Follow Dark Reading:
 March 26, 2020
LATEST SECURITY NEWS & COMMENTARY
Missing Patches, Misconfiguration Top Technical Breach Causes
Less than half of businesses surveyed can patch critical vulnerabilities within 72 hours. Why does the process take so long?
COVID-19: Getting Ready for the Next Business Continuity Challenge
What comes after you've empowered your remote workforce in the wake of the coronavirus pandemic? Dealing with a large portion of that workforce getting sick at the same time.
Do DevOps Teams Need a Company Attorney on Speed Dial?
In today's regulatory and legislative environment, companies and individuals are exposed to lawsuits over security breaches, resulting in significant fines and ending careers.
FBI Shutters Russian-Based Hacker Platform, Makes Arrest
The Deer.io platform let cybercriminals buy access to virtual storefronts where they could sell illicit products and services.
Tupperware Hit By Card Skimmer Attack
Malicious code was found hidden inside graphics files on the storage container maker's e-commerce website.
MORE NEWS & COMMENTARY
HOT TOPICS
8 Infosec Page-Turners for Days Spent Indoors
Stuck inside and looking for a new read? Check out these titles written by security practitioners and reporters across the industry.

200M Records of US Citizens Leaked in Unprotected Database
Researchers have not determined who owns the database, which was one of several large exposed instances disclosed this week.

How Security Leaders at Starbucks and Microsoft Prepare for Breaches
Executives discuss the security incidents they're most worried about and the steps they take to prepare for them.

MORE
EDITORS' CHOICE

Security Lessons We've Learned (So Far) from COVID-19
Takeaways about fighting new fires, securely enabling remote workforces, and human nature during difficult times.
How to Secure Your Kubernetes Deployments
As more companies shift their software to a microservices-based architecture and orchestrate their containerized applications in Kubernetes, distributed security controls become a must.
NEW FROM THE EDGE

What Should I Do If Someone Is Impersonating My Company in a Phishing Campaign?
Two security awareness advocates from KnowBe4 provide some solid suggestions.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Building a Strategy for Detection and Response

    Hear as top industry experts discuss how to create a strategy that enables the enterprise security team to do detection and response across a wide variety of technologies and services.

  • The 6 Must-Haves for Practical Cloud Security

    Join us for this webinar in which we will share lessons learned from nine years of working with leading cloud adopters including household names in streaming content, wireless and telecom providers, worldwide gaming networks, financial institutions, and SaaS providers.

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By Dark Reading
Informa Tech
303 Second St., Suite 900 South Tower, San Francisco, CA 94107
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.