Follow Dark Reading:
 September 21, 2017
LATEST SECURITY NEWS & COMMENTARY
1.9 Billion Data Records Exposed in First Half of 2017
Every second, 122 records are exposed in breaches around the globe, a new report shows. And that's doesn't even include the new Equifax breach data.
New Spam Campaign Literally Doubles Down on Ransomware
An upgraded spam campaign alternates Locky and FakeGlobe ransomware, forcing victims to pay twice or lose all their data.
Equifax Exec Departures Raise Questions About Responsibility for Breach
Disclosed details suggest a failure by the technology team but senior executives and the board are not above responsibility as well, experts say.
OPM Data Breach Lawsuit Tossed, Fed Plaintiffs will Appeal
A judge ruled federal employees cannot sue for damages from the 2015 Office of Personnel Management data breach.
Public, Hybrid Cloud Security Fears Abound
Most CISOs say encryption is the most effective security tool for data in the public cloud, but only one in six encrypt all data stored there.
To Be Ready for the Security Future, Pay Attention to the Security Past
It's easy to just move on to the next problem, ignoring what's happened -- but that's a mistake.
MORE NEWS & COMMENTARY
HOT TOPICS
Siemens' New ICS/SCADA Security Service a Sign of the Times
Major ICS/SCADA vendors are entering the managed security services business with cloud-based offerings for energy and other industrial sectors.

How Apple's New Facial Recognition Technology Will Change Enterprise Security
Expect a trickle-down effect, as tech similar to Face ID becomes offered outside of Apple.

MORE
EDITORS' CHOICE

10 Hot Cybersecurity Funding Rounds in Q3
The first two quarters of 2017 have been the most active ever in five years from a cybersecurity investment standpoint. Here's how the third quarter has shaped up.
Get Serious about IoT Security
These four best practices will help safeguard your organization in the Internet of Things.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Security Implications of Using VoIP & SIP

    This webinar will examine the security implications of using VoIP and SIP, how to best protect real-time communications traffic with tools you already have as well as with new tools, and how to orchestrate protections to prevent UC security from ...

  • Threat Intelligence Overload?

    A wide range of threat intelligence feeds and services have cropped up keep IT organizations up to date on the latest security threats. But without mechanisms in place to actually use the information, these alerts provide little benefit.

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Weekly
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Weekly Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.