Follow Dark Reading:
 February 27, 2021
LATEST SECURITY NEWS & COMMENTARY
Security + Fraud Protection: Your One-Two Punch Against Cyberattacks
When siloed functions unite in the face of cyberthreats, organizations can continue, uninterrupted, along their paths to digital transformation.
Securing Super Bowl LV
A peek at open XDR technology, and defense that held up better than the Kansas City Chiefs.
Former CISA Director Chris Krebs Discusses Risk Management & Threat Intel
Also on Krebs' radar: the cyber-response to COVID-19 and intelligence-sharing between private and public sectors.
Cartoon Caption Winner: Be Careful Who You Trust
And the winner of The Edge's February cartoon caption contest is ...

Breach Etiquette: How to Mind Your Manners When It Matters

Panic-stricken as you may be in the face of a cyberattack, keeping calm and, perhaps most importantly, responding appropriately are critical to limiting the damage.


The Edge Pro Tip: Fasten Your Seatbelts
An unprecedented 2020 has shaken up security leaders' usual list of must-have technologies for 2021. Where do they plan to spend next?
'Nerd' Humor
Some jokes never get old.
MORE NEWS & COMMENTARY
HOT TOPICS

Unemployment Fraud: As If Being Out of Work Wasn't Bad Enough

With the pandemic as a backdrop, cybercriminals have recognized an unprecedented opportunity to steer billions of dollars in unemployment claims into the own accounts.

Fighting Fileless Malware, Part 3: Mitigations

Attackers can dodge the countermeasures you employ against fileless malware. So how do you mitigate the damage?

After a Year of Quantum Advances, the Time to Protect Is Now
Innovations in quantum computing mean enterprise and manufacturing organizations need to start planning now to defend against new types of cybersecurity threats.

MORE
EDITORS' CHOICE

10 Ways Device Identifiers Can Spot a Cybercriminal

Device IDs, which are assigned to mobile devices to distinguish one from another, can help organizations flag fraud, cyberattacks, and other suspicious activities.


What Can Your Connected Car Reveal About You?
App developers must take responsibility for the security of users' data.
FROM THE NEWS DESK

Microsoft Releases Free Tool for Hunting SolarWinds Malware
Meanwhile, researchers at SecurityScorecard say the "fileless" malware loader in the attack - Teardrop - actually dates back to 2017.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Key technology trends in 2021 - Making these technologies work for your business

    The focus of this webinar, taking place on March 04 at 02:00 PM Singapore Time, is to identify some of the key technology trends that will further mature and innovate in 2021, and what potential challenges these will bring to application developers and ...

  • Hybrid Cloud: The Great Balancing Act

    Attend this webinar and you'll gain insight into why companies consider implementing a hybrid cloud strategy and the considerations for making such a decision, how hybrid cloud is different from multi-cloud platforms and how they can work together, and strategies ...

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By Dark Reading
Informa Tech
303 Second St., Suite 900 South Tower, San Francisco, CA 94107
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.