Follow Dark Reading:
 September 26, 2019
LATEST SECURITY NEWS & COMMENTARY
When Compliance Isn't Enough: A Case for Integrated Risk Management
Why governance, risk, and compliance solutions lull companies into a false sense of security, and how to form a more effective approach.
Web Attacks Focus on SQL Injection, Malware on Credentials
Attackers continue to focus on bread-and-butter tactics, according to a quarterly threat report.
GandCrab Developers Behind Destructive REvil Ransomware
Code similarities show a definite technical link between the malware strains, Secureworks says.
Long-Lining: Reeling In the Big Fish in Your Supply Chain
The object of this new attack campaign is not swordfish or tuna but high-ranking executives within target organizations.
The Future of Account Security: A World Without Passwords?
First step: Convince machines that we are who we say we are with expanded biometrics, including behaviors, locations, and other information that makes "us" us.
New Emergency Communications Plan Released by CISA
The Cybersecurity and Infrastructure Security Agency's latest version of the National Emergency Communications Plan comes after a two-year process to improve the cybersecurity and flexibility of the nation's emergency communications.
Microsoft's Azure Sentinel SIEM Now Generally Available
The cloud-native SIEM is designed to search data from users, applications, servers, and devices running on-prem and in the cloud.
MORE NEWS & COMMENTARY
HOT TOPICS
7 Ways VPNs Can Turn from Ally to Threat
VPNs are critical pieces of the security infrastructure, but they can be vulnerable, hackable, and weaponized against you. Here are seven things to be aware of before you ignore your VPN.

Metasploit Creator HD Moore's Latest Hack: IT Assets
Moore has built a network asset discovery tool that wasn't intended to be a pure security tool, but it addresses a glaring security problem.

The 20 Worst Metrics in Cybersecurity
Security leaders are increasingly making their case through metrics, as well they should - as long as they're not one of these.

MORE
EDITORS' CHOICE

5 Updates from PCI SSC That You Need to Know
As payment technologies evolve, so do the requirements for securing cardholder data.
NEW FROM THE EDGE

The Beginner's Guide to Denial-of-Service Attacks: A Breakdown of Shutdowns
DoS attacks come in many varieties (not just DDoS). This simple set of descriptions will help you understand how they're different - and why each and every one is bad.
Cloud Insight ... and Stuff
All fluff, all the time.
Tech Resources
ACCESS TECH LIBRARY NOW

MORE WEBINARS
FEATURED REPORTS
  • 2019 State of IT Infrastructure

    This report examines the current state of enterprise data center, storage and network infrastructure, explores how it is evolving, and looks into future plans for implementation. Read the Report today!

  • 2019 State of DevOps

    DevOps is needed in today's business environment, where improved application security is essential and users demand more applications, services, and features -- fast. We sought to see where DevOps adoption and deployment stand, this report summarizes our survey findings. Find ...

MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.