Follow Dark Reading:
 October 21, 2019
LATEST SECURITY NEWS & COMMENTARY
In A Crowded Endpoint Security Market, Consolidation Is Underway
Experts examine the drivers pushing today's endpoint security market to consolidate as its many players compete to meet organizations' changing demands and transition to the cloud.
CenturyLink Customer Data Exposed
Customer names, addresses, email addresses, and phone numbers were left open on a MongoDB server for 10 months, researchers report.
Tor Weaponized to Steal Bitcoin
A years-long campaign targets users of Russian darknet markets with a modified install of a privacy-oriented browser.
SOC Puppet: Dark Reading Caption Contest Winners
Social engineering, SOC analysts, and Sock puns. And the winners are:
MORE NEWS & COMMENTARY
HOT TOPICS
7 SMB Security Tips That Will Keep Your Company Safe
With National Cybersecurity Awareness Month as a backdrop, industry leaders weigh in on how SMBs can more effectively protect themselves from cyberattacks.

Debug Feature in Web Dev Tool Exposed Trump Campaign Site, Others to Attack
The problem is not with the tool itself but with how some developers and administrators are using it, Comparitech says.

Cozy Bear Emerges from Hibernation to Hack EU Ministries
The cyber-espionage group, linked to Russia and blamed for hacking the Democratic National Committee in 2016, has been using covert communications and other techniques to escape detection for at least two years.

5 Steps to Protect Against Ransomware Attacks
Paying a ransom is strongly discouraged by experts. So, how do you protect your organization?

MORE
EDITOR'S CHOICE

VIRTUAL EVENT: Strategies For Protecting Mission-Critical Data

This free, all-day online conference, Wednesday, Nov 6 at 11 AM, offers a look at the latest tools, strategies, and best practices for protecting your organization’s most sensitive data.


State of SMB Insecurity by the Numbers
SMBs still perceive themselves at low risk from cyberthreats - in spite of attack statistics that paint a different picture.
NEW FROM THE EDGE

Glitching: The Hardware Attack that can Disrupt Secure Software
Glitching (or fault-injection) attacks aren't easy (yet). But get ready, because as the IoT grows, these attacks will be a big reason that hardware security should be part of your cybersecurity planning.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Building a Security Culture

    In this webinar, learn the elements of a security culture, how to build one at your organization, and how to know it's working.

  • Protecting Your Org's Most Critical Data 101

    If you'd like to know more about the latest strategies for data defense - especially strategies for protecting your most essential information -- this Dark Reading virtual event is for you.

MORE WEBINARS
FEATURED REPORTS
  • [Interop ITX 2017] State Of DevOps Report

    The DevOps movement brings application development and infrastructure operations together to increase efficiency and deploy applications more quickly. But embracing DevOps means making significant cultural, organizational, and technological changes. This research report will examine how and why IT organizations are ...

  • [Secure Application Development] New Best Practices

    The transition from DevOps to SecDevOps is combining with the move toward cloud computing to create new challenges - and new opportunities - for the information security team. Download this report, to learn about the new best practices for secure ...

MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By Dark Reading
Informa Tech
303 Second St., Suite 900 South Tower, San Francisco, CA 94107
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.