Follow Dark Reading:
 January 07, 2021
LATEST SECURITY NEWS & COMMENTARY
Healthcare Organizations Bear the Brunt of Cyberattacks Amid Pandemic
In the past two months alone, attacks against the sector soared 45% - more than double the rate of other sectors, Check Point says.
Nissan Source Code Leaked via Misconfigured Git Server
Leaked information includes source code of Nissan mobile apps, diagnostics tool, and market research tools and data, among other assets.
DoJ's Microsoft 365 Email Accounts Compromised in SolarWinds Attacks
Three percent of email accounts were breached, the Department of Justice reports.
How to Protect Your Organization's Digital Footprint
As the digital risk landscape evolves and grows, organizations must stay vigilant against online threats.
MORE NEWS & COMMENTARY
HOT TOPICS
Microsoft Source Code Exposed: What We Know & What It Means
Microsoft says there is no increase in security risk; however, experts say access to source code could make some steps easier for attackers.

T-Mobile Hacked -- Again
The wireless carrier has suffered a data breach for the fourth time since 2018.

COVID-19's Acceleration of Cloud Migration & Identity-Centric Security
Here are some tips for updating access control methods that accommodate new remote working norms without sacrificing security.

MORE
EDITORS' CHOICE

6 Open Source Tools for Your Security Team
Open source tools can be great additions to your cloud security arsenal. Here are a half-dozen to get you started.
What You Need to Know About California's New Privacy Rules
Proposition 24 will change Californians' rights and business's responsibilities regarding consumer data protection.
LATEST FROM THE EDGE

Friction Affliction: How to Balance Security With User Experience
There's a fine line between protecting against suspicious, malicious, or unwanted activity and making users jump through hoops to prove themselves.
Tech Resources
ACCESS TECH LIBRARY NOW

  • 5 Steps to Solving Modern Scalability Problems

    Attend this webinar to learn how distributed data models can keep up with today's data columns and offer other benefits like resiliency, tunability, enhanced security and faster performance, how you can simplify microservices management and improve scalability, and why cloud-native ...

  • A Radical Approach to Threat Intel Management

    What's the point of collecting tactical information that your team can't act on or map to what's happening in your environment? As a security leader, you need more from your cyber threat intelligence program.

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By Dark Reading
Informa Tech
303 Second St., Suite 900 South Tower, San Francisco, CA 94107
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.