Follow Dark Reading:
 June 15, 2021
LATEST SECURITY NEWS & COMMENTARY
VPN Attacks Surged in First Quarter
But volume of malware, botnet, and other exploit activity declined because of the Emotet botnet takedown.
New Top 20 Secure-Coding List Positions PLCs as Plant 'Bodyguards'
Best practices guide encompasses integrity, hardening, resilience, and monitoring of PLCs in industrial networks.
Know Thy Enemy: Fighting Half-Blind Against Ransomware Won't Work
We lack reliable, representative, actionable data about ransomware's actual scope, scale, and impact. The Ransom Incident Response Network could change that.
(Sponsored Article) The Path to Passwordless Is Built on What You Already Have
Moving from the security and management challenges of passwords is a journey that can leverage assets already used within the enterprise to reduce risk.
Colonial Pipeline Cyberattack Proves a Single Password Isn't Enough
Since the attack, it's been revealed that it was down to a single password. Yes, ransomware needs to be on your radar -- but a focus on credentials is vital.
Cyber Analytics Database Exposed 5 Billion Records Online
In an ironic twist, Cognyte's data alerts customers to third-party data exposures.
Google Workspace Adds Client-Side Encryption
Users given control over encryption keys, Google says.
Name That Toon: Sight Unseen
Feeling creative? Submit your caption in the comments, and our panel of experts will reward the winner with a $25 Amazon gift card.
MORE NEWS & COMMENTARY
HOT TOPICS
How Can I Test the Security of My Home-Office Employees' Routers?
From the most accurate to the most practical, here are a few ways to ensure both employees and organizations are protected from risk.

New Ransomware Group Claiming Connection to REvil Gang Surfaces
"Prometheus" is the latest example of how the ransomware-as-a-service model is letting new gangs scale up operations quickly.

Cyber Is the New Cold War & AI Is the Arms Race
Continual cyberattacks have pushed us into a new kind of Cold War, with artificial intelligence the basis of this new arms race.

MORE
EDITORS' CHOICE

Required MFA Is Not Sufficient for Strong Security: Report
Attackers and red teams find multiple ways to bypass poorly deployed MFA in enterprise environments, underscoring how redundancy and good design are still required.
Secure Access Trade-offs for DevSecOps Teams
Thanks to recent advancements in access technologies, everyone can apply identity-based authentication and authorization and zero-trust principles for their computing resources.
LATEST FROM THE EDGE

11 Cybersecurity Vendors to Watch in 2021
The cybersecurity landscape continues to spawn new companies and attract new investments. Here is just a sampling of what the industry has to offer.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Smarter Security Automation for Streamlined SecOps

    A shortage of skilled IT security professionals has given rise to a whole new class of technology and practices designed to automate repetitive and time-consuming tasks in security operations. But which tasks can enterprises safely automate? How does emerging automation ...

  • Ransomware Resilience and Response Playbook

    When ransomware locks up your business's critical data and essential gear, panic can set in fast-which just makes you more vulnerable. But questions abound: is this a ransomworm that's going to spread to other endpoints? Are the attackers going to ...

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By Dark Reading
Informa Tech
303 Second St., Suite 900 South Tower, San Francisco, CA 94107
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.