Follow Dark Reading:
 February 24, 2020
LATEST SECURITY NEWS & COMMENTARY
7 Tips to Improve Your Employees' Mobile Security
Security experts discuss the threats putting mobile devices at risk and how businesses can better defend against them.
All About SASE: What It Is, Why It's Here, How to Use It
Secure Access Service Edge is a new name for a known and growing architecture designed to strengthen security in cloud environments.
Olympics Could Face Disruption from Regional Powers
Destructive attacks and disinformation will likely target the Summer Olympics in Tokyo, two groups of threat experts say.
Security Now Merges With Dark Reading
Readers of Security Now will join the Dark Reading community, gaining access to a wide range of cybersecurity content.
How to Get CISOs & Boards on the Same Page
These two groups have talked past each other for years, each hobbled by their own tunnel vision and misperceptions.
Emotet Malware Rears Its Ugly Head Again
A resurgence in Emotet malware may make it one of the most pervasive security threats of 2020.
NRC Health Ransomware Attack Prompts Patient Data Concerns
The organization, which sells patient administration tools to hospitals, could not confirm whether patient data was accessed.
California Man Arrested for Politically Motivated DDoS
The distributed denial-of-service attacks took a congressional candidate's website offline for a total of 21 hours during the campaign for office.
MORE NEWS & COMMENTARY
HOT TOPICS
Dell Sells RSA to Private Equity Firm for $2.1B
Deal with private equity entity Symphony Technology Group revealed one week before the security industry's RSA Conference in San Francisco.

44% of Security Threats Start in the Cloud
Amazon Web Services is a top source of cyberattacks, responsible for 94% of all Web attacks originating in the public cloud.

The Trouble with Free and Open Source Software
Insecure developer accounts, legacy software, and nonstandard naming schemes are major problems, Linux Foundation and Harvard study concludes.

MORE
EDITORS' CHOICE

5 Strategies to Secure Cloud Operations Against Today's Cyber Threats
With these fundamentals in mind, organizations can reduce their security and compliance risks as they reap the cloud's many benefits:
8 Things Users Do That Make Security Pros Miserable
When a user interacts with an enterprise system, the result can be productivity or disaster. Here are eight opportunities for the disaster side to win out over the productive.
NEW FROM THE EDGE

10 Tough Questions CEOs Are Asking CISOs
CEOs today are prepared with better questions than 'Are we secure,' and chief information security officers had better be ready to answer.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Shaking Off Security Alert Fatigue: Tips for Taking Control

    Adding new security tools to your SOC toolset may help alert you to the newest cyber threats to your business. However, when a zillion unprioritized alerts hit you in a day, you might start treating them like whack-a-mole or the ...

  • Preventing Credential Theft & Account Takeovers

    In this webinar, you'll learn where your credentials are most vulnerable to compromise, get a guide through the anatomy of an account takeover attack, and discover tools and techniques to harden your defenses against credential theft and account takeovers.

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By Dark Reading
Informa Tech
303 Second St., Suite 900 South Tower, San Francisco, CA 94107
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.