Follow Dark Reading:
 January 30, 2021
LATEST SECURITY NEWS & COMMENTARY
FBI Encounters: Reporting an Insider Security Incident to the Feds
Most insider incidents don't get reported to the FBI due to fear of debilitating business disruptions, public embarrassment, and screeching vans skidding into the parking lot to confiscate servers. But is that reality?
Comparing Different AI Approaches to Email Security
There's a big difference between those that study 'known bads' and those that self-learn what is 'normal' and what isn't.
Learn SAML: The Language You Don't Know You're Already Speaking
Security Assertion Markup Language, a protocol most people use daily to log into applications, makes authentication easier for both admins and users. Here's what you need to know about SAML (and what it has to do with "GoldenSAML").

Building Your Personal Privacy Risk Tolerance Profile

Even on Data Privacy Day, privacy professionals give you permission to admit you actually love targeted ads.


Emotet 101: How the Ransomware Works -- and Why It's So Darn Effective

Emotet has emerged as the most common form of ransomware. Managing the risk involves starts with understanding the way it works.


Cartoon Caption Winner: Before I Go ...
And the winner of The Edge's January cartoon caption contest is ...
MORE NEWS & COMMENTARY
HOT TOPICS

Understanding TCP/IP Stack Vulnerabilities in the IoT

Internet of Things devices are highly susceptible to attacks, breaches, and flaws emanating from issues within the TCP/IP network communications architecture. Here's an overview of what you need to know to mitigate risks.

Many Cybersecurity Job Candidates Are Subpar, While On-the-Job Training Falls Short
With demand for skilled cybersecurity workers so high, is it really surprising that most companies are seeing fewer qualified applicants?

How to Better Secure Your Microsoft 365 Environment
Security experts offer Microsoft 365 security guidance as more attackers target enterprise cloud environments.

MORE
EDITORS' CHOICE

How Cybersecurity Newbs Can Start Out on the Right Foot
Cybersecurity experts share their savvy tips and useful resources for infosec hopefuls.

Hacker Pig Latin: A Base64 Primer for Security Analysts

The Base64 encoding scheme is often used to hide the plaintext elements in the early stages of an attack that can't be concealed under the veil of encryption. Here's how to see through its tricks.


FROM THE NEWS DESK

Intl. Law Enforcement Operation Disrupts Emotet Botnet
Global law enforcement agencies have seized control of Emotet infrastructure, disrupting one of the world's most pervasive and dangerous cyber threats.
Ransomware Disrupts Operations at Packaging Giant WestRock
Incident is another reminder of how vulnerable OT environments are to attack, security experts say.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Optimizing App Performance in the Cloud

    Today's hybrid cloud architectures render traditional application performance troubleshooting and monitoring methods obsolete. Compounding matters, the wide-scale use of microservices and containers, and the adoption of continuous integration (CI) and continuous delivery (CD) principles mean constant change making it increasingly ...

  • Nip Ransomware in the FUD: Detecting Attacks Pre-Encryption

    In this webinar you'll get best practices and methodologies that organizations can use to detect threats, specific examples of actual compromises by ransomware operators, and guidance on how to identify opportunities for detecting malicious behavior during the post-compromise, pre-encryption phase.

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By Dark Reading
Informa Tech
303 Second St., Suite 900 South Tower, San Francisco, CA 94107
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.