Follow Dark Reading:
 April 02, 2021
LATEST SECURITY NEWS & COMMENTARY
Enterprises Remain Riddled With Overprivileged Users -- and Attackers Know It
Attackers commonly focus on finding users with too much privileged access as their ticket to network compromise. What can companies do?
Solving the Leadership Buy-In Impasse With Data
Justify your requirements with real numbers to get support for security investments.
The Role of Visibility in Securing Cloud Applications
Traditional data center approaches aren't built for securing modern cloud applications.
Kansas Man Indicted for Hacking, Tampering With Water Utility System
Attacker disabled water-purification operation systems "with intention of harming" the rural water district.
NIST Publishes Guide for Securing Hotel Property Management Systems
These sensitive systems store guests' personal data and payment-card information.
MORE NEWS & COMMENTARY
HOT TOPICS
Beyond MITRE ATT&CK: The Case for a New Cyber Kill Chain
The Cyber Kill Chain and MITRE ATT&CK are popular reference frameworks to analyze breaches, but amid the rise of XDR, we may need a new one.

4 Open Source Tools to Add to Your Security Arsenal
Open source solutions can offer an accessible and powerful way to enhance your security-testing capabilities.

I 'Hacked' My Accounts Using My Mobile Number: Here's What I Learned

A feature that's supposed to make your account more secure -- adding a cellphone number -- has become a vector of attack in SIM-swapping incidents. Here's how it's done and how you can protect yourself.

MORE
EDITORS' CHOICE

7 Security Strategies as Employees Return to the Office
More sooner than later, employees will be making their way back to the office. Here's how security pros can plan for the next new normal.
Watch Out for These Cyber-Risks
It's difficult to predict what will materialize in the months ahead in terms of cyber-risks, which is why it's wise to review your organization's security posture now.
LATEST FROM THE EDGE

How to Build a Resilient IoT Framework
For all of their benefits, IoT devices weren't built with security in mind -- and that can pose huge challenges.
Tech Resources
ACCESS TECH LIBRARY NOW

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By Dark Reading
Informa Tech
303 Second St., Suite 900 South Tower, San Francisco, CA 94107
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.