Follow Dark Reading:
 March 12, 2020
LATEST SECURITY NEWS & COMMENTARY
How Microsoft Disabled Legacy Authentication Across the Company
The process was not smooth or straightforward, employees say in a discussion of challenges and lessons learned during the multi-year project.
COVID-19 Drives Rush to Remote Work. Is Your Security Team Ready?
A rapid transition to remote work puts pressure on security teams to understand and address a wave of potential security risks.
Over 80% of Medical Imaging Devices Run on Outdated Operating Systems
New data on live Internet of Things devices in healthcare and other organizations shines a light on security risks.
7 Cloud Attack Techniques You Should Worry About
Security pros detail the common and concerning ways attackers target enterprise cloud environments.
Attackers Distributing Malware Under Guise of Security Certificate Updates
Approach is a twist to the old method of using fake software, browser updates, Kaspersky says.
Cyber Resiliency, Cloud & the Evolving Role of the Firewall
Today's defenses must be creative in both isolating threats and segmenting environments to prevent attacks. Here's why.
3 Tips to Stay Secure When You Lose an Employee
Whether they leave for a better job or get fired, and whether they mean to cause problems or do so out of ignorance, ex-workers can pose a threat to your company.
MORE NEWS & COMMENTARY
HOT TOPICS
Blacklists Miss 21% of Phishing Attacks, Internet Traffic Reveals
Visibility into phishing attacks by content delivery networks and security firms shows many domains fail to be classified as malicious.

Securing Our Elections Requires Change in Technology, People & Attitudes
Increasing security around our election process and systems will take a big effort from many different parties. Here's how.

New Ransomware Variant Developed Entirely as Shellcode
PwndLocker is harder to detect than other crypto-malware, Crypsis Group says.

MORE
EDITORS' CHOICE

6 Steps CISOs Should Take to Secure Their OT Systems
The first question each new CISO must answer is, "What should I do on Monday morning?" My suggestion: Go back to basics. And these steps will help.
Threat Awareness: A Critical First Step in Detecting Adversaries
One thing seems certain: Attackers are only getting more devious and lethal. Expect to see more advanced attacks.
NEW FROM THE EDGE

Keys to Hiring Cybersecurity Pros When Certification Can't Help
There just aren't enough certified cybersecurity pros to go around -- and there likely never will be enough. So how do you fill out your cybersecurity team? Executives and hiring managers share their top tips on recognizing solid candidates.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Zero-Trust In Practice

    In this webinar, learn what zero-trust really looks like in practice, how to overcome challenges along the way, what security benefits you'll realize right away, and how your organization can take the first steps toward implementing a zero-trust model.

  • Shaking Off Security Alert Fatigue: Tips for Taking Control

    Adding new security tools to your SOC toolset may help alert you to the newest cyber threats to your business. However, when a zillion unprioritized alerts hit you in a day, you might start treating them like whack-a-mole or the ...

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Weekly
-- Published By Dark Reading
Informa Tech
303 Second St., Suite 900 South Tower, San Francisco, CA 94107
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Weekly Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.