Follow Dark Reading:
 September 17, 2019
LATEST SECURITY NEWS & COMMENTARY
US Turning Up the Heat on North Korea's Cyber Threat Operations
Sanctions on North Korean nation-state hacking groups came amid reports of fresh malicious campaigns directed at US entities from the isolated nation.
Data Leak Affects Most of Ecuador's Population
An unsecured database containing 18GB of data exposed more than 20 million records, most of which held details about Ecuadorian citizens.
Oracle Expands Cloud Security Services at OpenWorld 2019
The company broadens its portfolio with new services developed to centralize and automate cloud security.
Preventing PTSD and Burnout for Cybersecurity Professionals
The safety of our digital lives is at stake, and we need to all do our part in raising awareness of these issues.
Court Rules In Favor of Firm 'Scraping' Public Data
US appeals court said a company can legally use publicly available LinkedIn account information.
MORE NEWS & COMMENTARY
HOT TOPICS
APIs Get Their Own Top 10 Security List
OWASP's new list of API weaknesses focuses on issues that have caused recent data breaches and pose common security hazards in modern cloud-based applications.

Security Pros' Painless Guide to Machine Intelligence, AI, ML & DL
Artificial intelligence, machine learning, or deep learning? Knowing what the major terms really mean will help you sort through the morass of words on the subject and the security uses of each.

More Than 99% of Cyberattacks Need Victims' Help
Research highlights how most criminals exploit human curiosity and trust to click, download, install, open, and send money or information.

MORE
EDITORS' CHOICE

6 Questions to Ask Once You've Learned of a Breach
With GDPR enacted and the California Consumer Privacy Act on the near horizon, companies have to sharpen up their responses. Start by asking these six questions.
Firmware: A New Attack Vector Requiring Industry Leadership
It's time for cybersecurity manufacturers and solution providers to step up and show leadership in addressing firmware security. Read why and how.
NEW FROM THE EDGE

How a PIA Can CYA
More than a compliance mandate, privacy impact assessments can also spot risks early in the product development cycle.
Tech Resources
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.