Follow Dark Reading:
 March 31, 2020
LATEST SECURITY NEWS & COMMENTARY
Researchers Spot Sharp Increase in Zoom-Themed Domain Registrations
Attackers are attempting to take advantage of the surge in teleworking prompted by COVID-19, Check Point says.
Limited-Time Free Offers to Secure the Enterprise Amid COVID-19
These products and services could be of immediate help to infosec pros now protecting their organizations while working from home.
Securing Your Remote Workforce: A Coronavirus Guide for Businesses
Often the hardest part in creating an effective awareness program is deciding what NOT to teach.
Microsoft Edge Will Tell You If Credentials Are Compromised
Password Monitor, InPrivate mode, and ad-tracking prevention are three new additions to Microsoft Edge.
HackerOne Drops Mobile Voting App Vendor Voatz
Bug bounty platform provider cited "Voatz's pattern of interactions with the research community" in its decision to halt the app vendor's vuln disclosure program on HackerOne.

Name That Toon: Remote Work in the Era of Coronavirus

We provide the cartoon. You write the caption!


MORE NEWS & COMMENTARY
HOT TOPICS
How Attackers Could Use Azure Apps to Sneak into Microsoft 365
Researchers warn Microsoft 365 account holders to pay attention to unknown applications that request permissions.

Cyber Version of 'Justice League' Launches to Fight COVID-19 Related Hacks
Goal is to help organizations - especially healthcare entities - protect against cybercriminals trying to take advantage of the pandemic.

200M Records of US Citizens Leaked in Unprotected Database
Researchers have not determined who owns the database, which was one of several large exposed instances disclosed this week.

MORE
EDITORS' CHOICE

10 Security Services Options for SMBs
Outsourcing security remains one of the best ways for small to midsize businesses to protect themselves from cyberthreats.
The Wild, Wild West(world) of Cybersecurity
Though set in the future, HBO's "Westworld" works as an allegory for the present moment in cybersecurity.
NEW FROM THE EDGE

Untangling Third-Party Risk (and Fourth, and Fifth...)
Third parties bring critical products and services to your organization. They also bring risk that must be understood and managed.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Building a Strategy for Detection and Response

    Hear as top industry experts discuss how to create a strategy that enables the enterprise security team to do detection and response across a wide variety of technologies and services.

  • The 6 Must-Haves for Practical Cloud Security

    Join us for this webinar in which we will share lessons learned from nine years of working with leading cloud adopters including household names in streaming content, wireless and telecom providers, worldwide gaming networks, financial institutions, and SaaS providers.

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By Dark Reading
Informa Tech
303 Second St., Suite 900 South Tower, San Francisco, CA 94107
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.