Follow Dark Reading:
 September 28, 2019
LATEST SECURITY NEWS & COMMENTARY
Why Clouds Keep Leaking Data
Most devastating cloud data leaks are caused by the same kinds of common cloud security challenges and configuration errors. Here's what you need to know.

Privacy & IoT Etiquette, from the Emily Post Institute

Is it rude to request 'please turn off your Alexa'? Let's ask the family who's written the book on etiquette for nearly 100 years.


The Beginner's Guide to Denial-of-Service Attacks: A Breakdown of Shutdowns
DoS attacks come in many varieties (not just DDoS). This simple set of descriptions will help you understand how they're different - and why each and every one is bad.
'Playing Around' with Code Keeps Security, DevOps Skills Sharp
A project intended to move a small robot around a hazardous board teaches some solid security lessons.

Ask the Expert: How Can I Ensure Cyber Insurers Will Pay My Claim

Jeff Wichman, practice director, enterprise incident management, at Optiv, answers a reader's question: If I experience a breach or other security incident, how will the cyber insurance company be likely to weasel out of paying my claim?


Edge Poll: Get Smart!

We know you keep your organization at the cutting edge, but what about you personally? On a scale of 1 to 5, how "smart" is your home? Is it "dumb as a rock," "wicked smart" or somewhere in between. Cast your vote and learn how you stack up against your security peers .


Cloud Insight ... and Stuff
All fluff, all the time.
FROM THE NEWS DESK

Cybersecurity Certification in the Spotlight Again
Swiss technology non-profit group joins others, such as the Obama-era President's Commission, in recommending that certain classes of technology products be tested.
DoorDash Breach Affects 4.9M Merchants, Customers, Workers
The May 4 incident exposed data belonging to users on the platform on or before April 5, 2018.
MORE NEWS & COMMENTARY
HOT TOPICS
7 Ways VPNs Can Turn from Ally to Threat
VPNs are critical pieces of the security infrastructure, but they can be vulnerable, hackable, and weaponized against you. Here are seven things to be aware of before you ignore your VPN.

Metasploit Creator HD Moore's Latest Hack: IT Assets
Moore has built a network asset discovery tool that wasn't intended to be a pure security tool, but it addresses a glaring security problem.

Ransomware Strikes 49 School Districts & Colleges in 2019
The education sector has seen 10 new victims in the past nine days alone, underscoring a consistent trend throughout 2019.

MORE
EDITORS' CHOICE

5 Updates from PCI SSC That You Need to Know
As payment technologies evolve, so do the requirements for securing cardholder data.
Bridging the Gap Between Security & DevOps
An inside look into the engineering mindset of DevOps from the vantage of a career security professional.
Tech Resources
ACCESS TECH LIBRARY NOW

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.