Follow Dark Reading:
 October 03, 2019
LATEST SECURITY NEWS & COMMENTARY
Cybersecurity Certification in the Spotlight Again
Swiss technology non-profit group joins others, such as the Obama-era President's Commission, in recommending that certain classes of technology products be tested.
Cisco Webex & Zoom Bug Lets Attackers Spy on Conference Calls
The "Prying-Eye" vulnerability could let intruders scan for unprotected meeting IDs and snoop on conference calls.
New Silent Starling Attack Group Puts Spin on BEC
The West African cybergang has successfully infiltrated more than 500 companies using a tactic dubbed 'vendor email compromise.'
Cloud Vulnerability Could Let One Server Compromise Thousands
A flaw in the OnApp cloud management platform could let an attacker compromise a private cloud with access to a single server.
Bridging the Gap Between Security & DevOps
An inside look into the engineering mindset of DevOps from the vantage of a career security professional.
AIOps: The State of Full Packet Capture Enters the Age of Practicality
How machine learning and artificial intelligence are changing the game of acting on large volumes of network data in near real time.
Google's 'Password Checkup' Tool Tells You When Passwords Are Leaked
The feature will check the strength of saved passwords and alert users when they're compromised in a breach.
MORE NEWS & COMMENTARY
HOT TOPICS
Why You Need to Think About API Security
Businesses of all sorts are increasingly relying on APIs to interact with customers in smartphone apps, but they have their own unique set of vulnerabilities.

The Etiquette of Respecting Privacy in the Age of IoT
Is it rude to ask someone to shut off their Alexa? Ask the family who's written the book on etiquette for nearly 100 years - the descendants of Emily Post herself.

5 Disruptive Trends Transforming Cybersecurity
Everything about IT has changed, but our security measures are still built around how we used to design software and systems. Where does security need to catch up with digital transformation - and how?

MORE
EDITORS' CHOICE

8 Microsegmentation Pitfalls to Avoid
Don't fall victim to these common mistakes on the path to developing better security boundaries and limiting the blast radius of security incidents.
'Harvesting Attacks' & the Quantum Revolution
Stockpiles of stolen information sitting in foreign databases are ready to be exposed the minute there's a working quantum computer in five to ten years. The time to act is now.
NEW FROM THE EDGE

How the City of Angels Is Tackling Cyber Devilry
A new mobile app makes a cybersecurity threat lab available to more small businesses in Los Angeles.
Cartoon Contest: Second Wind
Feeling creative? Submit your caption in the comments, and our panel of experts will reward the winner with a $25 Amazon gift card.
Tech Resources
ACCESS TECH LIBRARY NOW

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Weekly
-- Published By Dark Reading
Informa Tech
303 Second St., Suite 900 South Tower, San Francisco, CA 94107
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Weekly Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.