Follow Dark Reading:
 October 23, 2019
LATEST SECURITY NEWS & COMMENTARY
About 50% of Apps Are Accruing Unaddressed Vulnerabilities
In rush to fix newly discovered security issues, developers are neglecting to address older ones, Veracode study finds.
Alliance Forms to Focus on Securing Operational Technology
While mainly made up of vendors, the Operational Technology Cyber Security Alliance aims to offer security best practices for infrastructure operators and industrial partners.
FIDO-Based Authentication Arrives for Smartwatches
The Nok Nok App SDK for Smart Watch is designed to let businesses implement FIDO-based authentication on smartwatches.
Bugcrowd Enters the IT Asset Discovery Business
New service searches for errant or vulnerable devices on the Internet.
The AI (R)evolution: Why Humans Will Always Have a Place in the SOC
In cybersecurity, the combination of men, women and machines can do what neither can do alone -- form a complementary team capable of upholding order and fighting the forces of evil.
Keeping Too Many Cooks out of the Security Kitchen
A good security team helps the business help itself operate more securely -- soliciting input while adhering to a unified strategy, vision, goals, and priorities.
NordVPN Breached Via Data Center Provider's Error
The VPN company said that one of its 3,000 servers in a third-party data center was open to exploitation through a misconfigured management tool.
Autoclerk Database Spills 179GB of Customer, US Government Data
An open Elasticsearch database exposed hundreds of thousands of hotel booking reservations, compromising data from full names to room numbers.
MORE NEWS & COMMENTARY
HOT TOPICS
14 Hot Cybersecurity Certifications Right Now
In an industry where certifications can make or break a job candidacy, which ones have security pros been going after in 2019?

How to Build a Rock-Solid Cybersecurity Culture
In part one of this two-part series, we start with the basics - getting everyone to understand what's at stake - and then look at lessons from the trenches.

Glitching: The Hardware Attack That Can Disrupt Secure Software
Glitching (or fault-injection) attacks aren't easy (yet). But get ready, because as the IoT grows, these attacks will be a big reason that hardware security should be part of your cybersecurity planning.

MORE
EDITORS' CHOICE

State of SMB Insecurity by the Numbers
SMBs still perceive themselves at low risk from cyberthreats - in spite of attack statistics that paint a different picture.
Schadenfreude Is a Bad Look & Other Observations About Recent Disclosures
The debate about whether Android or iOS is the more inherently secure platform misses the larger issues that both platforms are valuable targets and security today is no guarantee of security tomorrow.
NEW FROM THE EDGE

Surviving Security Alert Fatigue: 7 Tools and Techniques
Experts discuss why security teams are increasingly overwhelmed with alerts and share tactics for lightening the load.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Building a Security Culture

    In this webinar, learn the elements of a security culture, how to build one at your organization, and how to know it's working.

  • Protecting Your Org's Most Critical Data 101

    If you'd like to know more about the latest strategies for data defense - especially strategies for protecting your most essential information -- this Dark Reading virtual event is for you.

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By Dark Reading
Informa Tech
303 Second St., Suite 900 South Tower, San Francisco, CA 94107
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.