Follow Dark Reading:
 September 28, 2020
LATEST SECURITY NEWS & COMMENTARY
6 Things to Know About the Microsoft 'Zerologon' Flaw
Until all domain controllers are updated, the entire infrastructure remains vulnerable, the DHS' CISA warns.
Navigating the Asia-Pacific Threat Landscape: Experts Dive In
At next week's virtual Black Hat Asia, threat intelligence pros will discuss the threats local organizations should prioritize and how they can prepare.
Getting Over the Security-to-Business Communication Gap in DevSecOps
Application security in a DevOps world takes more than great teamwork among security, developers, and operations staff.
WannaCry Has IoT in Its Crosshairs
The wide variety of devices attached to the Internet of Things offers a rich target for purveyors of ransomware.
COVID-19: Latest Security News & Commentary
Check out Dark Reading's updated, exclusive news and commentary surrounding the coronavirus pandemic.
MORE NEWS & COMMENTARY
HOT TOPICS
New Google Search Hacks Push Viruses & Porn
Three incidents demonstrate how cybercriminals leverage the scourge of black-hat search engine optimization to manipulate search results.

Remote Work Exacerbating Data Sprawl
More than three-quarters of IT executives worry that data sprawl puts their data at risk, especially with employees working from insecure home networks, survey finds.

6 Things to Know About the Microsoft 'Zerologon' Flaw
Until all domain controllers are updated, the entire infrastructure remains vulnerable, the DHS' CISA warns.

MORE
EDITORS' CHOICE

12 Bare-Minimum Benchmarks for AppSec Initiatives
The newly published Building Security in Maturity Model provides the software security basics organizations should cover to keep up with their peers.
7 Non-Technical Skills Threat Analysts Should Master to Keep Their Jobs
It's not just technical expertise and certifications that enable analysts to build long-term careers in cybersecurity.
NEW FROM THE EDGE

RASP 101: Staying Safe With Runtime Application Self-Protection
The dream of RASP is to empower applications to protect themselves. How close do current implementations get to living the dream? Here's what to know.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Automating Security Functions in Your Enterprise

    A shortage of skilled IT security professionals has given rise to a whole new class of technology and practices designed to automate repetitive and time-consuming tasks in security operations. But which tasks can enterprises safely automate? In this webinar, top ...

  • Quantifying the Benefits of a DevOps Strategy

    Digital transformation is no longer an option for most enterprises with leaders rapidly adopting DevOps practices for software delivery and security practices worldwide. While most recognize the value that DevOps can bring to the organization, quantifying the tangible benefits and ...

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By Dark Reading
Informa Tech
303 Second St., Suite 900 South Tower, San Francisco, CA 94107
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.