, companies could see a shift in attacks, but also fewer regulations and a run at a business-friendly federal privacy law.

MORE
PRODUCTS & RELEASES
EDITORS' CHOICE
Oh, the Humanity! How to Make Humans Part of Cybersecurity Design
Government and industry want to jump-start the conversation around "human-centric cybersecurity" to boost the usability and effectiveness of security products and services.
Name That Edge Toon: Aerialist's Choice
Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card.
How CISOs Can Lead the Responsible AI Charge
CISOs understand the risk scenarios that can help create safeguards so everyone can use AI safely and focus on the technology's promises and opportunities.
Incident Response, Anomaly Detection Rank High on Planned ICS Security Spending
The "SANS 2024 State of ICS/OT Cybersecurity" report suggests organizations are going to shift spending from security technologies protecting industrial control systems and operational technology environments to nontechnical activities, such as training and incident response.
WEBINARS
WHITE PAPERS
FEATURED REPORTS
View More Dark Reading Reports >>
Dark Reading Daily
-- Published By Dark Reading
Informa Tech Holdings LLC | Registered in the United States
with number 7418737 | 605 Third Ave., 22nd Floor, New York, New York 10158, USA
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.