Follow Dark Reading:
 February 02, 2021
LATEST SECURITY NEWS & COMMENTARY
Interview With a Russian Cybercriminal
A LockBit ransomware operator shared with researchers why he became involved in cybercrime, how he chooses victims, and what's in his toolbox.
Increase in Physical Security Incidents Adds to IT Security Pressures
A new study shows that many organizations have changed their physical security strategies to address new concerns since the COVID-19 outbreak.
US Needs Comprehensive Policy to Combat China on IP Theft
The United States cannot lose sight of Chinese cyber operations that target intellectual property, a panel of experts says.
(Sponsored Article) Nation-States and Their Supply-Chain Attack Strategy
What started as a technique in the cybercriminal underground has become a hallmark of elite-level nation-state hacking groups that have refined it to maximize its impact.
Strengthening Zero-Trust Architecture
Organizations that want to stay ahead of cybercriminals will find that going beyond user trust and device trust is critical for outwitting their adversaries.
Data on 1.4 Million Washington State Residents Breached
Unemployment data exposed via third-party software attack.
Rapid7 Acquires Alcide, Strengthens Focus on Cloud
Its $50 million purchase of Alcide, a Kubernetes security provider, follows its 2020 acquisition of cloud security vendor DivvyCloud.
MORE NEWS & COMMENTARY
HOT TOPICS
Many Cybersecurity Job Candidates Are Subpar, While On-the-Job Training Falls Short
With demand for skilled cybersecurity workers so high, is it really surprising that most companies are seeing fewer qualified applicants?

Is the Web Supply Chain Next in Line for State-Sponsored Attacks?
Attackers go after the weak links first, and the Web supply chain provides an abundance of weak links to target.

Breach Data Highlights a Pivot to Orgs Over Individuals
In 2020, breaches were down by 19%, while the impact of those compromises -- measured in people affected -- fell by nearly two-thirds.

MORE
EDITORS' CHOICE

6 Cybersecurity Start-Up Trends to Track
The pandemic took a bite out of funding deals, but cybersecurity start-ups fared better than many other industries.
Digital Identity Is the New Security Control Plane
Simplifying the management of security systems helps provide consistent protection for the new normal.
LATEST FROM THE EDGE

Name That Edge Toon: Be Careful Who You Trust
Feeling creative? Submit your caption in the comments, and our panel of experts will reward the winner with a $25 Amazon gift card.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Hybrid Cloud: The Great Balancing Act

    Attend this webinar and you'll gain insight into why companies consider implementing a hybrid cloud strategy and the considerations for making such a decision, how hybrid cloud is different from multi-cloud platforms and how they can work together, and strategies ...

  • Nip Ransomware in the FUD: Detecting Attacks Pre-Encryption

    In this webinar you'll get best practices and methodologies that organizations can use to detect threats, specific examples of actual compromises by ransomware operators, and guidance on how to identify opportunities for detecting malicious behavior during the post-compromise, pre-encryption phase.

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By Dark Reading
Informa Tech
303 Second St., Suite 900 South Tower, San Francisco, CA 94107
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.