Protect your network

June 25, 2024 at 05:07AM Join Cloudflare and The Register for a webinar on June 25th to explore the expanding attack surfaces and how to secure your network. Gain insights on the latest trends and actionable strategies from Cloudflare’s experience and case studies. Register now to tackle modern cybersecurity challenges. Sponsored by Cloudflare. Key takeaways … Read more

CISO Corner: Apple’s AI Privacy Promises; CEOs in the Hot Seat

June 14, 2024 at 11:39AM CISO Corner is Dark Reading’s weekly digest of cybersecurity articles tailored for security operations and leaders. In this issue, articles cover Apple’s ambitious AI privacy promises, vulnerabilities in biometric security, tightening cybersecurity during Hajj season, and the need for CIO & CISO collaboration. Also highlighted are Rockwell’s ICS directive and … Read more

When ‘No’ & ‘Good Enough’ Challenge Cybersecurity

May 24, 2024 at 10:06AM In the cybersecurity realm, the challenge for CISOs is advocating for comprehensive defense strategies amid budget constraints and organizational resistance. The reliance on “good enough” is risky, as advanced capabilities are essential to thwart evolving threats. Persistent advocacy and strategic risk management are crucial, and alignment with cybersecurity priorities may … Read more

CISO Corner: What Cyber Labor Shortage?; Trouble Meeting SEC Disclosure Deadlines

May 17, 2024 at 05:17PM CISO Corner provides a weekly digest of Dark Reading articles tailored for security operations readers and leaders. This issue covers struggles with SEC disclosure rules, top cyber threats in 2024, the AI committee’s role for CISOs, Singapore’s cybersecurity regulations, and challenges in hiring cybersecurity talent. Additionally, it features a podcast … Read more

Has the ever-present cyber danger just got worse?

April 22, 2024 at 07:03AM The UK government is criticized for its weak response to cyber-attacks by APT31, with concerns raised about the country’s critical infrastructure resilience. It’s essential to enhance cybersecurity defenses to combat ransomware and data breaches from organized criminal groups. Join the live webinar on April 29 to learn about mitigating cyberattacks’ … Read more

CISO Corner: Securing the AI Supply Chain; AI-Powered Security Platforms; Fighting for Cyber Awareness

April 12, 2024 at 04:13PM Summary: This collection provides essential reporting and industry insights for cybersecurity strategists and SecOps professionals. It covers confronting challenges in software security and includes the latest guidance from the NSA, offering valuable perspectives for navigating the cybersecurity landscape. Based on the meeting notes, the key takeaways are: 1. Focus on … Read more

CISO Corner: Cyber-Pro Swindle; New Faces of Risk; Cyber Boosts Valuation

March 29, 2024 at 05:03PM The collection offers relevant reporting and industry perspectives for cybersecurity strategy guides focused on SecOps. It also covers Australia’s renewed focus on cybersecurity and the upcoming zero-day field day in 2023. Based on the meeting notes, the key takeaways are: 1. Collection of relevant reporting and industry perspectives for cybersecurity … Read more

CISO Corner: NSA Guidelines; a Utility SBOM Case Study; Lava Lamps

March 8, 2024 at 04:58PM CISO Corner is the Dark Reading weekly digest tailored for security operations and leadership. It provides diverse perspectives on cybersecurity strategies, including NSA’s guidelines for zero-trust security, using randomness for encryption, creating software bill of materials for electric substations, CEO support for CISOs, managing open source security, DMARC deployment in … Read more

What Generative AI Means for Cybersecurity in 2024

February 9, 2024 at 11:58AM In 2024, generative AI has become a valuable tool for cybercriminals, who use its speed and scalability to enhance social engineering and fraud. It allows for targeted, tonally convincing messages on a mass scale, including audio and video ‘deepfakes’. Defenses must evolve to combat these threats, utilizing zero-trust approaches and … Read more