Follow Dark Reading:
 December 24, 2019
LATEST SECURITY NEWS & COMMENTARY
20 Vulnerabilities to Prioritize Patching Before 2020
Researchers list the top 20 vulnerabilities currently exploited by attack groups around the world.
Citrix Urges Firms to Harden Configurations After Flaw Report
A vulnerability in two of the company's appliances opens 80,000 networks up for exploitation.
2020 & Beyond: The Evolution of Cybersecurity
As new technologies disrupt the industry, remember that security is a process, not a goal. Educate yourself on how you can best secure your corner of the Web.
Ambiguity Around CCPA Will Lead to a Slow Start in 2020
But longer term, compliance to California's new privacy law represents an opportunity for companies to increase customer trust and market share.
Former NY Hospital Employee Admits to Stealing Colleagues' Data
Richard Liriano pleads guilty to compromising hospital computers and co-workers' email accounts, as well as stealing personal files and photos.
Mastercard Announces Plan to Purchase RiskRecon
The acquisition is expected to close in the first quarter of 2020.
MORE NEWS & COMMENTARY
HOT TOPICS
Ransomware 'Crisis' in US Schools: More Than 1,000 Hit So Far in 2019
Meanwhile, the mayor of the city of New Orleans says no ransom money demands were made as her city struggles to recover from a major ransomware attack launched last week.

Your First Month as a CISO: Forming an Information Security Program
It's easy to get overwhelmed in your new position, but these tips and resources will help you get started.

5 Security Resolutions to Prevent a Ransomware Attack in 2020
Proactively consider tools to detect anomalous behavior, automatically remediate, and segment threats from moving across the network.

MORE
EDITORS' CHOICE

7 Tips to Keep Your Family Safe Online Over the Holidays
Security experts offer key cyber advice for family members.
How a Password-Free World Could Have Prevented the Biggest Breaches of 2019
If history has taught us anything, it's that hackers can (and will) compromise passwords. Innovation in authentication technology is poised to change that in the coming year.
FROM THE EDGE

SIM Swapping Attacks: What They Are & How to Stop Them
Fraudsters with social engineering skills are hijacking cell phone SIM cards to access victims' bitcoin and social media accounts.
Someone's Been Very Naughty ...
Cybercriminals expose Santa's naughty list -- names and reasons -- on the Internet. "Ho, ho, ho! God, what a mess!" exclaims a source who requested anonymity.
Should I Have a Security Travel Policy to Protect Devices and Sensitive Data?
Mobile devices are lost or hacked while in transit far too frequently. Here are some steps to protect your business.
Tech Resources
ACCESS TECH LIBRARY NOW

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By Dark Reading
Informa Tech
303 Second St., Suite 900 South Tower, San Francisco, CA 94107
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.