Follow Dark Reading:
 July 22, 2020
LATEST SECURITY NEWS & COMMENTARY
The State of Hacktivism in 2020
Activism via hacking might not be as noisy as it once was, but it hasn't been silenced yet.
US Indicts 2 Chinese Nationals for Stealing IP & Business Secrets, Including COVID-19 Research
Pair working on behalf of themselves and China's Ministry of State Security, Justice Department says.
DDoS Botnets Are Entrenched in Asia & Amplification Attacks Set Records
China, Vietnam, and Taiwan are top sources of DDoS botnet activity, but the top data floods use a variety of amplification attacks, a report finds.
Microsoft 365 Updated with New Security, Risk, Compliance Tools
Updates built for remote employees include an endpoint data loss prevention platform, insider risk management, and double key encryption.
The Data Privacy Loophole Federal Agencies Are Still Missing
Why knowledge-based authentication is leaving federal contact centers vulnerable to an increasingly sophisticated hacker community.
Crypto-Primer: Encryption Basics Every Security Pro Should Know
With so many choices for encrypting data and communication, it's important to know the pros and cons of different techniques.
G Suite Security Updates Bring New Features to Gmail, Meet & Chat
New security features include support for a new standard in Gmail, phishing protection in Chat, and additional admin controls.
Fortinet Buys Cloud Security Firm OPAQ
The company plans to add zero-trust networking capabilities to its Secure Access Service Edge architecture.
MORE NEWS & COMMENTARY
HOT TOPICS
3 Years After NotPetya, Many Organizations Still in Danger of Similar Attacks
The same gaps that enabled ransomware to spread remain in patching, network segmentation, backup practices, security experts say.

Decoding the Verizon DBIR Report: An Insider's Look Beyond the Headlines
To truly understand cybersecurity trends, we must look beyond the headlines and ask more of the data. What you learn might surprise you.

Major Flaws Open the Edge to Attack
Attackers are using critical exploits for flaws in VPN appliances, app-delivery services, and other network-edge hardware and software to punch through corporate perimeters. What can companies do?

MORE
EDITORS' CHOICE

8 Signs of a Smartphone Hack
A rapidly dwindling battery life or sudden spike in data usage could indicate your iOS or Android device has been compromised.
Leading Through Uncertainty: Be Proactive in Your Dark Web Intelligence Strategy
Having a strong Dark Web intelligence posture helps security teams understand emerging vulnerability trends.
NEW FROM THE EDGE

Keys for a Safe Return to the Post-Quarantine Office
Security teams will need to keep these important considerations in mind as employees make their way back to the workplace.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Don't Miss this Event Featuring Rob Carter - CIO of FedEx

    In these tumultuous times, IT organizations are tasked with two critical, yet often conflicting priorities: increasing online innovation and cutting IT costs. In this eye-opening keynote address you'll get a first-hand perspective on how organizations can implement new IT strategies ...

  • How Secure is Your Azure Cloud Security Environment?

    During this webinar we'll explore real examples of industry issues, changes in the landscape of cloud security, and the most significant dangers currently impacting Microsoft Azure. Don't miss this chance to learn how to protect your Microsoft Azure environment.

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By Dark Reading
Informa Tech
303 Second St., Suite 900 South Tower, San Francisco, CA 94107
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.