Follow Dark Reading:
 August 20, 2020
LATEST SECURITY NEWS & COMMENTARY
Reported Breach Count for H1 2020 Lowest in Five Years
While reported breach numbers are down, a handful of "mega" breaches resulted in more data records being exposed than ever before, analysis shows.
Newly Patched Alexa Flaws a Red Flag for Home Workers
Alexa could serve as an entry point to home and corporate networks. Security experts point to the need for manufacturers to work closely with enterprise security teams to spot and shut down IoT device flaws.
New 'Duri' Campaign Uses HTML Smuggling to Deliver Malware
Researchers who detected the attack explain what businesses should know about the HTML smuggling technique.
7 Ways to Keep Your Remote Workforce Safe
These tips will help you chart a course for a security strategy that just may become part of the normal way organizations will function over the next several years.
Fuzzing Services Help Push Technology into DevOps Pipeline
As part of a continuous testing approach, fuzzing has evolved to provide in-depth code checks for unknown vulnerabilities before deployment.
Four Ways to Mitigate Supply Chain Security Risks From Ripple20
Enterprises can significantly alleviate current and long-standing third-party risk by using tactical and strategic efforts to assess and manage them.
The IT Backbone of Cybercrime
Like their counterparts who run legitimate businesses, cybercriminals need hosting and cybersecurity protection, too.
MORE NEWS & COMMENTARY
HOT TOPICS
Research Casts Doubt on Value of Threat Intel Feeds
Two commercial threat intelligence services and four open source feeds rarely provide the same information, raising questions about how security teams should gauge their utility.

Ransomware Attack on Carnival May Have Been Its Second Compromise This Year
Security vendor Prevailion says it observed signs of malicious activity on the cruise operator's network between at least February and June.

Security Jobs With a Future -- And Ones on the Way Out

Some titles are hot, while others are not, amid rapidly shifting business priorities.

MORE
EDITORS' CHOICE

10 Resume and Interview Tips from Security Pros
Experts from the DEF CON Career Hacking Village explain how job seekers can build a resume and rock an interview.
Why Quality & Security Both Matter in Software
It's time to position quality and security as equals under the metric of software integrity.
NEW FROM THE EDGE

How to Stay Secure on GitHub
GitHub, used badly, can be a source of more vulnerabilities than successful collaborations. Here are ways to keep your development team from getting burned on GitHub.
Should I Segment my IoT Devices Onto Their Own Networks?
Understanding the criticality and importance of the device determines the level of segmentation.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Emerging Security Threats Your Enterprise Should Be Aware Of

    Are you aware of the newest - and most damaging - vulnerabilities that have been discovered or are active in the wild now? In this webinar, experts discuss some of the most dangerous emerging threats, and what you can do ...

  • Cyber Attack Evasion Techniques

    When it comes to evasion techniques there's a perpetual cat and mouse game between malware developers and solutions providers. By drawing on the latest in evasion techniques, malware developers not only go undetected on the compromised machine but more importantly, ...

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Weekly
-- Published By Dark Reading
Informa Tech
303 Second St., Suite 900 South Tower, San Francisco, CA 94107
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Weekly Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.