Follow Dark Reading:
 November 14, 2019
LATEST SECURITY NEWS & COMMENTARY
While CISOs Fret, Business Leaders Tout Security Robustness
A new Nominet survey shows a familiar disconnect between business and security teams on the matter of cyber preparedness.
The Ripple Effect of Data Breaches: How Damage Spreads
The financial loss from so-called 'ripple events' is thirteen times greater than the cost of single-party security incidents.
Bugcrowd Pays Out Over $500K in Bounties in One Week
In all, bug hunters from around the world submitted over 6,500 vulnerabilities in October alone.
Researchers Find New Approach to Attacking Cloud Infrastructure
Cloud APIs' accessibility over the Internet opens a new window for adversaries to gain highly privileged access to cloud assets.
Twitter & Trend Micro Fall Victim to Malicious Insiders
The companies are the latest on a long and growing list of organizations that have fallen victim to users with legitimate access to enterprise systems and data.
To Prove Cybersecurity's Worth, Create a Cyber Balance Sheet
How tying and measuring security investments to business impacts can elevate executives' understanding and commitment to cyber-risk reduction.
9 Principles to Simplify Security
This isn't a one-size-fits-all situation. Simplify as much as you can, as the saying goes, but no more than that.
Why Cyber-Risk Is a C-Suite Issue
Organizations realize the scale of cyber-risk but lack counter-actions to build resilience.
MORE NEWS & COMMENTARY
HOT TOPICS
Find New Talent, Don't Fight Over CISSPs: Insights from (ISC)2 COO
The skills gap will only be closed by attracting and retaining new talent. So don't limit your talent search to CISSPs, says the COO of the organization that issues the CISSP certification.

Ring Flaw Underscores Impact of IoT Vulnerabilities
A vulnerability in Amazon's Ring doorbell cameras would have allowed a local attacker to gain access to a target's entire wireless network.

SHAKEN/STIR: Finally! A Solution to Caller ID Spoofing?
The ubiquitous Caller ID hasn't changed much over the years, but the technology to exploit it has exploded. That may be about to change.

MORE
EDITORS' CHOICE

6 Small-Business Password Managers
The right password manager can help bring enterprise-class security to small businesses. Here are a half-dozen candidates to strengthen your access management.

Name That Toon: Endpoint Protection

We provide the cartoon. You write the caption. Enter to win a $25 Amazon gift card.


NEW FROM THE EDGE

Account Fraud Harder to Detect as Criminals Move from Bots to 'Sweat Shops'
Cheap labor, frequent data breaches, and better fraud detection technology are fueling frustrating changes in attackers' methods.
Well, Hello, Dolly!
Eight hours is certainly a start.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Cloud Sprawl: It's Worse Than You Think

    Learn how to get complete visibility into your cloud infrastructure with the Expanse Internet Operations Management Platform and reduce your cloud attack surface.

  • Forecast Calls for 'EPYC' Innovation and Discovery

    In this webinar, we'll discuss how new technology can help you harness AI, machine and deep learning with high performance computing (HPC). HPC is helping make the impossible possible such as transforming the treatment of diseases, cutting storm predictions in ...

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Weekly
-- Published By Dark Reading
Informa Tech
303 Second St., Suite 900 South Tower, San Francisco, CA 94107
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Weekly Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.