Follow Dark Reading:
 May 16, 2020
LATEST SECURITY NEWS & COMMENTARY
Biometrics in the Great Beyond
A thumbprint may be a good authentication factor for the living, but are you prepared to access mission-critical data and devices after an employee's death?
The Entertainment Biz Is Changing, But the Cybersecurity Script Is One We've Read Before
Several A-list celebrities have found themselves at the center of a ransomware attack -- and it's certainly not the first time hackers have gone after them or the entertainment industry. What are security pros doing wrong?
8 Supply Chain Security Requirements
Complex supply chains have complex security requirements, but secure them you must. Here's where to start.

Name That Toon: The Lights Are On ...

April showers bring – a May cartoon caption contest! Submit your caption for John Klossner's latest cartoon, and our editors will reward the winner with a $25 Amazon gift card.


MORE NEWS & COMMENTARY
HOT TOPICS
Companies Struggle for Effective Cybersecurity
The money companies are spending on cybersecurity tools doesn't necessarily result in better security, a new survey shows.

6 Free Cybersecurity Training and Awareness Courses
Most are designed to help organizations address teleworking risks related to COVID-19 scams.

Rule of Thumb: USB Killers Pose Real Threat
They look just like a USB thumb drive, but instead of storing data, they can be used to destroy it and the device the data is saved on.

MORE
EDITORS' CHOICE

COVID-19: Latest Security News & Commentary
Check out Dark Reading's updated, exclusive news and commentary surrounding the coronavirus pandemic.
Cyber Subterfuge and Curious Sharks Threaten the World's Subsea Fiber-Optic Cables
Malware, spies, and hackers, plus erosion and sharks, pose huge risks to the fiber optics that transmit almost all the world's data.
FROM THE DARK READING NEWS DESK

Data Breaches Declined in Q1 2020 Over Q1 2019 -- Or Did They?
Numbers are down, but that may only be because organizations have been too busy fighting COVID-19-related cyberthreats to notice compromises, Risk Based Security says.
How Unconventional Professional Backgrounds Can Strengthen a Cybersecurity Team
Getting over the cybersecurity skills gap takes creativity, flexibility, and a willingness to go "off-script" when it comes to picking out candidates.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Building & Managing the Next-Gen SOC

    In this webinar, experts offer insight and recommendations on how to build a next-generation SOC, and what tools and skills you may need to outfit that SOC to respond to today's most current threats and online exploits.

  • Shifting Security from Speedbump to Digital Accelerator

    When you attend this webinar, you will learn about three practices that can help your businesses balance security and agility, without compromise.

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By Dark Reading
Informa Tech
303 Second St., Suite 900 South Tower, San Francisco, CA 94107
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.