As BNPL platforms grow in popularity, experts warn that cybercriminals could target them using synthetic identity fraud and first-party fraud.
Follow Dark Reading:
 March 05, 2022
LATEST SECURITY NEWS & COMMENTARY
How Retailers Can Address 'Buy Now, Pay Later' Fraud
As BNPL platforms grow in popularity, experts warn that cybercriminals could target them using synthetic identity fraud and first-party fraud.
What Do I Need to Know for SaaS Security?
Most importantly, someone needs to step forward and take it on as their job.
CISO Checklist for Offboarding Security Staff
The Great Resignation strikes cybersecurity teams, too. Here's a checklist for CISOs to ensure security is retained even when security staff is not.
MORE NEWS / MORE COMMENTARY
HOT TOPICS
Top 5 Interview Questions to Ask DevOps Candidates in 2022
It's worthwhile to find candidates who have experience with models that embed security into their processes.

How Instituting a 'Just Culture' Improves Security
Rather than focusing on blame, the framework identifies the root cause of failure and then takes steps to fix it.

Why Developers Should Care About Log4j
Unless you can gain full visibility into how data flows to and through your dependencies, you can’t be sure if you are affected by this vulnerability.

MORE
EDITORS' CHOICE

7 Red Flags That Can Stop Your Company From Becoming a Unicorn
Investors and venture capitalists share the reasons that make them turn away from investing in your security tech.
FROM THE NEWS DESK

Cyberattacks in Ukraine Soon Could Spill Over to Other Countries
Email-borne attacks out of Russia have already targeted at least a few US and European organizations.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Making Deception a Part of Your Enterprise Defense Strategy

    Most enterprise defenses focus on preventing attackers from getting in. But what if you could distract and trick attackers by making them think they are advancing their attack-and then mislead them? In this webinar, experts discuss emerging tools and strategies ...

  • Streamlining Your Patch Management Processes

    Patch management is a core element of any security strategy. But patch management is only as effective as the bugs it can identify. Undiscovered vulnerabilities are a massive risk to an organization as bad actors find their way into organizations ...

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By Dark Reading
Informa Tech Holdings LLC | Registered in the United States
with number 7418737 | 605 Third Ave., 22nd Floor, New York, New York 10158, USA
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.