Follow Dark Reading:
 September 12, 2020
LATEST SECURITY NEWS & COMMENTARY
3 Secure Moments: A Tranquil Trio of Security Haiku
Placid poems to quiet the infosec pros harried mind. (Or placid, by infosec standards.)
Think You're Spending Enough on Security?
While the amount will vary from organization to organization, here are four ways for everyone to evaluate whether they're allocating the right amount of money and resources.
Next-Gen Firewalls 101: Not Just a Buzzword
In a rare twist, "next-gen" isn't just marketing-speak when it comes to next-gen firewalls, which function differently than traditional gear and may enable you to replace a variety of devices.
How Cybercriminals Take the Fun Out of Gaming
It's all fun and games until someone loses their V-Bucks, right? Here's how cyberattackers are cheating the gaming biz -- and winning big.
Our Diversity Program Isn't Working. What Are We Doing Wrong?
Assuming that you're truly stuck, here are some things to consider.
Chart: Does Lack of Diversity Impact the Skills Shortage?
Yes, according to 21% of security pros who participated in the 2020 Black Hat Attendee Survey.
Name That Toon: Mask Out
Feeling creative? Submit your caption in the comments, and our panel of experts will reward the winner with a $25 Amazon gift card.
Gone in a Flash
Behold, the pitfalls of portable hardware.
MORE NEWS & COMMENTARY
HOT TOPICS
Legality of Security Research to be Decided in US Supreme Court Case
A ruling that a police officer's personal use of a law enforcement database is "hacking" has security researchers worried for the future.

VPNs: The Cyber Elephant in the Room
While virtual private networks once boosted security, their current design doesn't fulfill the evolving requirements of today's modern enterprise.

Meet the Middlemen Who Connect Cybercriminals With Victims
An analysis of initial access brokers explains how they break into vulnerable organizations and sell their access for up to $10,000.

MORE
EDITORS' CHOICE

6 Lessons IT Security Can Learn From DevOps
DevOps has taken over enterprise software development. The discipline has lessons for IT security -- here are a quick half-dozen.
Spear-Phishers Leverage Office 365 Ecosystem to Validate Stolen Creds in Real Time
New attack technique uses Office 365 APIs to cross-check credentials against Azure Active Directory as victim types them in.
COVID-19: Latest Security News & Commentary
Check out Dark Reading's updated, exclusive news and commentary surrounding the coronavirus pandemic.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Network Security: The Attacker's Point of View

    Over the years, IT organizations have approached network security from an enterprise point of view, establishing a perimeter of known devices and defending it with firewalls and security gateways. But today's online attackers often bypass these defenses, entering the network ...

  • Securing Active Directory the Way it Deserves

    In this webinar, experts will explain the latest Active Directory-related threats and help you get your new or legacy AD in order so you're prepared for them.

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By Dark Reading
Informa Tech
303 Second St., Suite 900 South Tower, San Francisco, CA 94107
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.