When it comes to landing a job in cybersecurity, what does it take to stand out from the pack? Try playing games.
Follow Dark Reading:
 November 09, 2024
LATEST SECURITY FEATURES & COMMENTARY
How Playing Cyber Games Can Help You Get Hired
When it comes to landing a job in cybersecurity, what does it take to stand out from the pack? Try playing games.
Name That Edge Toon: Aerialist's Choice
Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card.
Oh, the Humanity! How to Make Humans Part of Cybersecurity Design
Government and industry want to jump-start the conversation around "human-centric cybersecurity" to boost the usability and effectiveness of security products and services.
Attackers Breach IT-Based Networks Before Jumping to ICS/OT Systems
SANS's "2024 State of ICS.OT Cybersecurity report" highlights the most common types of attack vectors used against ICT/OT networks.
Google Cloud to Enforce MFA on Accounts in 2025
Google Cloud will take a phased approach to make multifactor authentication mandatory for all users.
Symbiotic Security Launches Scanning Tool to Help Fix Flaws in Code
The company comes out of stealth with a tool that integrates directly into the developer's IDE to find flaws, offer remediation advice, and training materials to write secure code.
Preparing for DORA Amid Technical Controls Ambiguity
The European Union's Digital Operational Resilience Act requires financial entities to focus on third-party risk, resilience, and testing.
MORE FROM THE EDGE / MORE FROM DR TECHNOLOGY
HOT TOPICS
Fake Copyright Infringement Emails Spread Rhadamanthys
Attackers are triggering victims' deep-seated fear of getting in trouble in order to spread the sophisticated stealer across continents.

Docusign API Abused in Widescale, Novel Invoice Attack
Attackers are exploiting the "Envelopes: create API" of the enormously popular document-signing service to flood corporate inboxes with convincing phishing emails aimed at defrauding organizations. It's an unusual attack vector with a high success rate.

The Power of Process in Creating a Successful Security Posture
Establishing realistic, practitioner-driven processes prevents employee burnout, standardizes experiences, and closes many of the gaps exposed by repeated one-offs.

MORE
PRODUCTS & RELEASES
EDITORS' CHOICE
4 Main API Security Risks Organizations Need to Address
Misconfigurations, weak authentication, and logic flaws are among the main drivers of API security risks at many organizations.
OWASP Releases AI Security Guidance
OWASP has released guidance materials addressing how to respond to deepfakes, AI security best practices, and how to secure open source and commercial generative AI applications.
Dark Reading Confidential: Quantum Has Landed, So Now What?
PODCAST: NIST's new post-quantum cryptography standards are here, so what comes next? The latest episode of Dark Reading Confidential digs into the world of quantum computing from a cybersecurity practitioner's point of view.

WEBINARS
WHITE PAPERS
FEATURED REPORTS
View More Dark Reading Reports >>
Dark Reading Daily
-- Published By Dark Reading
Informa Tech Holdings LLC | Registered in the United States
with number 7418737 | 605 Third Ave., 22nd Floor, New York, New York 10158, USA
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.