Follow Dark Reading:
 December 27, 2018
LATEST SECURITY NEWS & COMMENTARY
2018 In the Rearview Mirror
Among this year's biggest news stories: epic hardware vulnerabilities, a more lethal form of DDoS attack, Olympic 'false flags,' hijacked home routers, fileless malware - and a new world's record for data breaches.
Spending Spree: What's on Security Investors' Minds for 2019
Cybersecurity threats, technology, and investment trends that are poised to dictate venture capital funding in 2019.
Security 101: How Businesses and Schools Bridge the Talent Gap
Security experts share the skills companies are looking for, the skills students are learning, and how to best find talent you need.
Attackers Use Scripting Flaw in Internet Explorer, Forcing Microsoft Patch
Microsoft issues an emergency update to its IE browser after researchers notified the company that a scripting engine flaw is being used to compromised systems.
Privacy Futures: Fed-up Consumers Take Their Data Back
In 2019, usable security will become the new buzzword and signal a rejection of the argument that there must be a trade-off between convenience and security and privacy.
MORE NEWS & COMMENTARY
HOT TOPICS
6 Ways to Anger Attackers on Your Network
Because you can't hack back without breaking the law, these tactics will frustrate, deceive, and annoy intruders instead.

How to Optimize Security Spending While Reducing Risk
Risk scoring is a way of getting everyone on the same page with a consistent, reliable method of gathering and analyzing security data.

3 Reasons to Train Security Pros to Code
United Health chief security strategist explains the benefits the organization reaped when it made basic coding training a requirement for security staff.

MORE
EDITORS' CHOICE

7 Business Metrics Security Pros Need to Know
These days, security has to speak the language of business. These KPIs will get you started.
I Spy: Dark Reading Caption Contest Winners
No shortage of political humor and inside security jokes in this batch of cartoon caption contenders. And the winners are ...

Cartoon: The Soviet Threat

Start your day with a smile.


Tech Resources
ACCESS TECH LIBRARY NOW

  • Choosing the Right Strategies for Endpoint Security

    In this webinar, experts will discuss methods for rationalizing endpoint protection tools and strategies and building a comprehensive strategy that works across the entire organization.

  • Consistency is Key with Cloud Security

    When it comes to cloud security, consistency is everything - your cloud controls should mimic your on-premise implementations, so you have complete consistency of security policy enforcement across environments.

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Weekly
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Weekly Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.