Follow Dark Reading:
 January 30, 2020
LATEST SECURITY NEWS & COMMENTARY
Inside the Check Point Research Team's Investigation Process
The team sheds light on how their organization works and what they're watching in the threat landscape.
Aftermath of a Major ICS Hacking Contest
Pwn2Own Miami could help spur more research on and attention to the security of industrial control system products, experts say.
Number of Botnet Command & Control Servers Soared in 2019
Servers worldwide that were used to control malware-infected systems jumped more than 71% compared to 2018, Spamhaus says.
Businesses Improve Their Data Security, But Privacy - Not So Much
While the California Consumer Privacy Act will force companies to provide a modicum of meaningful privacy, World Privacy Day still mainly celebrates data security.
Why Companies Should Care about Data Privacy Day
Marking yesterday's 14th anniversary of Europe's first data protection day reminds us how far we still have to go.
Securing Containers with Zero Trust
A software identity-based approach should become a standard security measure for protecting workloads in all enterprise networks.
Criminals Hide Malware Behind Grammy-Winning Cover
Songs by Ariana Grande, Taylor Swift, and Post Malone are the most popular places.
Pilfered Wawa Payment Card Data Now for Sale on Dark Web
The Joker's Stash underground marketplace is offering stolen payment card data from Wawa's recently disclosed data breach.
MORE NEWS & COMMENTARY
HOT TOPICS
Ryuk Ransomware Hit Multiple Oil & Gas Facilities, ICS Security Expert Says
Attackers 'weaponized' Active Directory to spread the ransomware.

5 Resume Basics for a Budding Cybersecurity Career
You'll need to add resume tactician to your skill set in order to climb up the next rung on the security job ladder. Here's how.

How to Get the Most Out of Your Security Metrics
There's an art to reporting security metrics so that they speak the language of leadership and connect the data from tools to business objectives.

MORE
EDITORS' CHOICE

9 Things Application Security Champions Need to Succeed
Common elements to highly effective security champion programs that take DevSecOps to the next level.
Threat Hunting Is Not for Everyone
Threat hunting is a sophisticated, advanced technique that should be reserved for specific instances and be conducted only by trained professionals.
NEW FROM THE EDGE

How Do I Get My Team Started with Container Security and Kubernetes?
The trick is to give your technical staff enough time to learn the new technology but also keep the pressure on to deliver. Here's a smart way to begin.
Tech Resources
ACCESS TECH LIBRARY NOW

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By Dark Reading
Informa Tech
303 Second St., Suite 900 South Tower, San Francisco, CA 94107
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.