Follow Dark Reading:
 November 15, 2019
LATEST SECURITY NEWS & COMMENTARY
Attacks on Healthcare Jump 60% in 2019 - So Far
Well-known Trojans Emotet and Trickbot are cybercriminals' favorite weapons in their campaigns.
5 Cybersecurity CISO Priorities for the Future
Seven chief information security officers share their pain points and two-year spending plans.
Symantec, McAfee Patch Privilege Escalation Bugs
All versions of endpoint protection software from both vendors were susceptible to near identical issue, SafeBreach says.
How Does Your Cyber Resilience Measure Up?
The security measures companies take today may not be enough for tomorrow's cyber assault, but switching to a proactive, risk-based framework may better protect your organization.
BSIMM10 Shows Industry Vertical Maturity
The Building Security In Maturity Model is the only detailed measuring stick for software security initiatives, and it continues to evolve.
Capture the Flag Planned to Find Missing Persons Information
The competition, launched by SANS and Trace Labs, will put to use open source information in search of new clues.
US-CERT Warns of Remotely Exploitable Bugs in Medical Devices
Vulnerabilities in key surgical equipment could be remotely exploited by a low-skill attacker.
MORE NEWS & COMMENTARY
HOT TOPICS
SHAKEN/STIR: Finally! A Solution to Caller ID Spoofing?
The ubiquitous Caller ID hasn't changed much over the years, but the technology to exploit it has exploded. That may be about to change.

Ring Flaw Underscores Impact of IoT Vulnerabilities
A vulnerability in Amazon's Ring doorbell cameras would have allowed a local attacker to gain access to a target's entire wireless network.

Researchers Find New Approach to Attacking Cloud Infrastructure
Cloud APIs' accessibility over the Internet opens a new window for adversaries to gain highly privileged access to cloud assets.

MORE
EDITORS' CHOICE

6 Small-Business Password Managers
The right password manager can help bring enterprise-class security to small businesses. Here are a half-dozen candidates to strengthen your access management.
Unreasonable Security Best Practices vs. Good Risk Management
Perfection is impossible, and pretending otherwise just makes things worse. Instead, make risk-based decisions.
NEW FROM THE EDGE

8 Backup & Recovery Questions to Ask Yourself
Don't wait until after a disaster, DDoS, or ransomware attack to learn just how good your backups really are.
I'm Setting Up a Bug-Bounty Program. What Should I be Thinking About?
Here are some important points to factor into your vulnerability disclosure policy.
Tech Resources
ACCESS TECH LIBRARY NOW

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By Dark Reading
Informa Tech
303 Second St., Suite 900 South Tower, San Francisco, CA 94107
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.