Follow Dark Reading:
 March 06, 2020
LATEST SECURITY NEWS & COMMENTARY
Attackers Distributing Malware Under Guise of Security Certificate Updates
Approach is a twist to the old method of using fake software, browser updates, Kaspersky says.
Search Engine Aims to Make Dark Markets More Accessible
Two years after the administrator of the Grams search engine shuttered the service, another search engine for finding questionable and illegal goods on the Dark Web has opened up shop.
6 Steps CISOs Should Take to Secure Their OT Systems
The first question each new CISO must answer is, "What should I do on Monday morning?" My suggestion: Go back to basics. And these steps will help.
Advanced Tech Needs More Ethical Consideration & Security
Unintended consequences and risks need board-level attention and action.
Researchers Find 670+ Microsoft Subdomains Vulnerable to Takeover
The now-fixed flaw could have enabled attackers to trick users into downloading malicious content or sharing credentials.
3 Data Breaches Disclosed This Week: J.Crew, T-Mobile, and Carnival
The separate incidents show how data theft knows no market-based limits.
MORE NEWS & COMMENTARY
HOT TOPICS
How Security Leaders at Starbucks and Microsoft Prepare for Breaches
Executives discuss the security incidents they're most worried about and the steps they take to prepare for them.

CISOs Who Want a Seat at the DevOps Table Better Bring Value
Here are four ways to make inroads with the DevOps team -- before it's too late.

NSS Labs Revises Endpoint Security Test Model
New product ratings system comes amid growing shift in the testing market toward more "open and transparent" evaluation of security tools.



MORE
EDITORS' CHOICE

6 Truths About Disinformation Campaigns
Disinformation goes far beyond just influencing election outcomes. Here's what security pros need to know.
The Cybercrime Pandemic Keeps Spreading
The World Economic Forum says cyberattacks will be one of the top global business risks over the next 10 years.
NEW FROM THE EDGE

The Perfect Travel Security Policy for a Globe-Trotting Laptop
There are many challenges to safely carrying data and equipment on international travels, but the right policy can make navigating the challenges easier and more successful.
Poll: Strengthening Security ... by Easing Security?
If security measures were made easier for end users, would your organization be more secure?
Tech Resources
ACCESS TECH LIBRARY NOW

  • Zero-Trust In Practice

    In this webinar, learn what zero-trust really looks like in practice, how to overcome challenges along the way, what security benefits you'll realize right away, and how your organization can take the first steps toward implementing a zero-trust model.

  • Shifting Security from Speedbump to Digital Accelerator

    When you attend this webinar, you will learn about three practices that can help your businesses balance security and agility, without compromise.

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By Dark Reading
Informa Tech
303 Second St., Suite 900 South Tower, San Francisco, CA 94107
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.