[TechWeb]( Follow Dark Reading:
[RSS](
September 01, 2021 LATEST SECURITY NEWS & COMMENTARY [CISA and FBI: Be 'Vigilant' About Possible Ransomware Attacks Over Labor Day Weekend](
Advisory recommends key defenses for mitigating risk by ransomware and other threats.
[Is Security Worth the Cost of a Subscription? Yes, Docker Argues](
The cloud-native infrastructure firm aims to add more trusted content to the Docker Hub and more tools to assess security for its users, but the price could be high for some companies.
[A CISO's Perspective on Ransomware Payments](
How living through the experience of assisting a small business with a ransomware attack changed my perspective on whether to pay.
[4 Ways to Reduce the Risk of European Privacy Fines](
Privacy compliance is complicated, but there are steps you can take to reduce the risk of fines for noncompliance. Often, European regulators will take your efforts into account when determining enforcement action. Here are four common elements that can have a significant impact on the amount of fines imposed.
[Baby Monitor Vulnerable to Attack via Newly Found Bugs](
Researchers find holes in Victure IPC360 Camera that could give hackers access to the monitor's camera feed. [MORE NEWS /]( [MORE COMMENTARY]( HOT TOPICS [6 Client-Side Security Concerns Enterprises Should Care About]( Enterprises have to decide whether to take into account the security of end-customers' devices when building out the application experience, or even whether the application allows or denies access depending on the device. [The Power of Comedy for Cybersecurity Awareness Training]( Cybersecurity is serious stuff, but the way we talk about it shouldn't be if we want people to pay attention and remember what they're taught.
[7 Tips for Securing the Software Development Environment]( Recent attacks have highlighted the need for organizations to pay closer attention to the hardware, software, and networks used in software development. [MORE]( EDITORS' CHOICE [Microsoft Azure Cosmos DB Incident Underscores the Need to Closely Watch Cloud Data](
Even businesses that do everything right still need to monitor their data and cloud services.
[5 Considerations for Flexible Security Planning](
From business processes to buying mechanisms and implementation timelines, a host of issues may stand in the way of flexible planning for cyber defense. LATEST FROM THE EDGE [Chenxi Wang: From Security Research to Developing the Next Generation of Security Leaders](
Security Pro File: After stints as an industry analyst and security executive for different companies, Chenxi Wang is developing the next-generation of security companies and women executives in security. Tech Resources - [Guide to Enabling a Work from Anywhere Organization](
- [How five organizations are elevating WFH into a long-term strategy](
- [Run and Transform: Micro Focus + Jaguar Racing](
- [The Top 10 Threats of Data Sprawl and How to Mitigate Them](
- [The Top 5 Fails of DLP](
- [2021 Data Breach Investigations Report Executive Summary](
- [Policy as Code Guide - Design, Build, & Runtime]( [ACCESS TECH LIBRARY NOW]( - [Security Alert Fatigue: How to Wake Up and Take Back Control of your SOC]( In this webinar, learn expert tips on how to improve your processes and use orchestration to relieve security alert fatigue, get the most out of your security investments and improve your cyber incident response. - ["The New Normal" of Supply Chain Security]( In this webinar, experts discuss potential vulnerabilities in the new supply chain, and potential threats from online attackers. They also discuss the impact of these changes on compliance with industry and regulatory rules that govern the supply chain. You'll learn ... [MORE WEBINARS]( FEATURED REPORTS - [Enterprise Cybersecurity Plans in a Post-Pandemic World]( As the COVID-19 pandemic eases, IT security threats and the challenges involved in responding to them are trending upward. Security leaders expect that cyberattacks like ransomware, phishing, and malware will increase even as the pandemic eventually recedes. Download the Dark ... - [How Enterprises Are Developing Secure Applications]( [MORE REPORTS]( CURRENT ISSUE
[Enterprise Cybersecurity Plans in a Post-Pandemic World](
[DOWNLOAD THIS ISSUE]( [SUBSCRIBE NOW](
[BACK ISSUES]( | [MUST READS]( | [TECH DIGEST]( PRODUCTS & RELEASES [Kevala Announces $21 Million Series A Funding Round to Accelerate Decarbonization & Improve Security of US Electric Grid]( [Data Theoremâs Award-Winning Analyzer Engine Delivers Unified AppSec Support Across Apple Desktop, Laptop and Mobile Devices]( [Red Canary Announces New Release of Security Operations Platform]( [Red Sentry Launches Automated, Continuous Cybersecurity Penetration Test]( [New Alliance Seeks to Improve US Electric Grid Cybersecurity]( [DirectTrust Acquires Assets of SAFE Identity]( [OwnBackup Acquires RevCult]( [Password Boss Completes Acquisition of AutoElevate to Give MSPs Increased Cybersecurity Protection Levels]( [Lacework Releases Quarterly Cloud Threat Report](
[MORE PRODUCTS & RELEASES]( Dark Reading Daily
-- Published By [Dark Reading](
Informa Tech
303 Second St., Suite 900 South Tower, San Francisco, CA 94107
To update your profile, change your e-mail address, or unsubscribe, [click here.](
To opt-out of any future Dark Reading Daily Newsletter emails, please respond [here.](
Thoughts about this newsletter? [Give us feedback.](mailto:customerservice_informationhub@techweb.com)
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our [Privacy Statement.]( [© 2021]( | [Informa Tech]( | [Privacy Statement]( | [Terms & Conditions]( | [Contact Us](mailto:customerservice_informationhub@techweb.com)