Follow Dark Reading:
 March 30, 2021
LATEST SECURITY NEWS & COMMENTARY
Manufacturing Firms Learn Cybersecurity the Hard Way
Although 61% of smart factories have experienced a cybersecurity incident, IT groups and operational technology groups still don't collaborate enough on security.
CISA Builds Out Defensive Tools for Security Teams
Need a tool to hunt for attacks in your network? The DHS agency bolsters the offerings in its open source toolbox.
(Sponsored Article) Do You Know Who IAM? Why Cloud Identity Is So Complicated
Excessive permissions and identity security are important. Solutions have existed for years to make them easier. So, why do so many failures still happen?
4 Open Source Tools to Add to Your Security Arsenal
Open source solutions can offer an accessible and powerful way to enhance your security-testing capabilities.
Attackers Target PHP Git Server to Backdoor Source Code
The PHP maintainers have decided to make GitHub the official source for PHP repositories going forward.
SolarWinds Hackers Accessed DHS Chief's Email
Several high-level government accounts were also breached in the attack.
MORE NEWS & COMMENTARY
HOT TOPICS
Nearly Half of Popular Android Apps Built With High-Risk Components
Information leakage and applications asking for too many permissions were also major issues, according to a survey of more than 3,300 popular mobile applications.

How Personally Identifiable Information Can Put Your Company at Risk
By being more mindful of how and where they share PII, employees will deprive cybercriminals of their most useful tool.

A Day in the Life of a DevSecOps Manager
"Most days are good days," says Rally Health's Ari Kalfus. But they sure are busy, he tells The Edge.

MORE
EDITORS' CHOICE

6 Tips for Limiting Damage From Third-Party Attacks
The ability to protect your organization from third-party attacks will become increasingly critical as attackers try to maximize the effectiveness of their malicious campaigns.
Disrupting the Cybercriminal Supply Chain
It is time to turn the tables on cybercriminals and use their own tactics against them.
LATEST FROM THE EDGE

In Secure Silicon We Trust
Building upon a hardware root of trust is becoming a more achievable goal for the masses and the roots are digging deeper. Here's what you need to know.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Understanding XDR - April 8 FREE Webinar

    In this webinar, experts discuss the benefits and limitations of EDR, and offer recommendations on how to extend these capabilities to other parts of the IT infrastructure in order to improve overall security.

  • Detecting & Mitigating Attacks on Remote Workers

    In this webinar, experts discuss some of the cyber attacks that have been made on work-from-home end users, as well as exploits against remote systems and devices.

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By Dark Reading
Informa Tech
303 Second St., Suite 900 South Tower, San Francisco, CA 94107
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.