Follow Dark Reading:
 September 19, 2020
LATEST SECURITY NEWS & COMMENTARY
A Hacker's Playlist
Nine security researchers share their favorite songs and genres.
Don't Fall for It! Defending Against Deepfakes
Detecting doctored media has become tricky -- and risky -- business. Here's how organizations can better protect themselves from fake video, audio, and other forms of content.
h2c Smuggling: A New 'Devastating' Kind of HTTP Request
The newly discovered form of HTTP request smuggling could have widespread impact because any proxy can be affected, researchers say. Here's what infosec pros should know.
How IT Security Organizations are Attacking the Cybersecurity Problem
The COVID-19 pandemic turned the world -- and enterprise computing -- on end. Here's a look at how cybersecurity teams are retrenching their defense strategies, rebuilding their teams, and selecting new technologies to stop the oncoming rise of online attacks.

Name That Toon: Mask Out

Feeling creative? Submit your caption in the comments, and our panel of experts will reward the winner with a $25 Amazon gift card.


MORE NEWS & COMMENTARY
HOT TOPICS
CISA Issues Alert for Microsoft Netlogon Vulnerability
CISA has issued an alert following the discovery of publicly available exploit code for Windows elevation of privilege flaw CVE-2020-1472.

Large Cloud Providers Much Less Likely Than Enterprises to Get Breached
Pen-test results also show a majority of organizations have few protections against attackers already on the network.

6 Lessons IT Security Can Learn From DevOps
DevOps has taken over enterprise software development. The discipline has lessons for IT security -- here are a quick half-dozen.

MORE
EDITORS' CHOICE

5 Security Lessons Humans Can Learn From Their Dogs
Without the right reinforcements, you could be barking at the moon.
Meet the Computer Scientist Who Helped Push for Paper Ballots
Security Pro File: Award-winning computer scientist and electronic voting expert Barbara Simons chats up her pioneering days in computer programming, paper-ballot backups, Internet voting, math, and sushi.
FROM THE NEWS DESK

Most Organizations Plan to Make COVID-19 Changes Permanent
After the pandemic, companies will continue to invest in improving IT infrastructure and security as well as automate tasks to reduce errors and improve network resiliency.
Tech Resources
ACCESS TECH LIBRARY NOW

  • The Best Ways to Stop Malware and Ransomware That No One Else Will Tell You

    Dives into the best ways to stop malware dead in its tracks using real-life methods no one else is talking about. Stop playing reactive defense. Go on the offensive! Use your existing data to craft a better malware defense today.

  • Cyber Attack Evasion Techniques

    When it comes to evasion techniques there's a perpetual cat and mouse game between malware developers and solutions providers. By drawing on the latest in evasion techniques, malware developers not only go undetected on the compromised machine but more importantly, ...

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By Dark Reading
Informa Tech
303 Second St., Suite 900 South Tower, San Francisco, CA 94107
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.