Follow Dark Reading:
 February 27, 2020
LATEST SECURITY NEWS & COMMENTARY
Latest Security News from RSAC 2020
Check out Dark Reading's updated, exclusive coverage of the news and security themes that are dominating RSA Conference 2020 in San Francisco.
Verizon: Attacks on Mobile Devices Rise
Companies of all sizes are being hit by mobile attacks and feeling the effects for extended periods of time, according to the 2020 Verizon Mobile Security Index.
'Cloud Snooper' Attack Circumvents AWS Firewall Controls
Possible nation-state supply chain attack acts like a "wolf in sheep's clothing," Sophos says.
Wendy Nather on How to Make Security 'Democratization' a Reality
Ahead of her keynote at the RSA Conference, Cisco's head of advisory CISOs outlines to Dark Reading a unique paradigm that asks security teams to stop fighting their users -- and start sharing control with them.
7 Tips to Improve Your Employees' Mobile Security
Security experts discuss the threats putting mobile devices at risk and how businesses can better defend against them.
MORE NEWS & COMMENTARY
HOT TOPICS
Kr00k Wi-Fi Vulnerability Affected a Billion Devices
Routers and devices with Broadcom and Cypress Wi-Fi chipsets could be forced to sometimes use encryption keys consisting of all zeroes. Now patched, the issue affected a billion devices, including those from Amazon, Apple, Google, and Samsung.

Cybersecurity Industry: It's Time to Stop the Victim Blame Game
There are far more ways to be helpful than adding to the noise of what a company probably did wrong.

5 Strategies to Secure Cloud Operations Against Today's Cyber Threats
With these fundamentals in mind, organizations can reduce their security and compliance risks as they reap the cloud's many benefits:

MORE
EDITORS' CHOICE

10 Tough Questions CEOs Are Asking CISOs
CEOs today are prepared with better questions than 'Are we secure,' and chief information security officers had better be ready to answer.
5 Ways to Up Your Threat Management Game
Good security programs start with a mindset that it's not about the tools, it's what you do with them. Here's how to get out of a reactive fire-drill mode with vulnerability management.
NEW FROM THE EDGE

How to Prevent an AWS Cloud Bucket Data Leak
Misconfigured AWS buckets have led to huge data breaches. Following a handful of practices will help keep you from becoming the next news story.
How Should I Answer a Nontech Exec Who Asks, 'How Secure Are We?'
Consider this your opportunity to educate.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Preventing Credential Theft & Account Takeovers

    In this webinar, you'll learn where your credentials are most vulnerable to compromise, get a guide through the anatomy of an account takeover attack, and discover tools and techniques to harden your defenses against credential theft and account takeovers.

  • Getting the Most from Threat Intelligence

    In this webinar, learn how to take a fresh look at external threat intelligence and ensure you have an up-to-date view of attackers' means, motives and opportunity.

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Weekly
-- Published By Dark Reading
Informa Tech
303 Second St., Suite 900 South Tower, San Francisco, CA 94107
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Weekly Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.