Follow Dark Reading:
 February 18, 2020
LATEST SECURITY NEWS & COMMENTARY
Firmware Weaknesses Can Turn Computer Subsystems into Trojans
Network cards, video cameras, and graphics adapters are a few of the subsystems whose lack of security could allow attackers to turn them into spy implants.
7 Tax Season Security Tips
Security pros need be on high alert from now until Tax Day on April 15. Here are seven ways to help keep your company safe.
Phishing Campaign Targets Mobile Banking Users
Consumers in dozens of countries were targeted, Lookout says.
Palm Beach Elections Office Hit with Ransomware Pre-2016 Election
Palm Beach County's elections supervisor does not believe the attack is linked to Russian hacking attempts targeting Florida.
DHS Warns of Cyber Heartbreak
Fraudulent dating and relationship apps and websites raise the risks for those seeking online romance on Valentine's Day.
Ovum to Expand Cybersecurity Research Under New Omdia Group
Informa Tech combines Ovum, Heavy Reading, Tractica, and IHS Markit research.
The 5 Love Languages of Cybersecurity
When it comes to building buy-in from the business, all cybersecurity needs is love -- especially when it comes to communication.
MORE NEWS & COMMENTARY
HOT TOPICS
Coronavirus Raises New Business Continuity, Phishing Challenges for InfoSec
What happens when understaffed security teams at home and abroad are sequestered in physical quarantine zones?

5 Common Errors That Allow Attackers to Go Undetected
Make these mistakes and invaders might linger in your systems for years.

Stop Defending Everything
Instead, try prioritizing with the aid of a thorough asset inventory.

MORE
EDITORS' CHOICE

6 Factors That Raise The Stakes For IoT Security
Developments that exacerbate the risk and complicate making Internet of Things devices more secure.
Small Business Security: 5 Tips on How and Where to Start
There is no one-size-fits-all strategy for security, but a robust plan and the implementation of new technologies will help you and your IT team sleep better.
NEW FROM THE EDGE

Martin and Dorothie Hellman on Love, Crypto & Saving the World
Martin Hellman, co-creator of the Diffie-Hellman key exchange, and his wife of 53 years, Dorothie, talk about the current state of cryptography and what making peace at home taught them about making peace on Earth.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Zero-Trust In Practice

    In this webinar, learn what zero-trust really looks like in practice, how to overcome challenges along the way, what security benefits you'll realize right away, and how your organization can take the first steps toward implementing a zero-trust model.

  • 5 Steps to Integrate SAST into the DevSecOps Pipeline

    Join us as we walk you through the challenges and benefits of integrating a SAST tool into your DevSecOps pipeline and how we've helped other organizations with this process.

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By Dark Reading
Informa Tech
303 Second St., Suite 900 South Tower, San Francisco, CA 94107
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.