Follow Dark Reading:
 November 12, 2019
LATEST SECURITY NEWS & COMMENTARY
Researchers Find New Approach to Attacking Cloud Infrastructure
Cloud APIs' accessibility over the Internet opens a new window for adversaries to gain highly privileged access to cloud assets.
5 Security Processes You Shouldn't Overlook During M&A
Security needs to be a central element of due diligence if a merger or acquisition is to succeed
Joker's Stash Puts $130M Price Tag on Credit Card Database
A new analysis advises security teams on what they should know about the underground payment card seller.
OpenText to Buy Carbonite for $800M Cash in $1.42B Deal
The acquisition was confirmed just six months after Carbonite bought Webroot.

Name That Toon: Endpoint Protection

Enter the latest Dark Reading caption contest. We provide the cartoon. You write the caption. Winner takes home an Amazon gift card!


MORE NEWS & COMMENTARY
HOT TOPICS
32,000+ WiFi Routers Potentially Exposed to New Gafgyt Variant
Researchers detect an updated Gafgyt variant that targets flaws in small office and home wireless routers from Zyxel, Huawei, and Realtek.

Find New Talent, Don't Fight Over CISSPs: Insights from (ISC)2 COO
The skills gap will only be closed by attracting and retaining new talent. So don't limit your talent search to CISSPs, says the COO of the organization that issues the CISSP certification.

Ring Flaw Underscores Impact of IoT Vulnerabilities
A vulnerability in Amazon's Ring doorbell cameras would have allowed a local attacker to gain access to a target's entire wireless network.

MORE
EDITORS' CHOICE

6 Small-Business Password Managers
The right password manager can help bring enterprise-class security to small businesses. Here are a half-dozen candidates to strengthen your access management.
Learn the Latest Exploit Techniques at Black Hat Europe
Master new exploit techniques for Microsoft RDP, Java remote protocols at Black Hat Europe in London next month.
NEW FROM THE EDGE

Account Fraud Harder to Detect as Criminals Move from Bots to 'Sweat Shops'
Cheap labor, frequent data breaches, and better fraud detection technology are fueling frustrating changes in attackers' methods.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Do You Really Know What's Running on Your Network?

    Everyone thinks they know what applications and data are on their network, but is that really the case? Join us for an information-packed webinar devoted to network and application visibility. For network architects and SecOps alike, you'll learn invaluable information ...

  • Dark Reading Virtual Event: Data Protection 101

    This Dark Reading virtual event offers a look at the latest tools, strategies, and best practices for protecting your organization's most sensitive data. View it on-demand today!

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By Dark Reading
Informa Tech
303 Second St., Suite 900 South Tower, San Francisco, CA 94107
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.