Follow Dark Reading:
 October 28, 2020
LATEST SECURITY NEWS & COMMENTARY
Chinese Attackers' Favorite Flaws Prove Global Threats, Research Shows
Following the NSA's list of 25 security flaws often weaponized by Chinese attackers, researchers evaluated how they're used around the world.
Survey Uncovers High Level of Concern Over Firewalls
More than half of respondents are planning to reduce their network firewall footprint because of what they see as limitations in the technology.
Developers' Approach to App Testing Could Cut Flaw Fix Times by 80 Days
An analysis of more than 130,000 active applications found more with at least one high-severity flaw compared with 2019.
5 Human Factors That Affect Secure Software Development
With the move to remote work, it's especially important to understand how to support, discourage, and monitor conditions for development teams.
MITRE Shield Matrix Highlights Deception & Concealment Technology
The role that these technologies play in the MITRE Shield matrix is a clear indicator that they are an essential part of today's security landscape.
Employees Aware of Emailed Threats Open Suspicious Messages
A survey of 1,000 employees finds 96% of employees are aware of digital threats, but 45% click emails they consider to be suspicious.
Akamai Acquires Asavie
Asavie's mobile, IoT, and security products and services will become part of the Akamai Security and Personalization Services product line.
COVID-19: Latest Security News & Commentary
Check out Dark Reading's updated, exclusive news and commentary surrounding the coronavirus pandemic.
MORE NEWS & COMMENTARY
HOT TOPICS
7 Tips for Choosing Security Metrics That Matter
Experts weigh in on picking metrics that demonstrate how the security team is handling operational efficiency and reducing risk.

How AI Will Supercharge Spear-Phishing
To keep pace with intelligent, unpredictable threats, cybersecurity will have to adopt an intelligent security of its own.

Are You One COVID-19 Test Away From a Cybersecurity Disaster?
One cybersecurity failure can result in a successful ransomware attack or data breach that could cause tremendous damage. There's no need to panic, but neither is there time to ignore the issue.

MORE
EDITORS' CHOICE

The Story of McAfee: How the Security Giant Arrived at a Second IPO
Industry watchers explore the story of McAfee, from its founding in 1987, to its spinoff from Intel, to how it's keeping up with competitors.
Microsoft's Kubernetes Threat Matrix: Here's What's Missing
With a fuller picture of the Kubernetes threat matrix, security teams can begin to implement mitigation strategies to protect their cluster from threats.
NEW FROM THE EDGE

Poll: Always Learning
Cybersecurity certifications remain as popular as ever. Any interest in expanding your skill set?
Tech Resources
ACCESS TECH LIBRARY NOW

  • Profile of an Online Attack

    In this Dark Reading Virtual Event keynote session, a top pen tester will describe the many methods used to discover and exploit vulnerabilities in an enterprise’s computing environment.

  • Business Continuity with Contact Tracing

    In this webinar, examine the industry's leading contact tracing solution and its ecosystems; share contact tracing use cases in real- life, such as proximity tracing, hot-zone alerting, and journey mapping.

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By Dark Reading
Informa Tech
303 Second St., Suite 900 South Tower, San Francisco, CA 94107
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.