6 security-tech innovations we’re excited to see in 2022.

Views expressed in this cybersecurity-intelligence update are those of the reporters and correspondents.

Accessed on 28 December 2021, 1417 UTC.

Content supplied by “Dark Reading Daily.”

Source:

https://mail.google.com/mail/u/0/#inbox/FMfcgzGmtDzNqkZGMtThrDxZfkzjKMpn

Please click link or scroll down to read your selections.

Follow Dark Reading:
 December 28, 2021
LATEST SECURITY NEWS & COMMENTARY
6 Security-Tech Innovations We’re Excited to See in 2022
The details on cybersecurity technologies that we expect to advance rapidly in the coming year.
The CISO as Sustaining Force: Helping Infosec Staff Beat Burnout
To protect their staffers, leaders should focus on identifying and alleviating root causes of burnout.
Name That Toon: Modern-Day Frosty
Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card.

MORE NEWS / MORE COMMENTARY

HOT TOPICS
Log4j: A CISO’s Practical Advice
Working together is going to make getting through this problem a lot easier.
Log4j Reveals Cybersecurity’s Dirty Little Secret
Once the dust settles on Log4j, many IT teams will brush aside the need for the fundamental, not-exciting need for better asset and application management.
Preemptive Strategies to Stop Log4j and Its Variants
Zero trust is key to not falling victim to the next big vulnerability.

MORE

EDITORS’ CHOICE
7 of the Most Impactful Cybersecurity Incidents of 2021
There was a lot to learn from breaches, vulnerabilities, and attacks this year.
LATEST FROM THE EDGE
Why We Need to Consolidate Digital Identity Management Before Zero Trust
Zero trust may be one of the hottest trends in cybersecurity, but just eliminating trust from networks isn’t enough to prevent successful organizational data breaches, says Wes Wright, CTO of Imprivata.
LATEST FROM DR TECHNOLOGY

The Old Ways Aren’t Working: Let’s Rethink OT Security

Ransomware attacks against critical infrastructure go beyond locking up data. They can entirely shut down production in a facility. Here’s how AI can help you fight back.

Tech Resources
ACCESS TECH LIBRARY NOW
  • Beyond Spam and Phishing: Emerging Email-based ThreatsEven as enterprises adopt real-time messaging tools and platforms, email remains the hub of enterprise communications. Adversaries are increasingly targeting the enterprise email inbox, and security teams need to look further than just spam and phishing attacks. In this webinar, …
  • Cloud Security Strategies for Today’s EnterprisesThe typical enterprise relies on dozens, even hundreds, of cloud applications and services sprawled across different platforms and service providers. Security teams need to shoulder the responsibility of coordinating security and incident response and not leave it up to individual …
MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
How Data Breaches Affect the Enterprise
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES

For the latest cybersecurity news and information, please check the blog sidebar, links, and twitter posts.

Russ Roberts

https://cuber-security-intelligence.org.