Follow Dark Reading:
 May 01, 2017
LATEST SECURITY NEWS & COMMENTARY
10 Cybercrime Myths that Could Cost You Millions
Don't let a cybersecurity fantasy stop you from building the effective countermeasures you need to protect your organization from attack.
Ransomware Payout Doesn't Pay Off
About 40% of small- and midsized businesses hit with ransomware paid their attackers, but less than half got their information back.
Fileless Malware Attacks Continue to Gain Steam
Endpoint woes grow as fileless attacks grow in prevalence and file-based attacks remain largely undetected by AV engines.
A Day in the Life of a Security Avenger
Behind the scenes with a security researcher as we follow her through a typical day defending the world against seemingly boundless cyberthreats and attacks
Verizon DBIR Shows Attack Patterns Vary Widely By Industry
It's not always the newest or the most sophisticated threat you need to worry about, Verizon's breach and security incident data for 2016 shows.
MORE NEWS & COMMENTARY
HOT TOPICS
New OWASP Top 10 Reveals Critical Weakness in Application Defenses
It's time to move from a dependence on the flawed process of vulnerability identification and remediation to a two-pronged approach that also protects organizations from attacks.

OWASP Top 10 Update: Is It Helping to Create More Secure Applications?
What has not been updated in the new Top 10 list is almost more significant than what has.

INTERPOL Operation Sweeps Up Thousands of Cybercrime Servers Used for Ransomware, DDoS, Spam
Massive public-private 'cyber surge' in Asia identifies hundreds of compromised websites in operation that spans multiple cybercriminal groups, activities.

MORE
EDITORS' CHOICE

6 Steps to Find Your Next Dozen Cloud Security Experts
There's stiff competition for cloud security experts, but finding yours may actually be easier than you think.

Name That Toon: Screen Sharing

Submit your caption in the comments, and our panel of experts will reward the winner with a $25 Amazon gift card.


Tech Resources
ACCESS TECH LIBRARY NOW

  • Research Results Revealed: The State of Analytics

    How does your analytics initiative shape up? Are you keeping pace with your peers in other organizations? Do you have data scientists in lead roles? Are you driving innovation with data? Have you embarked on Internet of Things (IoT) projects? ...

  • [Ransomware] Remediation & Recovery

    You've been hit by ransomware - and hit hard. Your organization has decided it won't give in to the attackers' demands for a ransom. Now what?

MORE WEBINARS

Partner Perspectives

Locky Returns with a New (Borrowed) Distribution Method
A layered defense is a strong security posture for dealing with a threat like Locky, that can come in different disguises.

Cybercrime Tactics & Techniques: Q1 2017
A deep dive into the threats that got our attention during the first three months of the year - and what to expect going forward.

Securing your Privacy on Android
If you work at a company that allows you to use your mobile device to login to email, access company data, or connect to company Wi-Fi, you're more of a security risk than you think.

FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.