| LATEST SECURITY FEATURES & COMMENTARY | Name That Edge Toon: On Your Mark... Come up with a clever cybersecurity-related caption, and our panel of experts will reward the winner with a $25 Amazon gift card. Making Cyber Insurance Available for Small Biz, Contractors Cyber insurance companies are moving down-market to offer policies to help protect remote employees, independent contractors, and small businesses from the cost of cyberattacks. Human-Centric Security Model Meets People Where They Are Instead of fighting workarounds that compromise security, a human-centered system fixes the process issues that prompt people to work dangerously. Enhancing Incident Response Playbooks With Machine Learning Cybersecurity analysts use playbooks as a guide to quickly investigate and respond to incidents, but they regularly neglect to keep the process documents up to date. Dragos Expands Defense Program for Small Utilities The Dragos Community Defense Program provides small water, gas, and electric utilities with access to the Dragos Platform, training resources, and threat intelligence. Wiz-Securonix Partnership Promises Unified Threat Detection The collaboration focuses on helping security teams detect and address cloud threats more effectively. The European Space Agency Explores Cybersecurity for Space Industry An ESA cybersecurity expert explains how space-based data and services benefit from public investment in space programs. MORE FROM THE EDGE / MORE FROM DR TECHNOLOGY | | | | HOT TOPICS | Microsoft Is Getting a New 'Outsider' CISO Igor Tsyganskiy inherits the high-profile CISO spot in Redmond, while his predecessor, Bret Arsenault, is named chief security adviser. Municipalities Face a Constant Battle as Ransomware Snowballs As record-breaking volumes of ransomware hit cities, towns, and counties this year, municipalities remain easy targets that pay, and there's no end of the attacks in sight. 4 Metrics That Help CISOs Become Strategic Partners With the Board To demonstrate the CISO role's value, frame your work using metrics that align with the most critical parts of every business: risk, growth, expenses, and people. MORE |
| | PRODUCTS & RELEASES | CISOs See Software Supply Chain Security As Bigger Blind Spot Than GenAI: Cycode Zatik Security Gains Momentum, Announces Co-Founder, CTO, Partner Network Enveedo Closes $3.15M Seed Round to Help Businesses Build and Maintain Cyber Resiliency Keeper Security Survey Finds 82% of IT Leaders Want to Move Their On-Premises Privileged Access Management (PAM) Solution to the Cloud DTEX Systems Appoints Mandiant Global CTO Marshall Heilman As CEO MORE PRODUCTS & RELEASES MORE PRODUCTS & RELEASES |
| | | | | FEATURED REPORTS | Passwords Are Passe: Next Gen Authentication Addresses Today's Threats How to Use Threat Intelligence to Mitigate Third-Party Risk The report discusses the various steps of a continuous third-party intelligence lifecycle: Data collection, Data classification, Data storage, Data analysis, reporting, dissemination, continuous monitoring, data governance, and choosing the right technology stack. The report also includes information about how attackers ... Concerns Mount Over Ransomware, Zero-Day Bugs, and AI-Enabled Malware | View More Dark Reading Reports >> |
|
|
|
Dark Reading Daily -- Published By Dark Reading Informa Tech Holdings LLC | Registered in the United States with number 7418737 | 605 Third Ave., 22nd Floor, New York, New York 10158, USA
| To opt-out of any future Dark Reading Daily Newsletter emails, please respond here. | Thoughts about this newsletter? Give us feedback. |
Keep This Newsletter Out Of Your SPAM Folder Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list: | If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation. | We take your privacy very seriously. Please review our Privacy Statement. |
|
|