[TechWeb](
Follow Dark Reading:
[RSS](
November 23, 2019
LATEST SECURITY NEWS & COMMENTARY
[When You Know Too Much: Protecting Security Data from Security People](
As security tools gather growing amounts of intelligence, experts explain how companies can protect this data from rogue insiders and other threats.
[In the Market for a MSSP? Ask These Questions First](
Not all managed security service providers are created equal. These questions can reveal whether you are hiring the right people to help secure your business.
[What's in a WAF?](
Need a 101 lesson on Web application firewalls? Here's your crib sheet on what a WAF is, how it works, and what to look for when you're in the market for a new solution.
[How Medical Device Vendors Hold Healthcare Security for Ransom](
While being pummeled by ransomware attacks, healthcare centers also face growing IoT-related threats. Here's how they manage security amid a complex set of risks.
[New: Everything You Always Wanted to Know About Security at the Edge But Were Afraid to Ask](
The secure perimeter as we know it is dissolving. So how do you protect your crown jewels when the castle has no walls?
[Soft Skills: 6 Nontechnical Traits CISOs Need to Succeed](
Degrees, certifications, and experience are all important to career development, but mastering the people side of the equation may matter a whole lot more, CISOs say.
[The Edge Cartoon Contest: Need a Lift?](
Feeling creative? Submit your caption in the comments, and our panel of experts will reward the winner with a $25 Amazon gift card.
[MORE NEWS & COMMENTARY](
HOT TOPICS
[Why Multifactor Authentication Is Now a Hacker Target](
SIM swaps, insecure web design, phishing, and channel-jacking are four ways attackers are circumventing MFA technology, according to the FBI.
[5 Cybersecurity CISO Priorities for the Future](
Seven chief information security officers share their pain points and two-year spending plans.
[I 'Hacked' My Accounts Using My Mobile Number: Here's What I Learned](
A feature that's supposed to make your account more secure -- adding a cellphone number -- has become a vector of attack in SIM-swapping incidents. Here's how it's done and how you can protect yourself. [MORE](
EDITORS' CHOICE
[6 Top Nontechnical Degrees for Cybersecurity](
A computer science degree isn't the only path into a cybersecurity career.
[Black Hat Europe Q&A: Unveiling the Underground World of Anti-Cheats](
Security consultant Joel Noguera describes how he got involved in testing anti-cheat software security, and what to expect from his upcoming Black Hat Europe talk.
FROM THE NEWS DESK
[The 5-Step Methodology for Spotting Malicious Bot Activity on Your Network](
Bot detection over IP networks isn't easy, but it's becoming a fundamental part of network security practice.
[1.2B Records Exposed in Massive Server Leak](
A single server leaked 4 terabytes of personal data, including social media profiles, work histories, and home and mobile phone numbers.
Tech Resources
- [[Dark Reading Tech Digest] Navigating the Deluge of Security Data](
- [Tech Digest: How to Get Started with Emerging Tech](
- [[Infographic] Are You Maximizing Value of the Cloud?](
- [2019 State of DevOps](
- [Zero Trust Internet: 100% Email & Web Security](
- [The Silent Threat: Third Party Cyber Risk](
- [Rethinking Enterprise Data Defense](
[ACCESS TECH LIBRARY NOW](
- [Threat & Performance Management: 2 Key Data Sources](
This session will include demonstrations of how data sources, combined with advanced and automated analysis techniques, can help SecOps and NetOps teams to collaborate more effectively.
- [Forecast Calls for 'EPYC' Innovation and Discovery](
In this webinar, we'll discuss how new technology can help you harness AI, machine and deep learning with high performance computing (HPC). HPC is helping make the impossible possible such as transforming the treatment of diseases, cutting storm predictions in ...
[MORE WEBINARS](
FEATURED REPORTS
- [Rethinking Enterprise Data Defense](
- [2019 SANS Incident Response Survey Report](
[MORE REPORTS](
CURRENT ISSUE
[Navigating the Deluge of Security Data](
[DOWNLOAD THIS ISSUE]( [SUBSCRIBE NOW](
[BACK ISSUES]( | [MUST READS]( | [TECH DIGEST](
PRODUCTS & RELEASES
[Trend Micro Debuts Security Services Platform for Organizations Building Apps in the Cloud](
[IBM Launches Open Technology to Speed Response to Cyber Threats Across Clouds](
[Egnyte Announces New Layer In Its Industry-Leading Content Intelligence Engine](
[MORE PRODUCTS & RELEASES](
Dark Reading Daily
-- Published By [Dark Reading](
Informa Tech
303 Second St., Suite 900 South Tower, San Francisco, CA 94107
To update your profile, change your e-mail address, or unsubscribe, [click here.](
To opt-out of any future Dark Reading Daily Newsletter emails, please respond [here.](
Thoughts about this newsletter? [Give us feedback.](mailto:email@techwebnewsletters.com)
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our [Privacy Statement.](
[© 2019]( | [Informa Tech]( | [Privacy Statement]( | [Terms & Conditions]( | [Contact Us](mailto:iwkbtnnewsletters@ubm.com)