Follow Dark Reading:
 January 14, 2021
LATEST SECURITY NEWS & COMMENTARY
Virtual Pen-Testing Competition Tasks College Students With Running a Red Team Operation
Aimed at developing offensive cyber talent, last weekend's sixth annual Collegiate Penetration Testing Competition brought out some of the brightest from RIT and Stanford, among other universities.
SolarWinds Attackers May Have Hit Mimecast, Driving New Concerns
Mimecast no longer uses the SolarWinds Orion network management software that served as an attack vector for thousands of organizations.
The Data-Centric Path to Zero Trust
Data is an organization's most valuable asset, so a data-centric approach would provide the best value for organizations, now and in the future.
Huntress Acquires EDR Technology From Level Effect
Huntress seeks to improve its detection and response capabilities with a more comprehensive view of endpoint security.
MORE NEWS & COMMENTARY
HOT TOPICS
Security Operations Struggle to Defend Value, Keep Workers
Companies continue to value security operations centers but the economics are increasingly challenging, with high analyst turnover and questions raised over return on investment.

Microsoft Defender Zero-Day Fixed in First Patch Tuesday of 2021
Microsoft patched 83 bugs, including a Microsoft Defender zero-day and one publicly known elevation of privilege flaw.

SolarWinds Hack Lessons Learned: Finding the Next Supply Chain Attack
The SolarWinds supply chain compromise won't be the last of its kind. Vendors and enterprises alike must learn and refine their detection efforts to find the next such attack.

MORE
EDITORS' CHOICE

More SolarWinds Attack Details Emerge
A third piece of malware is uncovered, but there are still plenty of unknowns about the epic attacks purportedly out of Russia.
Over-Sharer or Troublemaker? How to Identify Insider-Risk Personas
It's past time to begin charting insider risk indicators that identify risky behavior and stop it in its tracks.
LATEST FROM THE EDGE

Understanding TCP/IP Stack Vulnerabilities in the IoT
Internet of Things devices are highly susceptible to attacks, breaches, and flaws emanating from issues within the TCP/IP network communications architecture. Here's an overview of what you need to know to mitigate risks.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Making Cybersecurity Work in Small and Medium-Sized Businesses

    In this webinar, experts offer tips and recommendations for securing the smaller enterprise, and for implementing simple, affordable tools and best practices that make sense for resource-limited SMB.

  • ROI and Beyond for the Cloud

    Moving to the cloud isn't just about pulling expensive equipment out of a data center. Going with a cloud provider involves its own set of costs. However, a cloud strategy offers other business benefits, some that can be calculated on ...

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By Dark Reading
Informa Tech
303 Second St., Suite 900 South Tower, San Francisco, CA 94107
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.