[TechWeb](
Follow Dark Reading:
[RSS](
May 27, 2020
LATEST SECURITY NEWS & COMMENTARY
[Q&A: Eugene Kaspersky on Tourism, the Pandemic, and Cybersecurity](
The CEO and co-founder of eponymously named security vendor has launched a new travel accelerator program amid the COVID-19 crisis.
[StrandHogg 2.0 Emerges as 'Evil Twin' to Android Threat](
The vulnerability, which exists in almost every version of Android, is both more dangerous and harder to detect than its predecessor.
[Content Delivery Networks Adding Checks for Magecart Attacks](
Modern web applications make significant use of third-party code to drive innovation, but the software supply chain has also turned into a major source of threat. CDNs aim to change that.
[Turla Backdoor Adds Gmail Web Interface for Command-and-Control](
The latest version of ComRAT is another sign of the threat actor's continued focus on targets in the government, military, and other sectors.
[The Problem with Artificial Intelligence in Security](
Any notion that AI is going to solve the cyber skills crisis is very wide of the mark. Here's why.
[Americans Care About Security But Don't Follow Through](
Most Americans say they're very concerned about online security but still behave in insecure ways, according to a new survey.
[World Leaders Urge Action Against Healthcare Cyberattacks](
The global call to end cybercrime targeting healthcare facilities has been signed by government leaders and Nobel laureates.
[COVID-19: Latest Security News & Commentary](
Check out Dark Reading's updated, exclusive news and commentary surrounding the coronavirus pandemic. [MORE NEWS & COMMENTARY](
HOT TOPICS
[Is Zero Trust the Best Answer to the COVID-19 Lockdown?](
Enterprises need to recognize that remote access and other pandemic-related security challenges cannot be fixed with buzzwords or silver-bullet security tools.
[Security 101: Cross-Site Scripting](
Cross-site scripting has been around longer than most security professionals have been on the job. Why is it still such an issue when we've known about it for so long?
[60% of Insider Threats Involve Employees Planning to Leave](
Researchers shows most "flight-risk" employees planning to leave an organization tend to start stealing data two to eight weeks before they go. [MORE](
EDITORS' CHOICE
[10 iOS Security Tips to Lock Down Your iPhone](
Mobile security experts share their go-to advice for protecting iPhones from hackers, thieves, and fraudsters.
[Benefits of a Cloud-Based, Automated Cyber Range](
A cyber range is an irreplaceable tool that allows cybersecurity professionals to improve their response capabilities as well as their ability to identify risks.
NEW FROM THE EDGE
[How to Pay a Ransom](
Even prior to the COVID-19 pandemic, ransomware attacks were on the rise and becoming more expensive. Now your organization has fallen victim and is going to pay. Here's how to handle it.
Tech Resources
- [3 Reasons Why Your Remote Workforce is Vulnerable](
- [Security Intelligence: Driving Security From Analytics to Action](
- [Global Application and Network Security Report](
- [2020 Security Trends to Watch](
- [How Cybersecurity Incident Response Programs Work (and Why Some Don't)](
- [Case Study: Continuously Validate Cybersecurity Controls](
- [Cabinet-Level Electronic Access Control for Data Security and Compliance](
[ACCESS TECH LIBRARY NOW](
- [The Future of the SOC](
In this webinar, top experts will discuss the long-term evolution of SOC technology, staffing, and processes, and how your enterprise can prepare today to implement the SOC of tomorrow.
- [5 Steps to Integrate SAST into the DevSecOps Pipeline](
Join us as we walk you through the challenges and benefits of integrating a SAST tool into your DevSecOps pipeline and how we've helped other organizations with this process.
[MORE WEBINARS](
FEATURED REPORTS
- [The State of IT Operations and Cybersecurity Operations 2020](
Learn more about how today's IT operations teams work with cybersecurity operations, what technologies they are using, and how they communicate and share responsibility--or create risk by failing to do so.
- [Collective Offense Calls for Collective Defense](
[MORE REPORTS](
CURRENT ISSUE
[How Cybersecurity Incident Response Programs Work (and Why Some Don't)](
[DOWNLOAD THIS ISSUE]( [SUBSCRIBE NOW](
[BACK ISSUES]( | [MUST READS]( | [TECH DIGEST](
PRODUCTS & RELEASES
[Avanan Introduces Cloud-based Security for Citrix ShareFile](
[FireEye Endpoint Security: Introducing Innovation Architecture for Rapid Deployment of Advanced Capabilities](
[Smarsh Acquires Entreda, Leader in Cybersecurity Risk & Compliance Software for Wealth Management Industry](
[MORE PRODUCTS & RELEASES](
Dark Reading Daily
-- Published By [Dark Reading](
Informa Tech
303 Second St., Suite 900 South Tower, San Francisco, CA 94107
To update your profile, change your e-mail address, or unsubscribe, [click here.](
To opt-out of any future Dark Reading Daily Newsletter emails, please respond [here.](
Thoughts about this newsletter? [Give us feedback.](mailto:customerservice_informationhub@techweb.com)
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our [Privacy Statement.](
[© 2020]( | [Informa Tech]( | [Privacy Statement]( | [Terms & Conditions]( | [Contact Us](mailto:customerservice_informationhub@techweb.com)