MGM wins big bet that choosing days of operations outages is a better business decision than paying a ransom, following last month's data breach [TechWeb]( Follow Dark Reading:
[RSS](
October 09, 2023 LATEST SECURITY NEWS & COMMENTARY [Too Rich to Ransomware? MGM Brushes Off $100M in Losses](
MGM wins big bet that choosing days of operations outages is a better business decision than paying a ransom, following last month's data breach.
[23andMe Cyberbreach Exposes DNA Data, Potential Family Ties](
The information leaked in the breach involves personally identifiable information as well as genetic ancestry data, potential relatives, and geolocations.
[Suspected Crime Gang Hacks Israeli President's Telegram Account](
The encrypted messaging app was hacked in the wake of an online scam before access was "swiftly restored."
[Preparing for the Unexpected: A Proactive Approach to Operational Resilience](
Try these steps to create an operational resilience action plan that will satisfy financial regulators and help sustain business without disruption. [MORE NEWS /]( [MORE COMMENTARY]( HOT TOPICS ['Looney Tunables' Bug Opens Millions of Linux Systems to Root Takeover]( The flaw poses a significant risk of unauthorized data access, system alterations, potential data theft, and complete takeover of vulnerable systems, especially in the IoT and embedded computing space.
[Breaches Are the Cost of Doing Business, but NIST Is Here to Help]( Treating the NIST Cybersecurity Framework as a business requirement is a strong step toward preventing breaches.
[Could Cybersecurity Breaches Become Harmless in the Future?]( With these five steps, organizations can develop stronger security practices and make the inevitable breaches inconsequential.
[Legions of Critical Infrastructure Devices Subject to Cyber Targeting]( Nearly 100,000 ICS devices have been found open to the public Internet, potentially threatening physical safety globally. Here's how to quantify the risk. [MORE]( EDITORS' CHOICE [Critical Zero-Day Bug in Atlassian Confluence Under Active Exploit](
Patch now: The Atlassian security vulnerability appears to be a remotely exploitable privilege-escalation bug that cyberattackers could use to crack collaboration environments wide open. LATEST FROM THE EDGE [In Search of Rust Developers, Companies Turn to In-House Training](
Google, Fortanix, and other firms have aimed to train a cadre of Rust developers, betting that the additional cost will be offset by security savings. LATEST FROM DR TECHNOLOGY [Google, Yahoo Push DMARC, Forcing Companies to Catch Up](
The move means that DMARC, already in use by half of enterprises, will become table stakes for anyone using email for marketing. LATEST FROM DR GLOBAL [Madagascar Drops Predator Spyware on Citizens in Watering Hole Attack](
The Predator spyware was distributed by dropping malicious links inside typosquatted facsimiles of news websites. WEBINARS - [DevSecOps for Mobile App Development]( Baking security into applications earlier in the software development lifecycle has become the mantra of the enterprise today, with software development and security teams working closely together to ensure more secure coding throughout the development process to ensure safer and ... - [Using AI in Application Security Tooling]( As AI continues to improve, security vendors are considering how they can use AI to protect applications. In web application and API security tooling used to protect production environments, AI/ML can be used to enhance and complement existing tactics ... [View More Dark Reading Webinars >>]( WHITE PAPERS - [The Forrester Wave: External Threat Intelligence Service Providers, Q3 2023](
- [9 Traits You Need to Succeed as a Cybersecurity Leader](
- [The Ultimate Guide to the CISSP](
- [Rediscovering Your Identity](
- [2023 Global Future of Cyber Report](
- [Cybersecurity in 2023 and beyond: 12 leaders share their forecasts](
- [Know your customer: Enable a 360-degree view with customer identity & access management]( [View More White Papers >>]( FEATURED REPORTS - [How to Use Threat Intelligence to Mitigate Third-Party Risk]( The report discusses the various steps of a continuous third-party intelligence lifecycle: Data collection, Data classification, Data storage, Data analysis, reporting, dissemination, continuous monitoring, data governance, and choosing the right technology stack. The report also includes information about how attackers ... - [Securing the Remote Worker: How to Mitigate Off-Site Cyberattacks]( The most profound change to enterprise security with the rise of remote work is the way endpoint security has moved from last line of defense to being on the frontline. The user's endpoint is the first device attackers encounter, making ... - [How Enterprises Are Managing Application Security Risks in a Heightened Threat Environment]( Concerns over API security and low-code/no-code use added to an already-full plate of application security challenges for many organizations over the last year. IT and security decision-makers are deeply concerned about compromises resulting from vulnerabilities in the software supply ... [View More Dark Reading Reports >>]( PRODUCTS & RELEASES [BeyondID Introduces Identity-First Model for Zero-Trust Maturity]( [37% Intimidated, 39% Frustrated With Online Security Highlighting Digital Anxiety]( [Mitiga Secures Strategic Investment From Cisco]( [Okta Launches Cybersecurity Workforce Development Initiative to Help Close the Tech and Cybersecurity Skills Gap]( [Cybersecurity Funding Rises by 21% in Q3 2023, Pinpoint Search Group's Report Indicates](
[MORE PRODUCTS & RELEASES]( CURRENT ISSUE
[How to Deploy Zero Trust for Remote Workforce Security](
[DOWNLOAD THIS ISSUE](
[VIEW BACK ISSUES]( Dark Reading Daily
-- Published By [Dark Reading](
Informa Tech Holdings LLC | Registered in the United States
with number 7418737 | 605 Third Ave., 22nd Floor, New York, New York 10158, USA
To opt-out of any future Dark Reading Daily Newsletter emails, please respond [here.](
Thoughts about this newsletter? [Give us feedback.](mailto:ContactDarkReading@informa.com)
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list: /cdn-cgi/l/email-protection?sp_aid=118634&elq_cid=22844169&sp_eh=9ec2e0353644c03ce56099bfb161a49d1f8a5a22f0d884f0cd961b89d205d529&utm_source=eloqua&utm_medium=email&utm_campaign=DR_NL_Dark%20Reading%20Daily_10.09.23&sp_cid=50065&utm_content=DR_NL_Dark%20Reading%20Daily_10.09.23&sp_eh=9ec2e0353644c03ce56099bfb161a49d1f8a5a22f0d884f0cd961b89d205d529#01
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our [Privacy Statement.]( [© 2023]( | [Informa Tech]( | [Privacy Statement]( | [Terms & Conditions]( | [Contact Us](mailto:ContactDarkReading@informa.com)