Follow Dark Reading:
 January 26, 2021
LATEST SECURITY NEWS & COMMENTARY
How to Better Secure Your Microsoft 365 Environment
Security experts offer Microsoft 365 security guidance as more attackers target enterprise cloud environments.
Critical Vulns Discovered in Vendor Implementations of Key OT Protocol
Flaws allow denial-of-service attacks and other malicious activity, Claroty says.
SonicWall Is Latest Security Vendor to Disclose Cyberattack
The network security firm is investigating a coordinated campaign in which attackers exploited vulnerabilities in SonicWall's products.
(Sponsored Article) Centralized Security Policy Management Across Hybrid Cloud Environments Should be an Obvious Strategy
If cloud adoption continues to grow at the anticipated rate over the next few years, the mandate to deploy a strategy that includes a centralized security policy management will also grow. Comprehensive visibility and the ability to quickly apply policies at the most granular levels will allow enterprises to embrace the agility of a more secure cloud with confidence.
2020's COVID Accelerated Digitalization Demands Stronger Cybersecurity in 2021
As critical infrastructure faces increasing and sophisticated attacks, these trends will enable the energy sector to shore up its cybersecurity defenses.
Small Security Teams Have Big Security Fears, CISOs Report
Researchers poll security leaders who are tasked with protecting large organizations but have a small presence and budget.
Deloitte & Touche Buys Threat-Hunting Firm
Root9B (R9B) offers threat hunting and other managed security services.
MORE NEWS & COMMENTARY
HOT TOPICS
Breach Data Shows Attackers Switched Gears in 2020
Attackers focused more on ransomware, while the consolidation of data into large databases led to fewer reported breaches but more records leaked.

Rethinking IoT Security: It's Not About the Devices
Keeping IoT safe in the future will require securing the networks themselves. Focusing on the devices is a never-ending battle that will only become more burdensome.

SolarWinds Attack Underscores 'New Dimension' in Cyber-Espionage Tactics
Meanwhile, Malwarebytes is the latest victim, Symantec discovers a fourth piece of malware used in the massive attack campaign, and FireEye Mandiant releases a free tool to help spot signs of the attack.

MORE
EDITORS' CHOICE

7 Steps to Secure a WordPress Site
Many companies operate under the assumption that their WordPress sites are secure -- and that couldn't be anything further from the truth.
Why North Korea Excels in Cybercrime
North Korea is laser-focused on boosting its cyber capabilities, and it's doing a remarkable job of it.
LATEST FROM THE EDGE

Comparing Different AI Approaches to Email Security
Get to know the difference between "supervised" and "unsupervised" machine learning.
Tech Resources
ACCESS TECH LIBRARY NOW

  • A Radical Approach to Threat Intel Management

    What's the point of collecting tactical information that your team can't act on or map to what's happening in your environment? As a security leader, you need more from your cyber threat intelligence program.

  • Robotic Processing Can Automate Your Business Processes

    Robotic process automation (RPA) is no longer confined to the domain of scientific research and advanced robotics - it's swiftly becoming a valuable enterprise technology platform for advancing business process automation. In this webinar, learn how to save time by ...

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By Dark Reading
Informa Tech
303 Second St., Suite 900 South Tower, San Francisco, CA 94107
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.