Follow Dark Reading:
 October 22, 2019
LATEST SECURITY NEWS & COMMENTARY
Russian Hackers Using Iranian APT's Infrastructure in Widespread Attacks
New advisory from the UK's NCSC and the NSA throws fresh light on activity first revealed by Symantec in June.
How Much Security Is Enough? Practitioners Weigh In
Most IT and security pros surveyed say they could afford some, but not all, of the minimum security needed to protect themselves.
Microsoft Aims to Block Firmware Attacks with New Secured-Core PCs
Partnerships with Intel, Qualcomm, and AMD will bring a new layer of device security that alters the boot process to detect firmware compromise.
Avast Foils Another CCleaner Attack
'Abiss' attackers used an older VPN profile to get into Avast's network and targeted its CCleaner utility.
SOC Operations: 6 Vital Lessons & Pitfalls
There is no one road to security operations success, but these guidelines will smooth your path.
Researchers Turn Alexa and Google Home Into Credential Thieves
Eight Amazon Alexa and Google Home apps were approved for official app stores even though their actual purposes were eavesdropping and phishing.
Trend Micro Buys Cloud Conformity to Fight Cloud Competition
The cloud security posture management startup was acquired for a reported $70 million.
MORE NEWS & COMMENTARY
HOT TOPICS
14 Hot Cybersecurity Certifications Right Now
In an industry where certifications can make or break a job candidacy, which ones have security pros been going after in 2019?

How to Build a Rock-Solid Cybersecurity Culture
In part one of this two-part series, we start with the basics - getting everyone to understand what's at stake - and then look at lessons from the trenches.

Cybersecurity Advice From Betty White
Among the beloved entertainer's advice: "Double bag those passwords." Thanks, Betty.

MORE
EDITORS' CHOICE

State of SMB Insecurity by the Numbers
SMBs still perceive themselves at low risk from cyberthreats - in spite of attack statistics that paint a different picture.
Smart Prevention: How Every Enterprise Can Create Human Firewalls
Organizations of all sizes should include both human firewalls and virtual tools in their cybersecurity budgets.
NEW FROM THE EDGE

Surviving Alert Fatigue: 7 Tools and Techniques
Experts discuss why security teams are increasingly overwhelmed with alerts and share tactics for lightening the load.
Tech Resources
ACCESS TECH LIBRARY NOW

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By Dark Reading
Informa Tech
303 Second St., Suite 900 South Tower, San Francisco, CA 94107
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.