Follow Dark Reading:
 February 06, 2020
LATEST SECURITY NEWS & COMMENTARY
What It's Like to Be a CISO: Check Point Security Leader Weighs In
Jony Fischbein shares the concerns and practices that are top-of-mind in his daily work leading security at Check Point Software.
Vixie: The Unintended Consequences of Internet Privacy Efforts
Paul Vixie says emerging encryption protocols for endpoints could 'break' security in enterprise - and even home - networks.
RSAC Sets Finalists for Innovation Sandbox
The 10 finalists will each have three minutes to make their case for being the most innovative, promising young security company of the year.
8 of the 10 Most Exploited Bugs Last Year Involved Microsoft Products
Six of them were the same as from the previous year, according to new Recorded Future analysis.
Researchers Find 24 'Dangerous' Android Apps with 382M Installs
Shenzhen Hawk Internet Co. is identified as the parent company behind five app developers seeking excessive permissions in Android apps.
Ransomware Attacks: Why It Should Be Illegal to Pay the Ransom
For cities, states and towns, paying up is short-sighted and only makes the problem worse.
What WON'T Happen in Cybersecurity in 2020
Predictions are a dime a dozen. Here are six trends that you won't be hearing about anytime soon.
MORE NEWS & COMMENTARY
HOT TOPICS
Two Vulnerabilities Found in Microsoft Azure Infrastructure
Researchers detail the process of finding two flaws in the Azure Stack architecture and Azure App Service, both of which have been patched.

C-Level & Studying for the CISSP
One CTO tells us about his belated pursuit of a foundational infosecurity certification -- why he wanted it and what it took.

Kubernetes Shows Built-in Weakness
A Shmoocon presentation points out several weaknesses built in to Kubernetes configurations and how a researcher can exploit them.

MORE
EDITORS' CHOICE

7 Ways SMBs Can Secure Their Websites
Here's what small and midsize businesses should consider when they decide it's time to up their website security.
How Device-Aware 2FA Can Defeat Social Engineering Attacks
While device-aware two-factor authentication is no panacea, it is more secure than conventional SMS-based 2FA. Here's why.
NEW FROM THE EDGE

What is a Privileged Access Workstation (PAW)?
Ask the Experts -- about a technological game of keep-away that protects the most precious resources from the greatest dangers.
Tech Resources
ACCESS TECH LIBRARY NOW

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Weekly
-- Published By Dark Reading
Informa Tech
303 Second St., Suite 900 South Tower, San Francisco, CA 94107
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Weekly Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.