Follow Dark Reading:
 September 17, 2020
LATEST SECURITY NEWS & COMMENTARY
Meet the Computer Scientist Who Helped Push for Paper Ballots
Security Pro File: Award-winning computer scientist and electronic voting expert Barbara Simons chats up her pioneering days in computer programming, paper-ballot backups, Internet voting, math, and sushi.
Likely Links Emerge Between Lazarus Group and Russian-Speaking Cybercriminals
Researchers examine security incidents over the past several years that seemingly connect North Korea's Lazarus Group with Russian-speaking attackers.
What's on Your Enterprise Network? You Might be Surprised
The strangest connected devices are showing up, and the threats they pose to security should not be overlooked.
Most Organizations Plan to Make COVID-19 Changes Permanent
After the pandemic, companies will continue to invest in improving IT infrastructure and security as well as automate tasks to reduce errors and improve network resiliency.
CISA Joins MITRE to Issue Vulnerability Identifiers
The Cybersecurity and Infrastructure Security Agency will become a peer of MITRE in the CVE program, likely leading to continued increases in disclosed vulnerabilities.
DDoS Attacks Rose 151% in First Half of 2020
Attacks grew in number, size, and sophistication as the coronavirus pandemic took hold.
Cybersecurity Bounces Back, but Talent Still Absent
While the demand for cybersecurity talent rebounds, organizations will need to focus on cyber-enabled roles to fill immediate skills gaps.
US Charges Five Members of China-Linked APT41 for Global Attacks
The five Chinese nationals are among seven defendants arrested for intrusion campaigns into more than 100 organizations, the DoJ reports.
MORE NEWS & COMMENTARY
HOT TOPICS
6 Lessons IT Security Can Learn From DevOps
DevOps has taken over enterprise software development. The discipline has lessons for IT security -- here are a quick half-dozen.

Legality of Security Research to be Decided in US Supreme Court Case
A ruling that a police officer's personal use of a law enforcement database is "hacking" has security researchers worried for the future.

CISA Issues Alert for Microsoft Netlogon Vulnerability
CISA has issued an alert following the discovery of publicly available exploit code for Windows elevation of privilege flaw CVE-2020-1472.

MORE
EDITORS' CHOICE

6 Lessons IT Security Can Learn From DevOps
DevOps has taken over enterprise software development. The discipline has lessons for IT security -- here are a quick half-dozen.
8 Reasons Perimeter Security Alone Won't Protect Your Crown Jewels
Most firewalls and security devices effectively protect systems and data, but are they enough to safeguard business-critical applications?
NEW FROM THE EDGE

h2c Smuggling: A New 'Devastating' Kind of HTTP Request Smuggling
The newly discovered form of HTTP request smuggling could have widespread impact because any proxy can be affected, researchers say. Here's what infosec pros should know.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Making Zero-Trust Work for Work From Home

    In this Dark Reading webinar, learn how to make layered, zero-trust architecture work among today's business realities.

  • Security Alert Fatigue: Tips for Taking Control

    Adding new security tools to your SOC toolset may help alert you to the newest cyber threats to your business. However, when a zillion unprioritized alerts hit you in a day, you might start treating them like whack-a-mole or the ...

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By Dark Reading
Informa Tech
303 Second St., Suite 900 South Tower, San Francisco, CA 94107
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.