Follow Dark Reading:
 May 17, 2021
LATEST SECURITY NEWS & COMMENTARY
Wi-Fi Design, Implementation Flaws Allow a Range of Frag Attacks
Every Wi-Fi product is affected by at least one fragmentation and aggregation vulnerability, which could lead to a machine-in-the-middle attack, researcher says.
Security Trends to Follow at RSA Conference 2021
Here are three key categories of sessions that provide an inside look at some of today's most interesting cybersecurity trends.
SOC Teams Burdened by Alert Fatigue Explore XDR
ESG research finds a complex attack surface and threat landscape make alerts too overwhelming to monitor accurately
Rapid7 Source Code Accessed in Supply Chain Attack
An investigation of the Codecov attack revealed intruders accessed Rapid7 source code repositories containing internal credentials and alert-related data.
Cisco Confirms Plans to Acquire Kenna Security
Cisco plans to integrate Kenna's vulnerability management technology into its SecureX platform.
MORE NEWS & COMMENTARY
HOT TOPICS
Putting the Spotlight on DarkSide
Incident responders share insight on the DarkSide ransomware group connected to the recent Colonial Pipeline ransomware attack.

Defending the Castle: How World History Can Teach Cybersecurity a Lesson
Cybersecurity attackers follow the same principles practiced in warfare for millennia. They show up in unexpected places, seeking out portions of an organization's attack surface that are largely unmonitored and undefended.

Cybersecurity: What Is Truly Essential?
In an effort to protect their organizations, security professionals can overdo it. The result often works against them.

MORE
EDITORS' CHOICE

A Startup With NSA Roots Wants Silently Disarming Cyberattacks on the Wire to Become the Norm
Trinity Cyber takes a new spin on some traditional network-security techniques, but can its approach catch on widely?
7 Modern-Day Cybersecurity Realities
Security pros may be working with a false sense of security. We explore seven places where old methods and techniques have to change to keep their organizations safe.
LATEST FROM THE EDGE

How Faster COVID-19 Research Is Being Made Possible by Secure Silicon
When Intel and Leidos set up a "trusted execution environment" to enable a widespread group of researchers to securely share and confidentially compute real-world data, it was no small achievement.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Ransomware Resilience and Response Playbook

    When ransomware locks up your business's critical data and essential gear, panic can set in fast-which just makes you more vulnerable. But questions abound: is this a ransomworm that's going to spread to other endpoints? Are the attackers going to ...

  • Web Security: Protecting Your Data from Internet Threats

    One of the most accessible methods of cracking your corporate data is through a simple Internet connection. In this webinar, experts offer a look at some of the most common ways that cyber attackers use to crack enterprise systems via ...

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By Dark Reading
Informa Tech
303 Second St., Suite 900 South Tower, San Francisco, CA 94107
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.