Follow Dark Reading:
 December 05, 2020
LATEST SECURITY NEWS & COMMENTARY
Loyal Employee ... or Cybercriminal Accomplice?
Can the bad guys' insider recruitment methods be reverse-engineered to reveal potential insider threats? Let's take a look.
BECs and EACs: What's the Difference?
Email accounts are common targets for attack. Understanding how attack types differ is critical for successful defense.
SASE 101: Why All the Buzz?
Wide area networking and network security services unite to provide secure, cloud-based connectivity for enterprises' remote employees -- and these days that means billions of workers.
5 Signs Someone Might be Taking Advantage of Your Security Goodness
Not everyone in a security department is acting in good faith, and they'll do what they can to bypass those who do. Here's how to spot them.

Poll: Always Learning

Cybersecurity certifications remain as popular as ever. Any interest in expanding your skill set?


MORE NEWS & COMMENTARY
HOT TOPICS
Free Mobile App Measures Your Personal Cyber Risk
New app for Android and Apple iOS uses an algorithm co-developed with MIT to gauge security posture on an ongoing basis.

Why I'd Take Good IT Hygiene Over Security's Latest Silver Bullet
Bells and whistles are great, but you can stay safer by focusing on correct configurations, posture management, visibility, and patching.

An Inside Look at an Account Takeover

AI threat find: Phishing attack slips through email gateway and leads to large-scale compromise.

MORE
EDITORS' CHOICE

How Ransomware Defense Is Evolving With Ransomware Attacks
As data exfiltration threats and bigger ransom requests become the norm, security professionals are advancing from the basic "keep good backups" advice.
FROM THE NEWS DESK

Malicious or Vulnerable Docker Images Widespread, Firm Says
A dynamic analysis of the publicly available images on Docker Hub found that 51% had critical vulnerabilities and about 6,500 of the 4 million latest images could be considered malicious.
Potential Nation-State Actor Targets COVID-19 Vaccine Supply Chain
Companies involved in technologies for keeping vaccines cold enough for safe storage and transportation are being targeted in a sophisticated spear-phishing campaign, IBM says.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Data Protection 101 - 12/10 @ 11am EST

    This virtual event spotlights expert insights for ensuring that data is available and secured wherever and whenever a business needs it most--whether in the cloud, across corporate endpoints, or on unmanaged devices--and that its policies align with a fast-changing regulatory ...

  • Succeeding With Secure Access Service Edge (SASE)

    With the emergence of the Secure Access Service Edge (SASE), network and security professionals are struggling to build a migration plan for this new platform that adapts to the distributed nature of users and data. SASE promises to reduce complexity ...

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By Dark Reading
Informa Tech
303 Second St., Suite 900 South Tower, San Francisco, CA 94107
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.