Follow Dark Reading:
 November 16, 2019
LATEST SECURITY NEWS & COMMENTARY
8 Backup & Recovery Questions to Ask Yourself
Don't wait until after a disaster, DDoS, or ransomware attack to learn just how good your backups really are.
Account Fraud Harder to Detect as Criminals Move from Bots to 'Sweat Shops'
Cheap labor, frequent data breaches, and better fraud detection technology are fueling frustrating changes in attackers' methods.
4 Ways to Soothe a Stressed-Out Incident Response Team
IR teams are under tremendous pressure, often working long hours and putting their needs aside amid a security crisis. Their care is just as important as policy and procedure.

Is Voting by Mobile App a Better Security Option or Just 'A Bad Idea'?

Security experts say voting by app adds another level of risk, as mobile-voting pilots expand for overseas military and voters with disabilities.


I'm Setting Up a Bug-Bounty Program. What Should I be Thinking About?
Here are some important points to factor into your vulnerability disclosure policy.

Edge Poll: Tough Choices

If you could protect only one category of your organization's data, what would it be?


Poll Results: Smart Enterprises, Dumb Homes

At work, security pros have their fingers on some pretty cutting-edge technology. But are their homes souped up, too?


MORE NEWS & COMMENTARY
HOT TOPICS
SHAKEN/STIR: Finally! A Solution to Caller ID Spoofing?
The ubiquitous Caller ID hasn't changed much over the years, but the technology to exploit it has exploded. That may be about to change.

Ring Flaw Underscores Impact of IoT Vulnerabilities
A vulnerability in Amazon's Ring doorbell cameras would have allowed a local attacker to gain access to a target's entire wireless network.

Researchers Find New Approach to Attacking Cloud Infrastructure
Cloud APIs' accessibility over the Internet opens a new window for adversaries to gain highly privileged access to cloud assets.

MORE
EDITOR'S CHOICE

6 Small-Business Password Managers
The right password manager can help bring enterprise-class security to small businesses. Here are a half-dozen candidates to strengthen your access management.
FROM THE NEWS DESK

Attackers' Costs Increasing as Businesses Focus on Security
Based on penetration tests and vulnerability assessments, attackers' costs to compromise a company's network increases significantly when security is continuously tested, a report finds.
DevSecOps: The Answer to the Cloud Security Skills Gap
There's a skills and resources gap industrywide, but a DevSecOps approach can go a long way toward closing that gap.
Tech Resources
ACCESS TECH LIBRARY NOW

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By Dark Reading
Informa Tech
303 Second St., Suite 900 South Tower, San Francisco, CA 94107
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.