Follow Dark Reading:
 August 18, 2020
LATEST SECURITY NEWS & COMMENTARY
Reported Breach Count for H1 2020 Lowest in Five Years
While reported breach numbers are down, a handful of "mega" breaches resulted in more data records being exposed than ever before, analysis shows.
Firms Still Struggle to Prioritize Security Vulnerabilities
Security debt continues to pile up, with 42% of organizations attributing remediation backlogs to a breach, a new study shows.
Cybersecurity Companies Among Smaller Firms Hit with Brand Spoofing
Researchers find smaller organizations, including some in the cybersecurity space, increasingly targeted with these impersonation attacks.
The IT Backbone of Cybercrime
Like their counterparts who run legitimate businesses, cybercriminals need hosting and cybersecurity protection, too.
REvil Ransomware Hits Jack Daniel's Manufacturer
Attackers who targeted US spirits manufacturer Brown-Forman reportedly stole a terabyte of confidential data.
Advent Completes Forescout Purchase
The purchase by a private equity fund was announced in February and completed today.
COVID-19: Latest Security News & Commentary
Check out Dark Reading's updated, exclusive news and commentary surrounding the coronavirus pandemic.
MORE NEWS & COMMENTARY
HOT TOPICS
8 Signs of a Smartphone Hack
A rapidly dwindling battery life or sudden spike in data usage could indicate your iOS or Android device has been compromised.

Cybersecurity Lessons from the Pandemic
How does cybersecurity support business and society? The pandemic shows us.

Microsoft 365 Updated with New Security, Risk, Compliance Tools

Updates built for remote employees include an endpoint data loss prevention platform, insider risk management, and double key encryption.

MORE
EDITORS' CHOICE

7 Ways to Keep Your Remote Workforce Safe
These tips will help you chart a course for a security strategy that just may become part of the normal way organizations will function over the next several years.
With iOS's Privacy Nutrition Label, Apple Upstages Regulators
New iOS privacy features require developers to disclose what data they're collecting, how they're using it, and with whom they share it.
NEW FROM THE EDGE

Should I Segment my IoT Devices Onto Their Own Networks?
Understanding the criticality and importance of the device determines the level of segmentation.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Network Security: The Attacker's Point of View

    Over the years, IT organizations have approached network security from an enterprise point of view, establishing a perimeter of known devices and defending it with firewalls and security gateways. But today's online attackers often bypass these defenses, entering the network ...

  • Shifting Security from Speedbump to Digital Accelerator

    When you attend this webinar, you will learn about three practices that can help your businesses balance security and agility, without compromise.

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By Dark Reading
Informa Tech
303 Second St., Suite 900 South Tower, San Francisco, CA 94107
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.