Follow Dark Reading:
 January 16, 2020
LATEST SECURITY NEWS & COMMENTARY
New Report Spotlights Changes in Phishing Techniques
Common and evolving strategies include the use of zero-font attacks, homograph attacks, and new tactics for fake attachments.
2017 Data Breach Will Cost Equifax at Least $1.38 Billion
Company agrees to set aside a minimum of $380.5 million as breach compensation and spend another $1 billion on transforming its information security over the next five years. The 147 million US consumers affected by the breach have one week from today to file a claim.
Google Lets iPhone Users Turn Device into Security Key
The iPhone can now be used in lieu of a physical security key as a means of protecting Google accounts.
Why Firewalls Aren't Going Anywhere
Written off multiple times as obsolete, firewalls continue to elude demise by adding features and ensuring that VPNs keep humming.
How SD-WAN Helps Achieve Data Security and Threat Protection
Enterprises currently consider the technology a best practice because of its flexibility, scalability, performance, and agility.
ISACs Join Forces to Secure the Travel Industry
Together, the Travel & Hospitality ISAC and the Retail & Hospitality ISAC intend to improve communications and collaboration about the evolving threat landscape.
MORE NEWS & COMMENTARY
HOT TOPICS
6 Unique InfoSec Metrics CISOs Should Track in 2020
You might not find these measurements on a standard cybersecurity department checklist. But they can help evaluate risks you haven't even considered yet.

Chinese Malware Found Preinstalled on US Government-Funded Phones
Researchers found unremovable malware preinstalled in the Unimax U686CL, a budget Android device sold by Assurance Wireless.

Microsoft Patches Windows Vuln Discovered by the NSA
The National Security Agency is publicly acknowledged for its finding and reporting of CVE-2020-0601, marking the start of what it says is a new approach to security.

MORE
EDITORS' CHOICE

7 Free Tools for Better Visibility Into Your Network
It's hard to protect what you don't know is there. These free tools can help you understand just what it is that you need to protect -- and need to protect yourself from.

Take Our New Incident Response Survey

How well is your organization’s response processes, and how might technologies evolve in the future? We want to hear your experiences and views. Responses are completely anonymous, and those who complete the survey will be eligible to enter a drawing where five winners will receive a $50 Amazon gift card from Informa Tech.


NEW FROM THE EDGE

How to Comprehend the Buzz About Honeypots
Honeypots are crucial tools for security researchers and security teams. Understanding what they are and what they can do can be critical for making them safe and useful for your organization.
Tech Resources
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By Dark Reading
Informa Tech
303 Second St., Suite 900 South Tower, San Francisco, CA 94107
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.