Follow Dark Reading:
 February 01, 2020
LATEST SECURITY NEWS & COMMENTARY
AppSec Concerns Drove 61% of Businesses to Change Applications
According to new Dark Reading research, some respondents have even left behind commercial off-the-shelf software and migrated to open-source or in-house homegrown applications. Click image to read more.
7 Steps to IoT Security in 2020
There are important steps security teams should take to be ready for the evolving security threats to the IoT in 2020.

With International Tensions Flaring, Cyber-Risk Is Heating Up for All Businesses

Risks of nation-state attacks go beyond Iran, and the need for awareness and security don't stop at any national border.


Mega Breaches Are Forcing Us to a Passwordless World. Are We Finally Ready?

Passwordless authentication advocates see 2020 as a potential turning point year for the technology. But can the industry get off the dime?


Name That Toon: Private (Button) Eye
Feeling creative? Submit your caption in the comments, and our panel of experts will reward the winner with a $25 Amazon gift card.
ASK THE EXPERT

How Do I Get My Team Started with Container Security and Kubernetes?
The trick is to give your technical staff enough time to learn the new technology but also keep the pressure on to deliver. Here's a smart way to begin.
I'm an SMB. What Should I Watch for When Choosing Security Vendors?
SMBs need action, not just insight.
MORE NEWS & COMMENTARY
HOT TOPICS
Ryuk Ransomware Hit Multiple Oil & Gas Facilities, ICS Security Expert Says
Attackers 'weaponized' Active Directory to spread the ransomware.

Two Vulnerabilities Found in Microsoft Azure Infrastructure
Researchers detail the process of finding two flaws in the Azure Stack architecture and Azure App Service, both of which have been patched.

5 Resume Basics for a Budding Cybersecurity Career
You'll need to add resume tactician to your skill set in order to climb up the next rung on the security job ladder. Here's how.

MORE
EDITORS' CHOICE

9 Things Application Security Champions Need to Succeed
Common elements to highly effective security champion programs that take DevSecOps to the next level.
Threat Hunting Is Not for Everyone
Threat hunting is a sophisticated, advanced technique that should be reserved for specific instances and be conducted only by trained professionals.
FROM THE NEWS DESK

Ashley Madison Breach Returns with Extortion Campaign
The recent attack messages use new techniques to extort Bitcoin payments from Ashley Madison users hit in massive 2015 data breach.
Tech Resources
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By Dark Reading
Informa Tech
303 Second St., Suite 900 South Tower, San Francisco, CA 94107
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.