Selling security software might prove easier than selling phones, but can BlackBerry outsmart its competition?
Follow Dark Reading:
 February 12, 2022
LATEST SECURITY NEWS & COMMENTARY
BlackBerry Seeks to Restore Its Past Glory With Services Push
Selling security software might prove easier than selling phones, but can BlackBerry outsmart its competition?
Retailers' Offboarding Procedures Leave Potential Risks
IT teams need to consider unforeseen threats to avoid violating privacy regulations and supplier contracts.
Get Started on Continuous Compliance Ahead of PCI DSS v4.0
Here's what retailers and anyone collecting payments can do to prepare in the time remaining before the final release of PCI DSS 4.0 this quarter.
Bot Marketplaces as a Source of Future Data Breaches
Of the four bot marketplaces Cognyte analyzed, the Russian Market is the most dominant, but the others are all active, updated daily, and well-known, too.
Name That Edge Toon: Head of the Table
Come up with a clever caption, and our panel of experts will reward the winner with a $25 Amazon gift card.
MORE NEWS / MORE COMMENTARY
HOT TOPICS
The 3 Most Common Causes of Data Breaches in 2021
Phishing, smishing, and business email compromise continue to do their dirty work.

The Looming CISO Mental Health Crisis — and What to Do About It, Part 2
Letting mental health issues fester may result in burnout and attrition, which affect both the company and the humans it employs.

If My Organization Is Mostly in the Cloud, Do I Need a Firewall?
A firewall is still a valuable part of the IT security stack, but businesses need to consider all of their attack surfaces.

MORE
EDITORS' CHOICE

7 Red Flags That Can Stop Your Company From Becoming a Unicorn
Investors and venture capitalists share the reasons that make them turn away from investing in your security tech.
FROM THE NEWS DESK

Threat Actors Revive 20-Year-Old Tactic in Microsoft 365 Phishing Attacks
Recent attacks involving so-called "right-to-left override" spoofing aimed at Microsoft 365 users show how attackers sometimes modify and improve old methods to try and stay one step ahead of defenders.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Strategies For Securing Your Supply Chain

    Recent attacks like the zero-day Log4j vulnerability have brought new scrutiny to cyber threats from suppliers and enterprise trading partners. But what does an effective supply-chain security strategy look like? How can you ensure that customers, suppliers, contractors, and ...

  • Best Practices for Extending Identity & Access Management to the Cloud

    Managing and securing user credentials was never easy, and now that they are scattered across cloud platforms, software-as-a-service tools, mobile devices, and on-premises systems, the task has become even more complex. With adversaries increasingly targeting their attention to credential theft, ...

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By Dark Reading
Informa Tech Holdings LLC | Registered in the United States
with number 7418737 | 605 Third Ave., 22nd Floor, New York, New York 10158, USA
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.