From a scrappy contest where hackers tried to win laptops, Pwn2Own has grown into a premier event that has helped normalize bug hunting. [TechWeb]( Follow Dark Reading:
[RSS](
May 21, 2022 LATEST SECURITY NEWS & COMMENTARY [How Pwn2Own Made Bug Hunting a Real Sport](
From a scrappy contest where hackers tried to win laptops, Pwn2Own has grown into a premier event that has helped normalize bug hunting.
[Quantum Key Distribution for a Post-Quantum World](
New versions of QKD use separate wavelengths on the same fiber, improving cost and efficiency, but distance is still a challenge.
[You Can't Opt Out of Citizen Development](
To see why low-code/no-code is inevitable, we need to first understand how it finds its way into the enterprise.
[Name That Edge Toon: Flower Power](
Come up with a clever caption, and our panel of experts will reward the winner with a $25 Amazon gift card. [MORE NEWS /]( [MORE COMMENTARY]( HOT TOPICS [Threat Actors Are Stealing Data Now to Decrypt When Quantum Computing Comes]( The technique, called store-now, decrypt later (SNDL), means organizations need to prepare now for post-quantum cryptography.
[Passwords: Do Actions Speak Louder Than Words?]( For most of us, passwords are the most visible security control we deal with on a regular basis, but we are not very good at it.
[Q&A: How China Is Exporting Tech-Based Authoritarianism Across the World]( The US has to adapt its own policies to counter the push, warns former DocuSign CEO and Under Secretary of State Keith Krach. [MORE]( EDITORS' CHOICE [3 Predictors of Cybersecurity Startup Success](
Before investing, venture capitalists should consider a trio of business characteristics that seem to correlate with commercial success, based on meetings with over 2,000 cybersecurity startups. FROM THE NEWS DESK [Majority of Kubernetes API Servers Exposed to the Public Internet](
Shadowserver Foundation researchers find 380,000 open Kubernetes API servers. Tech Resources - [Gartner, Quick Answer: How Can Organizations Use DNS to Improve Their Security Posture?](
- [Understanding DNS Threats and How to Use DNS to Expand Your Cybersecurity Arsenal](
- [Five Cardinal Sins of Data Security and Privacy](
- [What is a data vault? Why do you need it?](
- [2022 The State of Application Data Privacy and Security](
- [Why Your Company's PSIRT Should Go Beyond Incident Response](
- [The Top 10 API Vulnerabilities]( [ACCESS TECH LIBRARY NOW]( - [Harnessing the Power of Security Automation]( With many organizations pinched for both dollars and manpower, security and IT teams are turning to a new class of technology and practices designed to automate repetitive and time-consuming tasks in security operations. How can companies truly unleash the potential ... - [Implementing and Using XDR to Improve Enterprise Cybersecurity]( Security operations teams are taking a hard look at extended detection and response tools - XDR - as a means of collecting and analyzing threat data and identifying cyber attacks faster and more efficiently. But exactly how does XDR technology ... [MORE WEBINARS]( FEATURED REPORTS - [State of the Cloud: A Security Perspective]( Cloud computing has evolved over the years from a nice-to-have item on the IT wish list to a core technology driving business initiatives. But despite widespread adoption, cloud-based IT systems continue to be saddled with issues related to data security, ... - [Rethinking Endpoint Security in a Pandemic and Beyond]( IT security teams are expending the concept of "endpoint security" as companies adjust to a distributed workforce. How much responsibility will enterprise IT take for the security of personal devices such as printers. How will they manage identities across multiple ... [MORE REPORTS]( CURRENT ISSUE
[Incorporating a Prevention Mindset into Threat Detection and Response](
[DOWNLOAD THIS ISSUE]( [SUBSCRIBE NOW](
[BACK ISSUES]( | [MUST READS]( | [TECH DIGEST]( PRODUCTS & RELEASES [Lacework Integrates Kubernetes Features to Enhance Security Across Multi-Cloud Environments]( [Dig Exits Stealth With $11M for Cloud Data Detection and Response Solution]( [Bitdefender Launches Identity Theft Protection Service for U.S. Consumers]( [RF Technologies Releases Safe Place Staff Protection for Healthcare Settings]( [TorchLight Expands Cybersecurity Services With MDR Sentinel in Partnership With Microsoft](
[MORE PRODUCTS & RELEASES]( Dark Reading Daily
-- Published By [Dark Reading](
Informa Tech Holdings LLC | Registered in the United States
with number 7418737 | 605 Third Ave., 22nd Floor, New York, New York 10158, USA
To update your profile, change your e-mail address, or unsubscribe, [click here.](
To opt-out of any future Dark Reading Daily Newsletter emails, please respond [here.](
Thoughts about this newsletter? [Give us feedback.](mailto:customerservice_informationhub@techweb.com)
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our [Privacy Statement.]( [© 2022]( | [Informa Tech]( | [Privacy Statement]( | [Terms & Conditions]( | [Contact Us](mailto:customerservice_informationhub@techweb.com)