Follow Dark Reading:
 March 05, 2020
LATEST SECURITY NEWS & COMMENTARY
Most Cyberattacks in 2019 Were Waged Without Malware
If the "malware-free" attack trajectory continues, it could mean major trouble for defenders, according to experts from CrowdStrike and other security companies.
EternalBlue Longevity Underscores Patching Problem
Three years after the Shadow Brokers published zero-day exploits stolen from the National Security Agency, the SMB compromise continues to be a popular Internet attack.
Let's Encrypt Revokes Over 3 Million of Its Digital Certs
Domain validation glitch prompts an abrupt decision.
CISOs Who Want a Seat at the DevOps Table Better Bring Value
Here are four ways to make inroads with the DevOps team -- before it's too late.
3 Ways to Strengthen Your Cyber Defenses
By taking proactive action, organizations can face down threats with greater agility and earned confidence.
Cathay Pacific Hit with Fine for Long-Lasting Breach
The breach, which was active for four years, resulted in the theft of personal information on more than 9 million people.
MORE NEWS & COMMENTARY
HOT TOPICS
How Security Leaders at Starbucks and Microsoft Prepare for Breaches
Executives discuss the security incidents they're most worried about and the steps they take to prepare for them.

The Cybercrime Pandemic Keeps Spreading
The World Economic Forum says cyberattacks will be one of the top global business risks over the next 10 years.

Why Threat Intelligence Gathering Can Be a Legal Minefield
In new guidance, the Department of Justice says security researchers and organizations run real risks when gathering threat intelligence or dealing with criminals in underground online marketplaces.

MORE
EDITORS' CHOICE

7 Loyalty Program and Rewards App Attacks
The number of attacks targeting loyalty and rewards programs is growing. Here are some of the lowlights.
Avoiding the Perils of Electronic Communications
Twitter, Slack, etc., have become undeniably important for business today, but they can cause a lot of damage. That's why an agile communications strategy is so important.
NEW FROM THE EDGE

The Perfect Travel Security Policy for a Globe-Trotting Laptop
There are many challenges to safely carrying data and equipment on international travels, but the right policy can make navigating the challenges easier and more successful.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Zero-Trust In Practice

    In this webinar, learn what zero-trust really looks like in practice, how to overcome challenges along the way, what security benefits you'll realize right away, and how your organization can take the first steps toward implementing a zero-trust model.

  • 12 Ways to Defeat Multi-Factor Authentication and How To Stop the Bad Guys

    This webinar will explore 12 ways hackers can and do get around your favorite MFA solution. You'll learn about the good and bad of MFA, and become a better computer security defender in the process.

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By Dark Reading
Informa Tech
303 Second St., Suite 900 South Tower, San Francisco, CA 94107
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.