Follow Dark Reading:
 January 30, 2020
LATEST SECURITY NEWS & COMMENTARY
Aftermath of a Major ICS Hacking Contest
Pwn2Own Miami could help spur more research on and attention to the security of industrial control system products, experts say.
'Understand What You Believe': Fmr. FBI Agent Unpacks Information Threats
In the past few years, social media has transformed from a communications gold mine to a minefield of disinformation campaigns.
Inside the Check Point Research Team's Investigation Process
The team sheds light on how their organization works and what they're watching in the threat landscape.
Threat Hunting Is Not for Everyone
Threat hunting is a sophisticated, advanced technique that should be reserved for specific instances and be conducted only by trained professionals.
Greater Focus on Privacy Pays Off for Firms
Privacy-mature companies complete sales more quickly, have fewer and less serious breaches, and recover from incidents faster, according to Cisco's annual survey.
The Annoying MacOS Threat That Won't Go Away
In two years, the adware-dropping Shlayer Trojan has spread to infect one in 10 MacOS systems, Kaspersky says.
CCPA: Cut From the Same Cloth as PCI DSS
Finally, some good news about CCPA: If you've built your security infrastructure to PCI DSS standards, you may be already covered by California's new data protection rules
MORE NEWS & COMMENTARY
HOT TOPICS
Ryuk Ransomware Hit Multiple Oil & Gas Facilities, ICS Security Expert Says
Attackers 'weaponized' Active Directory to spread the ransomware.

5 Resume Basics for a Budding Cybersecurity Career
You'll need to add resume tactician to your skill set in order to climb up the next rung on the security job ladder. Here's how.

How to Get the Most Out of Your Security Metrics
There's an art to reporting security metrics so that they speak the language of leadership and connect the data from tools to business objectives.

MORE
EDITORS' CHOICE

9 Things Application Security Champions Need to Succeed
Common elements to highly effective security champion programs that take DevSecOps to the next level.
Why Companies Should Care about Data Privacy Day
Marking yesterday's 14th anniversary of Europe's first data protection day reminds us how far we still have to go.
NEW FROM THE EDGE

7 Steps to IoT Security in 2020
There are important steps security teams should take to be ready for the evolving security threats to the IoT in 2020.
How Do I Get My Team Started with Container Security and Kubernetes?
The trick is to give your technical staff enough time to learn the new technology but also keep the pressure on to deliver. Here's a smart way to begin.
Tech Resources
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Weekly
-- Published By Dark Reading
Informa Tech
303 Second St., Suite 900 South Tower, San Francisco, CA 94107
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Weekly Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.