Follow Dark Reading:
 April 24, 2021
LATEST SECURITY NEWS & COMMENTARY
7 Old IT Things Every New InfoSec Pro Should Know
Beneath all those containers and IoT devices, there's a rich patchwork of gear, protocols, and guidelines that have been holding it together since before you were born. Knowledge of those fundamentals is growing more valuable, not less.
Window Snyder Launches Startup to Fill IoT Security Gaps
Thistle Technologies aims to help connected device manufacturers securely deliver updates to their products.
Tell Us the Truth: Why Do You LOVE Passwords?
There must be something you appreciate about the humble password, right? Tell us what you think.
Looking for Greater Security Culture? Ask an 8-Bit Plumber
After 40 years of navigating catastrophes, video game character Mario can help us with a more intelligent approach to DevOps and improving security culture.
The Edge Pro Tip: Brush Up on Web Shells
While neither new nor novel, Web shells are making an impact with a surge of Exchange attacks.
Who's Your Login?
If only Abbott and Costello were around today.
MORE NEWS & COMMENTARY
HOT TOPICS
How to Create an Incident Response Plan From the Ground Up
Security 101: In the wake of an incident, it's important to cover all your bases -- and treat your IR plan as a constantly evolving work in progress.

The CISO Life Is Half as Good
Lora Vaughn was at a crossroads -- and that was before mandated pandemic lockdowns came into play. Here's her story of how life got sweeter after she stepped away from the CISO job.

How to Build a Resilient IoT Framework

For all of their benefits, IoT devices weren't built with security in mind -- and that can pose huge challenges.

MORE
EDITORS' CHOICE

10 Free Security Tools at Black Hat Asia 2021
Researchers are set to demonstrate a plethora of tools for conducting pen tests, vulnerability assessments, data forensics, and a wide range of other use cases.
Edge Poll: Passwordless Plans
How long do you think it will be before your organization gets rid of passwords?
FROM THE NEWS DESK

Supernova Malware Actors Masqueraded as Remote Workers to Access Breached Network
China-based Spiral group is believed to be behind year-long attack, which exploited a flaw in SolarWinds Orion technology to drop a Web shell.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Making XDR Work in Your Enterprise - Dark Reading

    In this Dark Reading webinar, experts discuss the real-life implementation issues surrounding emerging detection and response technologies. You'll learn how these emerging technologies can be integrated with your existing cybersecurity tools, and how XDR technology might affect your cybersecurity operations ...

  • Keys to Better Cyber Risk Assessment

    At this Dark Reading webinar, learn about the costs associated with today's threats and data breaches, how to measure current threats, and how to quantify the risks to your organization, so that you can implement the tools and processes to ...

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By Dark Reading
Informa Tech
303 Second St., Suite 900 South Tower, San Francisco, CA 94107
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.