Follow Dark Reading:
 September 05, 2020
LATEST SECURITY NEWS & COMMENTARY
AI on the Email Offense
Mass domain purchasing enables email attackers to slip by traditional defenses. Here's how artificial intelligence can stop them.
Ad Fraud: The Multi-Billion Dollar Cybercrime CISOs Might Overlook
Marketing officers may have accepted ad fraud as a cost of doing business, but infosec pros take heed -- fraud can be a step to more significant attacks. Here's what to know and how to take action.
Hypothesis: Cyber Attackers Are After Your Scientific Research
From COVID-19 treatment to academic studies, keeping research secure is more important than ever. The ResearchSOC at Indiana University intends to help.

MFA Mistakes: 6 Ways to Screw Up Multifactor Authentication

Fearful of messing up its implementation, many enterprises are still holding out on MFA. Here's what they need to know.


Election Security's Sticky Problem: Attackers Who Don't Attack Votes

If election defenders are protecting votes, and adversaries are attacking something else entirely, both sides might claim success, "Operation BlackOut" simulation shows.


Disarming Disinformation: Why CISOs Must Fight Back Against False Info

Misinformation and disinformation campaigns are just as detrimental to businesses as they are to national elections. Here's what's at stake in 2020 and what infosec teams can do about them.


Poll: Help Wanted
Is your security team hiring?
MORE NEWS & COMMENTARY
HOT TOPICS
Ransomware Red Flags: 7 Signs You're About to Get Hit
Caught off guard by a ransomware attack? Security experts say the warning signs were there all along.

'Transparent Tribe' APT Group Deploys New Android Spyware for Cyber Espionage
The group, which has been around since at least 2013, has impacted thousands of organizations, mostly in India.

Testing & Automation Pay Off for NSA's DevSecOps Project
Communication with stakeholders, extensive testing, and robust automation pays dividends for military intelligence agency, one of several presenters at GitLab's virtual Commit conference.

MORE
EDITORS' CHOICE

5 Tips for Triaging Risk from Exposed Credentials
Not all exposed usernames and passwords present a threat. Here's how to quickly identify the ones that do.
Strategic Cyber Warfare Heats Up
It's "anything goes," according to renowned hacker the Grugq, who drew a bright line between cyberwar and cyber warfare at this week's virtual Disclosure Conference.
DARK READING NEWS & COMMENTARY

The Hidden Security Risks of Business Applications
Today's enterprises depend on mission-critical applications to keep them productive, help better serve customers, and keep up with demand. It's important that they also know the risks.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Making Zero-Trust Work for Work From Home

    In this Dark Reading webinar, learn how to make layered, zero-trust architecture work among today's business realities.

  • Cyber Attack Evasion Techniques

    When it comes to evasion techniques there's a perpetual cat and mouse game between malware developers and solutions providers. By drawing on the latest in evasion techniques, malware developers not only go undetected on the compromised machine but more importantly, ...

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By Dark Reading
Informa Tech
303 Second St., Suite 900 South Tower, San Francisco, CA 94107
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.