Follow Dark Reading:
 April 01, 2021
LATEST SECURITY NEWS & COMMENTARY
83% of Businesses Hit With a Firmware Attack in Past Two Years
A new Microsoft-commissioned report finds less than 30% of organizations allocate security budget toward preventing firmware attacks.
Top 5 Attack Techniques May Be Easier to Detect Than You Think
New analysis shows attackers for the most part are continuing to rely on the same techniques and tactics they have been using for years.
What's So Great About XDR?
XDR is a significant advance in threat detection and response technology, but few enterprises understand why. Omdia identifies four catalysts driving the emergence of XDR.
Advice From Security Experts: How to Approach Security in the New Normal
Here are the biggest lessons they've learned after a year of work from home, and how they advise their counterparts at organizations to proceed as a result of those lessons.
3 Ways Vendors Can Inspire Customer Trust Amid Breaches
As customers rely more on cloud storage and remote workforces, the probability of a breach increases.
Google Updates on Campaign Targeting Security Researchers
Attackers linked to North Korea began to target security researchers on social media earlier this year.
College Students Targeted in Newest IRS Scam
The Internal Revenue Service warns of fraudulent emails sent to .edu addresses.
MORE NEWS & COMMENTARY
HOT TOPICS
Manufacturing Firms Learn Cybersecurity the Hard Way
Although 61% of smart factories have experienced a cybersecurity incident, IT groups and operational technology groups still don't collaborate enough on security.

Beyond MITRE ATT&CK: The Case for a New Cyber Kill Chain
The Cyber Kill Chain and MITRE ATT&CK are popular reference frameworks to analyze breaches, but amid the rise of XDR, we may need a new one.

SolarWinds Experimenting With New Software Build System in Wake of Breach
CISO of SolarWinds now has complete autonomy to stop product releases if security concerns exist, CEO says.

MORE
EDITORS' CHOICE

5 Ways Social Engineers Crack Into Human Beings
These common human traits are the basic ingredients in the con-man's recipe for trickery.
Data Protection Is a Group Effort
When every employee is well-versed in customer data privacy principles, the DPO knows the enterprise's sensitive data is in good hands.
LATEST FROM THE EDGE

A Day in the Life of a DevSecOps Manager
"Most days are good days," says Rally Health's Ari Kalfus. But they sure are busy, he tells The Edge.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Understanding XDR - April 8 FREE Webinar

    In this webinar, experts discuss the benefits and limitations of EDR, and offer recommendations on how to extend these capabilities to other parts of the IT infrastructure in order to improve overall security.

  • Detecting & Mitigating Attacks on Remote Workers

    In this webinar, experts discuss some of the cyber attacks that have been made on work-from-home end users, as well as exploits against remote systems and devices.

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By Dark Reading
Informa Tech
303 Second St., Suite 900 South Tower, San Francisco, CA 94107
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.