But valuations have dropped â and investors are paying closer attention to revenues and profitability, industry analysts say. [TechWeb]( Follow Dark Reading:
[RSS](
June 07, 2022 LATEST SECURITY NEWS & COMMENTARY [Cybersecurity M&A Activity Shows No Signs of Slowdown](
But valuations have dropped â and investors are paying closer attention to revenues and profitability, industry analysts say.
[Gathering Momentum: 3 Steps Forward to Expand SBoM Use](
New studies show less than a third of organizations use software bills of materials (SBoMs), but momentum is building to boost that number.
[Communication Is Key to CISO Success](
A panel of CISOs at the RSA Conference outlined what a successful first 90-day plan looks like, and it boiled down to effective communication and listening.
[Ransomware's ROI Retreat Will Drive More BEC Attacks](
Crackdowns are driving down ransomware profits, and analysts see signs that operators are pivoting to business email compromise attacks, security researcher warned.
[Are You Ready for a Breach in Your Organization's Slack Workspace?](
A single compromised Slack account can easily be leveraged to deceive other users and gain additional access to other users and multiple Slack channels.
[(Sponsored Article) Managing Extended Software Supply Chain Risks](
Supply chain woes have dominated headlines, but there's another type of supply chain that's also increasingly at risk: the cloud supply chain.
[IBM to Buy Attack Surface-Management Firm Randori](
Randoriâs attack-surface management software will be integrated into IBM Security QRadar extended detection and response (XDR) features. [MORE NEWS /]( [MORE COMMENTARY]( HOT TOPICS [Actively Exploited Atlassian Zero-Day Bug Allows Full System Takeover]( A remote code execution (RCE) vulnerability in all versions of the popular Confluence collaboration platform can be abused in credential harvesting, cyber espionage, and network backdoor attacks.
['Clipminer' Malware Actors Steal $1.7 Million Using Clipboard Hijacking]( The malware targets Windows users via Trojanized downloads of cracked or pirated software and then starts in on cryptocurrency mining and clipboard hijacking.
[Why Network Object Management Is Critical for Managing Multicloud Network Security]( If you want your IT and security administrators to get buried in trivial workloads and productivity bottlenecks, having poor network object management is a great way to accomplish that. [MORE]( EDITORS' CHOICE [Actively Exploited Atlassian Zero-Day Bug Allows Full System Takeover](
A remote code execution (RCE) vulnerability in all versions of the popular Confluence collaboration platform can be abused in credential harvesting, cyber espionage, and network backdoor attacks. LATEST FROM THE EDGE [Name That Edge Toon: Hey, Batter Batter!](
Come up with a clever caption, and our panel of experts will reward the winner with a $25 Amazon gift card. LATEST FROM DR TECHNOLOGY [The CISO Shortlist: Top Priorities at RSAC 2022](
The buzz on the show floor during RSA Conference is about aligning the organization's security priorities with the right technology. Will Lin, managing director and founding member at Forgepoint Capital, weighs in on the biggest security priorities for 2022 â and what kind of tech senior-level executives are looking for. Tech Resources - [Eight Best Practices for a Data-Driven Approach to Cloud Migration](
- [Considerations for Evaluating Endpoint Detection and Response Solutions](
- [Protecting Endpoint to Work from Anywhere](
- [Five Keys to a Secure Work-From-Anywhere Solution](
- [Protecting Medical Device IP From Cybersecurity Threats](
- [Best Practices for Application Security in the Cloud](
- [AppSec Shift Left Progress Report]( [ACCESS TECH LIBRARY NOW]( - [Using Threat Modeling to Improve Enterprise Cyber Defenses]( As enterprises deal with multiple threats coming in different forms, security teams are shifting to a risk-based security to handle these challenges. One of the key tools is threat modeling, a process intended to help identify potential weaknesses and prioritize ... - [Implementing Zero Trust in Your Enterprise]( Attackers have shown time and again that perimeter security is no longer enough to keep them out. The concept of internal users and outsiders doesn't work in network defense when attackers use credential theft and lateral movement to pretend they ... [MORE WEBINARS]( FEATURED REPORTS - [Understanding DNS Threats and How to Use DNS to Expand Your Cybersecurity Arsenal]( With attacks and breaches on the rise, enterprise security teams need full visibility over what they have in their network. DNS is a key tool for visibility and asset discovery. Proactive DNS-layer security - such as using DNS data to ... - [Rethinking Endpoint Security in a Pandemic and Beyond]( IT security teams are expending the concept of "endpoint security" as companies adjust to a distributed workforce. How much responsibility will enterprise IT take for the security of personal devices such as printers. How will they manage identities across multiple ... [MORE REPORTS]( CURRENT ISSUE
[The State of Malware Threats](
[DOWNLOAD THIS ISSUE]( [SUBSCRIBE NOW](
[BACK ISSUES]( | [MUST READS]( | [TECH DIGEST]( PRODUCTS & RELEASES [Optiv Launches Cyber Recovery Solution Focused on Protection and Rapid Recovery]( [BigID Introduces Cloud Data Security On Demand](
[MORE PRODUCTS & RELEASES]( Dark Reading Daily
-- Published By [Dark Reading](
Informa Tech Holdings LLC | Registered in the United States
with number 7418737 | 605 Third Ave., 22nd Floor, New York, New York 10158, USA
To update your profile, change your e-mail address, or unsubscribe, [click here.](
To opt-out of any future Dark Reading Daily Newsletter emails, please respond [here.](
Thoughts about this newsletter? [Give us feedback.](mailto:customerservice_informationhub@techweb.com)
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our [Privacy Statement.]( [© 2022]( | [Informa Tech]( | [Privacy Statement]( | [Terms & Conditions]( | [Contact Us](mailto:customerservice_informationhub@techweb.com)