Follow Dark Reading:
 August 26, 2019
LATEST SECURITY NEWS & COMMENTARY
10 Low-Cost (or Free!) Ways to Boost Your Security AI Skills
The following hardware and software options will amplify your know-how about artificial intelligence and how to apply it to security - without busting any budgets.
80 Charged in Massive BEC Operation Bust
A group of mostly Nigerian nationals attempted to steal $46 million through business email compromise and romance scams, the FBI reports.
Capital One Breach: What Security Teams Can Do Now
Knowing the methods of the attacker, as laid out in the federal indictment, allow us to prevent similar attacks.
IBM Announces Quantum Safe Encryption
Techniques too tough for quantum computing solutions will be part of public cloud and tape storage encryption.
VMware to Buy Carbon Black for $2.1B
Virtual machine giant's big cloud move includes plans to shell out $2.7 billion in stock transactions for Pivotal Software.

Cartoon: Identity Theft Mitigation

Start your week with a smile with John Klossner's latest cartoon.


MORE NEWS & COMMENTARY
HOT TOPICS
Towns Across Texas Hit in Coordinated Ransomware Attack
The state government and cybersecurity groups have mobilized to respond to a mass ransomware attack that simultaneously hit 22 different towns statewide.

Apple Misstep Leaves iPhones Open to Jailbreak
Newest version of iOS contains a critical bug that the company had previously already patched.

10 Low-Cost (or Free!) Ways to Boost Your Security AI Skills
The following hardware and software options will amplify your know-how about artificial intelligence and how to apply it to security - without busting any budgets.

MORE
EDITORS' CHOICE

5 Ways to Improve the Patching Process
So many software vulnerabilities, so little time. But failure to patch them can have serious consequences. Here's help for overwhelmed security teams.
Threat Intelligence Gateways: A Useful Adjunct to Overworked Perimeter Security
Comparative research shows the relative strengths and weaknesses of five TIG vendors and which kinds of security organization will reap the most benefit.
NEW FROM THE EDGE

Clogged Cache? The Edge Cartoon Contest Winners
Creativity flowed, but two captions rose to the top.
Tech Resources
ACCESS TECH LIBRARY NOW

MORE WEBINARS
FEATURED REPORTS
  • Threat Report: Autonomous Response

    This report details seven case studies of attacks that were intercepted and neutralized by cyber defense AI, including insider threat, ransomware, and IoT attacks.

  • State of the Cloud

    This research report will delve into public, private and hybrid cloud adoption trends, with a special focus on infrastructure as a service and its role in the enterprise. Find out the challenges organizations are experiencing, and the technologies and strategies ...

MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.