Follow Dark Reading:
 March 12, 2020
LATEST SECURITY NEWS & COMMENTARY
COVID-19 Drives Rush to Remote Work. Is Your Security Team Ready?
A rapid transition to remote work puts pressure on security teams to understand and address a wave of potential security risks.
Microsoft Discloses New Remote Execution Flaw in SMBv3
A patch for the flaw is not yet available, but there are no known exploits -- so far.
Ransomware Increasingly Targeting Small Governments
To get back up and running quickly, and because it's cheaper, city and county governments often pay the ransom, especially if insurance companies are footing the bill. The result: More ransomware.
Blacklists Miss 21% of Phishing Attacks, Internet Traffic Reveals
Visibility into phishing attacks by content delivery networks and security firms shows many domains fail to be classified as malicious.
How the Rise of IoT Is Changing the CISO Role
Prepare for the future by adopting a risk-based approach. Following these five steps can help.
Why CSP Isn't Enough to Stop Magecart-Like Attacks
As Magecart and formjacking attacks become more sophisticated, it's essential to address not only what services may interact with users, but what that interaction looks like and how to control it.
Cyberspace Solarium Commission Slams US Cybersecurity Readiness
The federal commission outlined more than 60 recommendations to remedy major security problems.
Gender Equality in Cybersecurity Could Drive Economic Boost
If the number of women in cybersecurity equaled the number of men, the US would see an economic gain up to $30.4 billion, research shows.
MORE NEWS & COMMENTARY
HOT TOPICS
Over 80% of Medical Imaging Devices Run on Outdated Operating Systems
New data on live Internet of Things devices in healthcare and other organizations shines a light on security risks.

How Network Metadata Can Transform Compromise Assessment
Listen more closely and your network's metadata will surrender insights the bad guys counted on keeping secret

How Microsoft Disabled Legacy Authentication Across the Company
The process was not smooth or straightforward, employees say in a discussion of challenges and lessons learned during the multi-year project.

MORE
EDITORS' CHOICE

7 Cloud Attack Techniques You Should Worry About
Security pros detail the common and concerning ways attackers target enterprise cloud environments.
3 Tips to Stay Secure When You Lose an Employee
Whether they leave for a better job or get fired, and whether they mean to cause problems or do so out of ignorance, ex-workers can pose a threat to your company.
NEW FROM THE EDGE

Keys to Hiring Cybersecurity Pros When Certification Can't Help
There just aren't enough certified cybersecurity pros to go around -- and there likely never will be enough. So how do you fill out your cybersecurity team? Executives and hiring managers share their top tips on recognizing solid candidates.
I Want to Work in Industrial IoT Security. What Lingo Do I Need to Know?
Should you happen to be in a meeting with an ICS vendor, here are some terms you will need to know so as to not be laughed out of the room.
Tech Resources
ACCESS TECH LIBRARY NOW

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By Dark Reading
Informa Tech
303 Second St., Suite 900 South Tower, San Francisco, CA 94107
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.