Follow Dark Reading:
 March 10, 2020
LATEST SECURITY NEWS & COMMENTARY
How Microsoft Disabled Legacy Authentication Across the Company
The process was not smooth or straightforward, employees say in a discussion of challenges and lessons learned during the multi-year project.
New Ransomware Variant Developed Entirely as Shellcode
PwndLocker is harder to detect than other crypto-malware, Crypsis Group says.
Cyber Resiliency, Cloud & the Evolving Role of the Firewall
Today's defenses must be creative in both isolating threats and segmenting environments to prevent attacks. Here's why.
Malware Campaign Feeds on Coronavirus Fears
A new malware campaign that offers a "coronavirus map" delivers a well-known data-stealer.
WatchGuard Buys Panda Security for Endpoint Security Tech
In the long term, Panda Security's technologies will be integrated into the WatchGuard platform.
Threat Awareness: A Critical First Step in Detecting Adversaries
One thing seems certain: Attackers are only getting more devious and lethal. Expect to see more advanced attacks.
MORE NEWS & COMMENTARY
HOT TOPICS
Siemens Shares Incident Response Playbook for Energy Infrastructure
The playbook simulates a cyberattack on the energy industry to educate regulators, utilities, and IT and OT security experts.

6 Steps CISOs Should Take to Secure Their OT Systems
The first question each new CISO must answer is, "What should I do on Monday morning?" My suggestion: Go back to basics. And these steps will help.

Why Threat Intelligence Gathering Can Be a Legal Minefield
In new guidance, the Department of Justice says security researchers and organizations run real risks when gathering threat intelligence or dealing with criminals in underground online marketplaces.

MORE
EDITORS' CHOICE

7 Cloud Attack Techniques You Should Worry About
Security pros detail the common and concerning ways attackers target enterprise cloud environments.
Securing Our Elections Requires Change in Technology, People & Attitudes
Increasing security around our election process and systems will take a big effort from many different parties. Here's how.
NEW FROM THE EDGE

Keys to Hiring Cybersecurity Pros When Certification Can't Help
There just aren't enough certified cybersecurity pros to go around -- and there likely never will be enough. So how do you fill out your cybersecurity team? Executives and hiring managers share their top tips on recognizing solid candidates.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Zero-Trust In Practice

    In this webinar, learn what zero-trust really looks like in practice, how to overcome challenges along the way, what security benefits you'll realize right away, and how your organization can take the first steps toward implementing a zero-trust model.

  • Shaking Off Security Alert Fatigue: Tips for Taking Control

    Adding new security tools to your SOC toolset may help alert you to the newest cyber threats to your business. However, when a zillion unprioritized alerts hit you in a day, you might start treating them like whack-a-mole or the ...

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By Dark Reading
Informa Tech
303 Second St., Suite 900 South Tower, San Francisco, CA 94107
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.