Follow Dark Reading:
 December 26, 2019
LATEST SECURITY NEWS & COMMENTARY
Santa and the Zero-Trust Model: A Christmas Story
How would the world's most generous elf operate in a world of zero-trust security? A group of cybersecurity experts lets us know.
Privacy Requirements & Penalties Grow, Causing Firms to Struggle
Between Europe's and California's privacy laws, companies have a complex landscape to navigate in 2020. Even data-mature industries, such as financial services, see problems ahead.
'Honoring' CCPA's Binding Principles Nationally Won't Be Easy
Even companies with the reach, capital, and innovative capacity of Microsoft or Google will struggle to adhere to the tenets of California's new consumer privacy law.
IoT Security: How Far We've Come, How Far We Have to Go
As organizations fear the proliferations of connected devices on enterprise networks, the private and public sector come together to address IoT vulnerabilities.
2020 & Beyond: The Evolution of Cybersecurity
As new technologies disrupt the industry, remember that security is a process, not a goal. Educate yourself on how you can best secure your corner of the Web.
5 Security Resolutions to Prevent a Ransomware Attack in 2020
Proactively consider tools to detect anomalous behavior, automatically remediate, and segment threats from moving across the network.
MORE NEWS & COMMENTARY
HOT TOPICS
Citrix Urges Firms to Harden Configurations After Flaw Report
A vulnerability in two of the company's appliances opens 80,000 networks up for exploitation.

SIM Swapping Attacks: What They Are & How to Stop Them
Fraudsters with social engineering skills are hijacking cell phone SIM cards to access victims' bitcoin and social media accounts.

20 Vulnerabilities to Prioritize Patching Before 2020
Researchers list the top 20 vulnerabilities currently exploited by attack groups around the world.

MORE
EDITORS' CHOICE

6 Traits to Develop for Cybersecurity Success
Cultivate these half-dozen qualities and watch your career soar.
The Night Before 'Breachmas'
What does identity management have to do with Charles Dickens' classic 'A Christmas Carol'? A lot more than you think.
NEW FROM THE EDGE

The Year of Magecart: How the E-Commerce Raiders Reigned in 2019
Breaching British Airways, Ticketmaster, and Macy's, Magecart attack groups sharply rose in sophistication and pervasiveness this year -- and show no signs of slowing down.
Someone's Been Very Naughty ...
Cybercriminals expose Santa's naughty list -- names and reasons -- on the Internet. "Ho, ho, ho! God, what a mess!" exclaims a source who requested anonymity.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Cloud Sprawl: It's Worse Than You Think

    Learn how to get complete visibility into your cloud infrastructure with the Expanse Internet Operations Management Platform and reduce your cloud attack surface.

  • Defeating Advanced Adversaries with Tactical Analytics

    In this webinar, you will be provided with a clear and technical plan on how to transition to SOC 3.0 and, most importantly, on how to establish a tactical analytics capability to effectively detect and defeat advanced adversaries.

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Weekly
-- Published By Dark Reading
Informa Tech
303 Second St., Suite 900 South Tower, San Francisco, CA 94107
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Weekly Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.