Follow Dark Reading:
 May 21, 2020
LATEST SECURITY NEWS & COMMENTARY
Web Application Attacks Double from 2019: Verizon DBIR
Verizon's annual data breach report shows most attackers are external, money remains their top motivator, and web applications and unsecured cloud storage are hot targets.
Coronavirus-Themed Phishing Fears Largely Overblown, Researchers Say
As COVID-19-themed spam rises, phishing-not so much. An analysis of newly registered domains finds that only 2.4% are actually phishing sites aiming to steal credentials.
As DevOps Accelerates, Security's Role Changes
There remains a disconnect between developers and security teams, with uncertainty around who should handle software security.
UK Supercomputing Service ARCHER Still Offline After Monday Attack
Incident comes amid US warnings about Chinese cybergroups targeting organizations involved in COVID-19-related research.
As Businesses Rush to the Cloud, Security Teams Struggle to Keep Up
Most organizations have a gap between current and planned cloud usage and the maturity of their cloud security programs.
Digital Transformation Risks in Front-end Code
Why making every front-end developer a DevSecOps expert will lead to a more holistic approach to web and native application security.
4 Challenges with Existing VPNs
A VPN is a step in the right direction, but it's not the be-all and end-all when it comes to security and falls short in many ways.
COVID-19: Latest Security News & Commentary
Check out Dark Reading's updated, exclusive news and commentary surrounding the coronavirus pandemic.
MORE NEWS & COMMENTARY
HOT TOPICS
The 3 Top Cybersecurity Myths & What You Should Know
With millions of employees now attempting to work from home, it's vital to challenge misconceptions about cybersecurity.

6 Free Cybersecurity Training and Awareness Courses
Most are designed to help organizations address teleworking risks related to COVID-19 scams.

Microsoft Patch for Reverse RDP Flaw Leaves Room for Other Attacks
Fix released in February is Microsoft's second pass at fully addressing issue that Check Point first disclosed at Black Hat USA last summer.

MORE
EDITORS' CHOICE

7 Security Pros: What My Nontraditional Background Brings to the Job
Job experience and degrees outside of the cybersecurity or IT world can provide invaluable diversity of thinking and problem-solving.
Is Zero Trust the Best Answer to the COVID-19 Lockdown?
Enterprises need to recognize that remote access and other pandemic-related security challenges cannot be fixed with buzzwords or silver-bullet security tools.
NEW FROM THE EDGE

8 Supply Chain Security Requirements
Complex supply chains have complex security requirements, but secure them you must. Here's where to start.
Tech Resources
ACCESS TECH LIBRARY NOW

  • The State of IT & Cybersecurity Operations

    Dark Reading recently took a measure of the relationship between IT and Security teams. Join us as we discuss the survey, share it's findings and review best practices for CIOs and other leadership roles.

  • Red Team Realities: Testing that goes beyond compliance

    Using real-world anecdotes, this webinar will illustrate how to navigate a decision-making process aligned to use cases and desired outcomes tailored to your organization's needs. Listen as we discuss the different levels of cybersecurity assessments, and help you determine which ...

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Weekly
-- Published By Dark Reading
Informa Tech
303 Second St., Suite 900 South Tower, San Francisco, CA 94107
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Weekly Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.