Follow Dark Reading:
 December 12, 2020
LATEST SECURITY NEWS & COMMENTARY
'Tis the Season to Confront Third-Party Risk
On any given day it's hard to ensure that outside companies and individuals adhere to an organization's security practices and policies. But when it's the holidays and, oh, a global pandemic, companies need to be extra vigilant.
10 Ways Device Identifiers Can Spot a Cybercriminal
Device IDs, which are assigned to mobile devices to distinguish one from another, can help organizations flag fraud, cyberattacks, and other suspicious activities.
51% of Edge Readers Plan to Pursue New Cybersecurity Certification in 2021
Demands of the "new normal" won't stop the majority of poll-takers from mastering new skills.
Chart: Cyberthreats Follow Workers Home
The COVID-19 crisis has raised the level of cyber-risk significantly over previous Dark Reading Strategic Security surveys.
Name That Toon: Winter Forecast
Feeling creative? Submit your caption in the comments, and our panel of experts will reward the winner with a $25 Amazon gift card.
The Magic Behind the Magic
And oldie but goodie and still pretty truey.
MORE NEWS & COMMENTARY
HOT TOPICS

How Ransomware Defense Is Evolving With Ransomware Attacks

As data exfiltration threats and bigger ransom requests become the norm, security professionals are advancing from the basic "keep good backups" advice.

9 New Tactics to Spread Security Awareness

Employees are often your first line of security defense when the bad guys come calling -- providing your workers are properly trained. Security leaders share how they're raising awareness.

An Inside Look at an Account Takeover

AI threat find: Phishing attack slips through email gateway and leads to large-scale compromise.

MORE
EDITORS' CHOICE

BECs and EACs: What's the Difference?
Email accounts are common targets for attack. Understanding how attack types differ is critical for successful defense.
Poll: Endpoint Agita
What are your most significant endpoint security concerns?
FROM THE NEWS DESK

Phishing Campaign Targets 200M Microsoft 365 Accounts
A well-organized email spoofing campaign has been seen targeting financial services, insurance, healthcare, manufacturing, utilities, and telecom.
Open Source Developers Still Not Interested in Secure Coding
Security and development are still two different worlds, with open source developers resistant to spending time finding and fixing vulnerabilities.
Tech Resources
ACCESS TECH LIBRARY NOW

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By Dark Reading
Informa Tech
303 Second St., Suite 900 South Tower, San Francisco, CA 94107
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.