Follow Dark Reading:
 September 19, 2019
LATEST SECURITY NEWS & COMMENTARY
MITRE Releases 2019 List of Top 25 Software Weaknesses
The list includes the most frequent and critical weaknesses that can lead to serious software vulnerabilities.
Saudi IT Providers Hit in Cyber Espionage Operation
Symantec identifies new 'Tortoiseshell' nation-state group as the attackers.
APIs Get Their Own Top 10 Security List
OWASP's new list of API weaknesses focuses on issues that have caused recent data breaches and pose common security hazards in modern cloud-based applications.
WannaCry Detections At An All-Time High
More than 12,000 variants of the infamous malware are targeting systems that are still open to the EternalBlue exploit - but the potential danger is low, Sophos warns.
US Turning Up the Heat on North Korea's Cyber Threat Operations
Sanctions on North Korean nation-state hacking groups came amid reports of fresh malicious campaigns directed at US entities from the isolated nation.
No Quick Fix for Security-Worker Shortfall
Security professionals see acquiring skills as the way forward, but only half of companies are training their workers, with more continuing to search for highly skilled employees.
Five Common Cloud Configuration Mistakes
It's a joint responsibility to keep data safe in the cloud. Here's what cloud customers must do to keep their end of the bargain.
DevSecOps: Recreating Cybersecurity Culture
Bringing developers and security teams together guided by a common goal requires some risk-taking. With patience and confidence, it will pay off. Here's how.
MORE NEWS & COMMENTARY
HOT TOPICS
6 Questions to Ask Once You've Learned of a Breach
With GDPR enacted and the California Consumer Privacy Act on the near horizon, companies have to sharpen up their responses. Start by asking these six questions.

Cybercriminal's Black Market Pricing Guide
Common prices criminals pay one other for products and services that fuel the cybercriminal ecosystem.

Preventing PTSD and Burnout for Cybersecurity Professionals
The safety of our digital lives is at stake, and we need to all do our part in raising awareness of these issues.

MORE
EDITORS' CHOICE

The 20 Worst Metrics in Cybersecurity
Security leaders are increasingly making their case through metrics, as well they should - as long as they're not one of these.
How Intel Unlocks the Powerful Potential of Diversity in Cybersecurity
Sparking cultural shifts within an organization -- and throughout an entire industry -- can feel like a monumental task, but the juice is well worth the squeeze.
NEW FROM THE EDGE

The Top 'Human Hacks' to Watch For Now
Social engineering is as old as mankind. But its techniques have evolved with time. Here are the latest tricks criminals are using to dupe end users.
Poll Results: Maybe Not Burned Out, But Definitely 'Well Done'
Staff shortages and increasingly challenging jobs are turning up the heat on security pros, readers say.
Tech Resources
ACCESS TECH LIBRARY NOW

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Weekly
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Weekly Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.