[TechWeb](
Follow Dark Reading:
[RSS](
September 08, 2020
LATEST SECURITY NEWS & COMMENTARY
[Collection of Metadata -- as Done by the NSA -- Likely Unconstitutional, US Court Suggests](
A ruling in an appeal by four men convicted of material support for terrorism finds that the National Security Agency's metadata collection program not only violated the prevailing law at the time but was also likely unconstitutional.
[DDoS Attacks on Education Escalate in 2020](
The number of DDoS attacks affecting educational resources was far higher between February and June 2020 compared with 2019.
[Warner Music Group Admits Breach](
The months-long breach hit financial details for customers.
[Strategic Cyber Warfare Heats Up](
It's "anything goes," according to renowned hacker the Grugq, who drew a bright line between cyberwar and cyber warfare at this week's virtual Disclosure Conference.
[The Hidden Security Risks of Business Applications](
Today's enterprises depend on mission-critical applications to keep them productive, help better serve customers, and keep up with demand. It's important that they also know the risks.
EDITORS' CHOICE
[5 Tips for Triaging Risk from Exposed Credentials](
Not all exposed usernames and passwords present a threat. Here's how to quickly identify the ones that do.
[5 Ways for Cybersecurity Teams to Work Smarter, Not Harder](
Burnout is real and pervasive, but some common sense tools and techniques can help mitigate all that. [MORE NEWS & COMMENTARY](
HOT TOPICS
[The Hidden Costs of Losing Security Talent](
One person's exit can set off a chain of costly events.
[Most IoT Hardware Dangerously Easy to Crack](
Manufacturers need to invest more effort into protecting root-level access to connected devices, security researcher says.
[Beyond Burnout: What Is Cybersecurity Doing to Us?](
Infosec professionals may feel not only fatigued, but isolated, unwell, and unsafe. And the problem may hurt both them and the businesses they aim to protect.
[MORE](
LATEST FROM THE EDGE
[How Cybercriminals Take the Fun Out of Gaming](
It's all fun and games until someone loses their V-Bucks, right? Here's how cyberattackers are cheating the gaming biz -- and winning big.
[Ad Fraud: The Multibillion-Dollar Cybercrime CISOs Might Overlook](
Marketing officers may have accepted ad fraud as a cost of doing business, but infosec pros take heed -- fraud can be a step to more significant attacks. Here's what to know and how to take action.
[Name That Toon: Mask Out](
Feeling creative? Submit your caption in the comments, and our panel of experts will reward the winner with a $25 Amazon gift card.
Tech Resources
- [IT Automation: Do More with Less](
- [The Best Free Vulnerability Management Tools](
- [Antigena Email: Building Immunity for Your Inbox](
- [Reference Architecture: Risk-Based Vulnerability Management](
- [Threat Intelligence Spotlight: Hunting Evasive Malware](
- [Dual-Track Transformation: Getting IT a Seat at the Strategy Table](
- [7 New Cybersecurity Vulnerabilities That Could Put Your Enterprise at Risk](
[ACCESS TECH LIBRARY NOW](
- [Network Security: The Attacker's Point of View](
Over the years, IT organizations have approached network security from an enterprise point of view, establishing a perimeter of known devices and defending it with firewalls and security gateways. But today's online attackers often bypass these defenses, entering the network ...
- [DevOps: Innovating with Speed, Security, and Quality](
In this webinar, we'll dive into the world of DevOps from multiple angles. We'll look at it from an executive's perspective, as well as the practitioner. We'll discuss things that go wrong, improving the quality of your DevOps processes, and ...
[MORE WEBINARS](
FEATURED REPORTS
- [Online Threats -- and What Your Org Can Do About Them](
- [Connecting the Dots: Key strategic opportunities in a post-COVID-19 world](
The ongoing COVID-19 pandemic has precipitated the acceleration of tech megatrends already underway across key segments ranging from online services, to capital spending, to the cloud, to the electronics supply chain. Our latest report provides insights and draws connections between ...
[MORE REPORTS](
CURRENT ISSUE
[7 New Cybersecurity Vulnerabilities That Could Put Your Enterprise at Risk](
[DOWNLOAD THIS ISSUE]( [SUBSCRIBE NOW](
[BACK ISSUES]( | [MUST READS]( | [TECH DIGEST](
PRODUCTS & RELEASES
[(ISC)2 Shares Blueprint for Building Formal, Enterprise-Wide Cybersecurity Training Programs](
[Entersekt Rolls Out Behavioral Analytics for Real-time Risk Scoring With NuData Security](
[Secure-IC & NSITEXE Form a Global Partnership to Jointly Provide Security Solutions for Cyber-Physical Systems (CPS)](
[MORE PRODUCTS & RELEASES](
Dark Reading Daily
-- Published By [Dark Reading](
Informa Tech
303 Second St., Suite 900 South Tower, San Francisco, CA 94107
To update your profile, change your e-mail address, or unsubscribe, [click here.](
To opt-out of any future Dark Reading Daily Newsletter emails, please respond [here.](
Thoughts about this newsletter? [Give us feedback.](mailto:customerservice_informationhub@techweb.com)
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our [Privacy Statement.](
[© 2020]( | [Informa Tech]( | [Privacy Statement]( | [Terms & Conditions]( | [Contact Us](mailto:customerservice_informationhub@techweb.com)