Follow Dark Reading:
 September 18, 2019
LATEST SECURITY NEWS & COMMENTARY
MITRE Releases 2019 List of Top 25 Software Weaknesses
The list includes the most frequent and critical weaknesses that can lead to serious software vulnerabilities.
Impersonation Fraud Still Effective in Obtaining Code Signatures
Fraudsters continue to attempt to fool certificate authorities into issuing valid digital certificates for legitimate organizations by impersonating an authoritative user. The reward? The ability to sign code with a legitimate signature.
Snowden Sued by US Government Over His New Book
Civil suit argues the former CIA employee and NSA contractor violated his nondisclosure agreements with the two intel agencies.
How Intel Unlocks the Powerful Potential of Diversity in Cybersecurity
Sparking cultural shifts within an organization -- and throughout an entire industry -- can feel like a monumental task, but the juice is well worth the squeeze.
Five Common Cloud Configuration Mistakes
It's a joint responsibility to keep data safe in the cloud. Here's what cloud customers must do to keep their end of the bargain.
US Companies Unprepared for Privacy Regulations
US companies are poorly prepared for even the most rudimentary privacy regulations, a new report says.
15K Private Webcams Could Let Attackers View Homes, Businesses
Webcams could be potentially accessed and manipulated by anyone with an Internet connection, researchers say.
MORE NEWS & COMMENTARY
HOT TOPICS
APIs Get Their Own Top 10 Security List
OWASP's new list of API weaknesses focuses on issues that have caused recent data breaches and pose common security hazards in modern cloud-based applications.

6 Questions to Ask Once You've Learned of a Breach
With GDPR enacted and the California Consumer Privacy Act on the near horizon, companies have to sharpen up their responses. Start by asking these six questions.

Escaping Email: Unlocking Message Security for SMS, WhatsApp
Messaging is growing in importance as dislike for email increases. That means knowing how to protect critical data in the messaging era is a must for IT security.

MORE
EDITORS' CHOICE

Cybercriminal's Black Market Pricing Guide
Common prices criminals pay one other for products and services that fuel the cybercriminal ecosystem.
NEW FROM THE EDGE

Poll Results: Maybe Not Burned Out, But Definitely 'Well Done'
Staff shortages and increasingly challenging jobs are turning up the heat on security pros, readers say.
Any Advice for Assessing Third-Party Risk?
Here are five tips about what not to do when assessing the cyber-risk introduced by a third-party supplier.
Get Smart
On a scale of 1 to 5, how 'smart' is your home?
Tech Resources
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.