As the second Kaminsky Fellow, Andrews will study the use of threat intelligence to track campaigns against the human rights community.
| LATEST SECURITY FEATURES & COMMENTARY | Spotlight on 2023 Dan Kaminsky Fellow: Dr. Gus Andrews As the second Kaminsky Fellow, Andrews will study the use of threat intelligence to track campaigns against the human rights community. Russia's War in Ukraine Shows Cyberattacks Can Be War Crimes Ukraine head of cybersecurity Victor Zhora says the world needs "efficient legal instruments to confront cyber terrorism." 2 Lenses for Examining the Safety of Open Source Software Improving the security of open source repositories while keeping malicious components out requires a combination of technology and people. What Security Professionals Need to Know About Aggregate Cyber-Risk Widespread cyber incidents will happen, but unlike natural disasters, specific security controls can help prevent a catastrophe. Google Adds Guardrails to Keep AI in Check Companies are starting to address the misuse of artificial intelligence (AI). At Google I/O, for example, executives promised its AI has safety measures. How Do I Reduce Security Tool Sprawl in My Environment? When it comes to tool consolidation, focus on platforms over products. Meet Charlotte, CrowdStrike's New Generative AI Assistant Charlotte AI is the latest security-based generative AI assistant to hit the market. Improving Cybersecurity Requires Building Better Public-Private Cooperation Security vendors, businesses, and US government agencies need to work together to fight ransomware and protect critical infrastructure. Red Hat Tackles Software Supply Chain Security The new Red Hat Trusted Software Supply Chain services help developers take a secure-by-design approach to build, deploy, and monitor software. Ways to Help Cybersecurity's Essential Workers Avoid Burnout To support and retain the people who protect assets against bad actors, organizations should create a more defensible environment. MORE FROM THE EDGE / MORE FROM DR TECHNOLOGY | |
| | WEBINARS | How to Use Threat Intelligence to Mitigate Third Party Risk Threat intelligence provides security teams with insights into the kinds of attacks that may target their organizations and prioritize their security activities. But what if the risk is coming from third-party partners and systems? In this webinar, experts discuss how ... Here's What Zero Trust Really Means Credential theft, lateral movement and other cyberattack tricks have foiled perimeter security again and again. We know that the old philosophy of trusting everything and everyone inside a network is no longer sound. The zero-trust model - trust nothing, verify ... | View More Dark Reading Webinars >> | |
| |
|
Dark Reading Daily -- Published By Dark Reading Informa Tech Holdings LLC | Registered in the United States with number 7418737 | 605 Third Ave., 22nd Floor, New York, New York 10158, USA
| To opt-out of any future Dark Reading Daily Newsletter emails, please respond here. | Thoughts about this newsletter? Give us feedback. |
Keep This Newsletter Out Of Your SPAM Folder Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list: | If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation. | We take your privacy very seriously. Please review our Privacy Statement. |
|
|