| LATEST SECURITY NEWS & COMMENTARY | Why Supply Chain Attacks Are Destined to Escalate In his keynote address at Black Hat USA on Wednesday, Matt Tait, chief operating officer at Corellium, called for software platform vendors and security researchers to do their part to thwart the fallout of software supply chain compromises. As Attackers Circle, Federal Agencies Fail to Improve Cybersecurity Despite being the frequent target of nation-state and criminal actors, nearly every US government agency gets a "C" or "D" for data security, according to a new Senate report. A New Approach to Securing Authentication Systems' Core Secrets Researchers at Black Hat USA explain issues around defending "Golden Secrets" and present an approach to solving the problem. Dark Reading Virtual News Desk Returns to Black Hat Coming to you prerecorded from home offices around the world! 5 Key Lessons From ICS Attacks Through the Ages Industrial control systems attacks are happening with more frequency, but they are hardly new. REvil Most Popular Ransomware Variant in 2021 (So Far) An increase in global cyberattacks was driven by Web shell activity, targeted ransomware and extortion operations, and supply chain intrusions. NSA & CISA Publish Kubernetes Security Guidance Kubernetes is frequently targeted for data theft, computational power theft, or denial of service, the agencies say in a joint advisory. MORE NEWS & COMMENTARY | |
| | Tech Resources | Policy as Code Guide - Design, Build, & Runtime Today's Hybrid Work Model Requires a Hybrid Approach to Security Ransomware, the Exploding Cyber Threat Forrester Total Economic Impact Study: Team Cymru Pure Signal Recon Case Study: Leading Financial Institutions Privileged Access Management Checklist How Secure Are Your Endpoints? | ACCESS TECH LIBRARY NOW
|
| External Threat Hunting - Reduce Supply Chain Risk In this webinar, we'll look at how one Fortune 100 organization transformed its security program by investing in external threat hunting, establishing a world class threat reconnaissance program that now has proven ROI. With no-touch monitoring of its third parties' networks, ... Making Security Orchestration Automation and Response (SOAR) Work in Your Enterprise Over the past few years, many enterprises have been improving cybersecurity by implementing the Security Orchestration, Automation, and Response (SOAR) framework, which provides a path to collect threat data from multiple sources and respond to some security events automatically. How ... | MORE WEBINARS | |
|
|
Dark Reading Daily -- Published By Dark Reading Informa Tech 303 Second St., Suite 900 South Tower, San Francisco, CA 94107 | To update your profile, change your e-mail address, or unsubscribe, click here. | To opt-out of any future Dark Reading Daily Newsletter emails, please respond here. | Thoughts about this newsletter? Give us feedback. |
Keep This Newsletter Out Of Your SPAM Folder Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list: | If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation. | We take your privacy very seriously. Please review our Privacy Statement. |
|
|