Follow Dark Reading:
 March 27, 2021
LATEST SECURITY NEWS & COMMENTARY
A Day in the Life of a DevSecOps Manager
"Most days are good days," says Rally Health's Ari Kalfus. But they sure are busy, he tells The Edge.
In Secure Silicon We Trust
Building upon a hardware root of trust is becoming a more achievable goal for the masses and the roots are digging deeper. Here's what you need to know.
3 Classes of Account Fraud That Can Cost Your Company Big Time
Understanding each one can go a long way toward demystifying the topic as a whole - and combatting the threat.
6 Tips for Limiting Damage From Third-Party Attacks
The ability to protect your organization from third-party attacks will become increasingly critical as attackers try to maximize the effectiveness of their malicious campaigns.
Prioritizing Application & API Security After the COVID Cloud Rush
As companies hit the gas to accommodate the rapid shift to work-from-home, security fell behind. Now, it's time to close those gaps.
Cartoon Caption Winner: In Hot Water
And the winner of The Edge's March cartoon caption contest is ...
The Edge Pro Tip: The Feds Are Your Friends
Here's what to expect when you report an insider incident to the FBI.
MORE NEWS & COMMENTARY
HOT TOPICS

Contemplating the Coffee Supply Chain: A Horror Story

On the bean-to-cup journey, dangers await around every corner. Here, well-caffeinated security experts warn the coffee industry about the threats.

Inside the Web Shell Used in the Microsoft Exchange Server Attacks
The history and details of China Chopper - a Web shell commonly seen in the widespread Microsoft Exchange Server attacks.

Fighting Fileless Malware, Part 3: Mitigations

Attackers can dodge the countermeasures you employ against fileless malware. So how do you mitigate the damage?

MORE
EDITORS' CHOICE

DDoS's Evolution Doesn't Require a Security Evolution

They may have grown in sophistication, with more widespread consequences, yet today's distributed denial-of-service attacks can still be fought with conventional tools.


Edge Poll: XDR Plans
How likely is your organization to adopt XDR technology?
FROM THE NEWS DESK

Researchers Discover Two Dozen Malicious Chrome Extensions
Extensions are being used to serve up unwanted adds, steal data, and divert users to malicious sites, Cato Networks says.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Understanding XDR - April 8 FREE Webinar

    In this webinar, experts discuss the benefits and limitations of EDR, and offer recommendations on how to extend these capabilities to other parts of the IT infrastructure in order to improve overall security.

  • Detecting & Mitigating Attacks on Remote Workers

    In this webinar, experts discuss some of the cyber attacks that have been made on work-from-home end users, as well as exploits against remote systems and devices.

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By Dark Reading
Informa Tech
303 Second St., Suite 900 South Tower, San Francisco, CA 94107
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.