The push to embrace Slack, Teams, and Zoom at work comes with new security risks for organizations.
Follow Dark Reading:
 March 03, 2022
LATEST SECURITY NEWS & COMMENTARY
7 Ways to Secure Collaboration Tools in Your Organization
The push to embrace Slack, Teams, and Zoom at work comes with new security risks for organizations.
Companies' Code Leaking More Passwords and Secrets
Software code pushed to online code repositories exposed twice as many secrets compared to last year, putting organizations' security at risk.
Researchers Devise Attack for Stealing Data During Homomorphic Encryption
A vulnerability in a Microsoft crypto library gives attackers a way to figure out what data is being encrypted in lockpicker-like fashion.
3 Ways to Expand Gender Diversity in Cybersecurity
Why this is important: A business that surrounds itself with the same kind of people who work on the same projects will not generate new or original ideas.
Reduce Risk With Better Cyber Due Diligence
Done incorrectly, due diligence can result in slower integration of assets, which increases acquisition costs associated and could reduce expected gains.
MORE NEWS / MORE COMMENTARY
HOT TOPICS
7 Steps to Take Right Now to Prepare for Cyberattacks by Russia
A lot of the recommended preparation involves measures organizations should have in place already.

CISO Checklist for Offboarding Security Staff
The Great Resignation strikes cybersecurity teams, too. Here's a checklist for CISOs to ensure security is retained even when security staff is not.

Open Source Code: The Next Major Wave of Cyberattacks
The ubiquity of open source software presents a significant security risk, as it opens the door for vulnerabilities to be introduced (intentionally or inadvertently) to those who use it.

MORE
EDITORS' CHOICE

Cyberattacks in Ukraine Soon Could Spill Over to Other Countries
Email-borne attacks out of Russia have already targeted at least a few US and European organizations.
LATEST FROM THE EDGE

How Retailers Can Address 'Buy Now, Pay Later' Fraud
As BNPL platforms grow in popularity, experts warn that cybercriminals could target them using synthetic identity fraud and first-party fraud.
LATEST FROM DR TECHNOLOGY

Protecting Field Programmable Gate Arrays From Attacks
FPGAs can be part of physical systems in the aerospace, medical, or industrial fields, so a security compromise can be potentially serious.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Streamlining Your Patch Management Processes

    Patch management is a core element of any security strategy. But patch management is only as effective as the bugs it can identify. Undiscovered vulnerabilities are a massive risk to an organization as bad actors find their way into organizations ...

  • Strategies For Securing Your Supply Chain

    Recent attacks like the zero-day Log4j vulnerability have brought new scrutiny to cyber threats from suppliers and enterprise trading partners. But what does an effective supply-chain security strategy look like? How can you ensure that customers, suppliers, contractors, and ...

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By Dark Reading
Informa Tech Holdings LLC | Registered in the United States
with number 7418737 | 605 Third Ave., 22nd Floor, New York, New York 10158, USA
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.