Follow Dark Reading:
 September 15, 2020
LATEST SECURITY NEWS & COMMENTARY
Large Cloud Providers Much Less Likely Than Enterprises to Get Breached
Pen-test results also show a majority of organizations have few protections against attackers already on the network.
Security Through an Economics Lens: A Guide for CISOs
An expert in economics and cybersecurity applies opportunity cost and other concepts of the "dismal science" to infosec roles.
Researchers, Companies Slam Mobile Voting Firm Voatz for 'Bad Faith' Attacks
In a letter, almost 70 different security firms and individual researchers criticize Voatz for misrepresenting to the US Supreme Court widely accepted security research practices.
More Printers Could Mean Security Problems for Home-Bound Workers
Tricked-out home offices have led to an influx in printers, many of which have not been set up securely, leaving workers and their companies vulnerable.
Virginia's Largest School System Hit With Ransomware
Fairfax County Public Schools has launched an investigation following a ransomware attack on some of its technology systems.
Ransomware Hits US District Court in Louisiana
The ransomware attack has exposed internal documents from the court and knocked its website offline.
E-Commerce Sites Hit With New Attack on Magento
The campaign targeted sites running Magento Version 1, a version of the e-commerce software that is past end-of-life.
MORE NEWS & COMMENTARY
HOT TOPICS
Legality of Security Research to be Decided in US Supreme Court Case
A ruling that a police officer's personal use of a law enforcement database is "hacking" has security researchers worried for the future.

VPNs: The Cyber Elephant in the Room
While virtual private networks once boosted security, their current design doesn't fulfill the evolving requirements of today's modern enterprise.

Next-Gen Firewalls 101: Not Just a Buzzword
In a rare twist, "next-gen" isn't just marketing-speak when it comes to next-gen firewalls, which function differently than traditional gear and may enable you to replace a variety of devices.

MORE
EDITORS' CHOICE

6 Lessons IT Security Can Learn From DevOps
DevOps has taken over enterprise software development. The discipline has lessons for IT security -- here are a quick half-dozen.
Open Source Security's Top Threat and What To Do About It
With open source developers regularly churning out new tools, the risk landscape has become too fragmented to properly monitor.
NEW FROM THE EDGE

Chart: Does Lack of Diversity Impact the Skills Shortage?
Yes, according to 21% of security pros who participated in the 2020 Black Hat Attendee Survey.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Deception: The Next Step In Cyber Defense

    All organizations have tools and strategies for keeping attackers out. But what if you could distract and frustrate attackers by making them *think* they've gotten your crown jewels? In this webinar, experts discuss emerging tools and strategies for cyber threat ...

  • Network Security: The Attacker's Point of View

    Over the years, IT organizations have approached network security from an enterprise point of view, establishing a perimeter of known devices and defending it with firewalls and security gateways. But today's online attackers often bypass these defenses, entering the network ...

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By Dark Reading
Informa Tech
303 Second St., Suite 900 South Tower, San Francisco, CA 94107
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.