Follow Dark Reading:
 September 03, 2020
LATEST SECURITY NEWS & COMMENTARY
Testing & Automation Pay Off for NSA's DevSecOps Project
Communication with stakeholders, extensive testing, and robust automation pays dividends for military intelligence agency, one of several presenters at GitLab's virtual Commit conference.
The Hidden Costs of Losing Security Talent
One person's exit can set off a chain of costly events.
Data Privacy Concerns, Lack of Trust Foil Automated Contact Tracing
Efforts to create a technology framework for alerting people to whether they have been exposed to an infectious disease have been hindered by a number of key issues.
New Threat Activity by Lazarus Group Spells Trouble for Orgs
The North Korea-backed group has launched several campaigns to raise revenue for cash-strapped nation's missile program, security experts say.
Why Kubernetes Clusters Are Intrinsically Insecure (& What to Do About Them)
By following best practices and prioritizing critical issues, you can reduce the chances of a security breach and constrain the blast radius of an attempted attack. Here's how.
Redefining What CISO Success Looks Like
Key to this new definition is the principle that security programs are designed to minimize business risk, not to achieve 100% no-risk.
COVID-19: Latest Security News & Commentary
Check out Dark Reading's updated, exclusive news and commentary surrounding the coronavirus pandemic.
MORE NEWS & COMMENTARY
HOT TOPICS
Ransomware Red Flags: 7 Signs You're About to Get Hit
Caught off guard by a ransomware attack? Security experts say the warning signs were there all along.

'Transparent Tribe' APT Group Deploys New Android Spyware for Cyber Espionage
The group, which has been around since at least 2013, has impacted thousands of organizations, mostly in India.

Is China the World's Greatest Cyber Power?
While the US, Russia, Israel, and several European nations all have sophisticated cyber capabilities, one threat intelligence firm argues that China's aggressive approach to cyber operations has made it "perhaps the world's greatest cyber power."

MORE
EDITORS' CHOICE

5 Tips for Triaging Risk from Exposed Credentials
Not all exposed usernames and passwords present a threat. Here's how to quickly identify the ones that do.
Why Are There Still So Many Windows 7 Devices?
As the FBI warns, devices become more vulnerable to exploitation as time passes, due to a lack of security updates and new, emerging vulnerabilities.
NEW FROM THE EDGE

Hypothesis: Cyber Attackers Are After Your Scientific Research
From COVID-19 treatment to academic studies, keeping research secure is more important than ever. The ResearchSOC at Indiana University intends to help.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Cyber Attack Evasion Techniques

    When it comes to evasion techniques there's a perpetual cat and mouse game between malware developers and solutions providers. By drawing on the latest in evasion techniques, malware developers not only go undetected on the compromised machine but more importantly, ...

  • Security Alert Fatigue: Tips for Taking Control

    Adding new security tools to your SOC toolset may help alert you to the newest cyber threats to your business. However, when a zillion unprioritized alerts hit you in a day, you might start treating them like whack-a-mole or the ...

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Weekly
-- Published By Dark Reading
Informa Tech
303 Second St., Suite 900 South Tower, San Francisco, CA 94107
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Weekly Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.