Follow Dark Reading:
 March 23, 2020
LATEST SECURITY NEWS & COMMENTARY
200M Records of US Citizens Leaked in Unprotected Database
Researchers have not determined who owns the database, which was one of several large exposed instances disclosed this week.
Security Ratings Are a Dangerous Fantasy
They don't predict breaches, and they don't help people make valuable business decisions or make users any safer.
Attack Surface, Vulnerabilities Increase as Orgs Respond to COVID-19 Crisis
In typical fashion, attackers are gearing up to take advantage of the surge in teleworking prompted by the pandemic.
Proof of Concept Released for kr00k Wi-Fi Vulnerability
The code demonstrates a relatively simple method to exploit a vulnerability in more than a billion devices.

We Need Your Help!

Dark Reading is looking for your input about call center, contact center, and unified communications center technology on behalf of one of our clients for an in-depth report. All responses are anonymous and the whole process will take about 10 minutes. All who complete the survey can enter to win one of five $50 Amazon gift cards.


MORE NEWS & COMMENTARY
HOT TOPICS
Privacy in a Pandemic: What You Can (and Can't) Ask Employees
Businesses struggle to strike a balance between workplace health and employees' privacy rights in the midst of a global health emergency.

Security Lessons We've Learned (So Far) from COVID-19
Takeaways about fighting new fires, securely enabling remote workforces, and human nature during difficult times.

7 Cloud Attack Techniques You Should Worry About
Security pros detail the common and concerning ways attackers target enterprise cloud environments.

MORE
EDITORS' CHOICE

What Cybersecurity Pros Really Think About Artificial Intelligence
While there's a ton of unbounded optimism from vendor marketing and consultant types, practitioners are still reserving a lot of judgment.
Dark Reading Cybersecurity Crossword Puzzle
Here's a little something to snuggle up with if you're on lockdown.
NEW FROM THE EDGE

Quantifying Cyber Risk: Why You Must & Where to Start
Quantifying cybersecurity risks can be a critical step in understanding those risks and getting executive support to address them.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Building a Strategy for Detection and Response

    Hear as top industry experts discuss how to create a strategy that enables the enterprise security team to do detection and response across a wide variety of technologies and services.

  • Preventing Credential Theft & Account Takeovers

    In this webinar, you'll learn where your credentials are most vulnerable to compromise, get a guide through the anatomy of an account takeover attack, and discover tools and techniques to harden your defenses against credential theft and account takeovers.

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By Dark Reading
Informa Tech
303 Second St., Suite 900 South Tower, San Francisco, CA 94107
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.