Follow Dark Reading:
 December 23, 2019
LATEST SECURITY NEWS & COMMENTARY
6 Traits to Develop for Cybersecurity Success
Cultivate these half-dozen qualities and watch your career soar.
Ambiguity Around CCPA Will Lead to a Slow Start in 2020
But longer term, compliance to California's new privacy law represents an opportunity for companies to increase customer trust and market share.
New Orleans to Boost Cyber Insurance to $10M Post-Ransomware
Mayor LaToya Cantrell anticipates the recent cyberattack to exceed its current $3 million cyber insurance policy.
Research Team Demonstrates Perfect Secrecy Implementation
The technique is notable because it can be implemented using low-cost, standard hardware components.
F5 Pays $1 Billion for Shape
The acquisition adds fraud detection and prevention to the application delivery company's tool collection.
MORE NEWS & COMMENTARY
HOT TOPICS
Ransomware 'Crisis' in US Schools: More Than 1,000 Hit So Far in 2019
Meanwhile, the mayor of the city of New Orleans says no ransom money demands were made as her city struggles to recover from a major ransomware attack launched last week.

Your First Month as a CISO: Forming an Information Security Program
It's easy to get overwhelmed in your new position, but these tips and resources will help you get started.

5 Security Resolutions to Prevent a Ransomware Attack in 2020
Proactively consider tools to detect anomalous behavior, automatically remediate, and segment threats from moving across the network.

MORE
EDITORS' CHOICE

6 Traits to Develop for Cybersecurity Success
Cultivate these half-dozen qualities and watch your career soar.
How a Password-Free World Could Have Prevented the Biggest Breaches of 2019
If history has taught us anything, it's that hackers can (and will) compromise passwords. Innovation in authentication technology is poised to change that in the coming year.
NEW FROM THE EDGE

SIM Swapping Attacks: What They Are & How to Stop Them
Fraudsters with social engineering skills are hijacking cell phone SIM cards to access victims' bitcoin and social media accounts
Should I Have a Security Travel Policy to Protect Devices and Sensitive Data?
Mobile devices are lost or hacked while in transit far too frequently. Here are some steps to protect your business.
Tech Resources
ACCESS TECH LIBRARY NOW

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By Dark Reading
Informa Tech
303 Second St., Suite 900 South Tower, San Francisco, CA 94107
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.