Follow Dark Reading:
 October 18, 2018
LATEST SECURITY NEWS & COMMENTARY
6 Reasons Why Employees Violate Security Policies
Get into their heads to find out why they're flouting your corporate cybersecurity rules.
3 Years After Attacks on Ukraine Power Grid, BlackEnergy Successor Poses Growing Threat
In what could be a precursor to future attacks, GreyEnergy is targeting critical infrastructure organizations in Central and Eastern Europe.
Startup Spun Out of Securosis Secures $2.5 Million Seed Investment
DistruptOps officially rolls out its SaaS for automating control of cloud operations and security.
Cybercrime-as-a-Service: No End in Sight
Cybercrime is easy and rewarding, making it a perfect arena for criminals everywhere.
Oracle Issues Massive Collection of Critical Security Updates
The software updates from Oracle address a record number of vulnerabilities.
MORE NEWS & COMMENTARY
HOT TOPICS
Threat Hunters & Security Analysts: A Dynamic Duo
Fighting spying with spying, threat hunters bring the proactive mindset of network reconnaissance and repair to the enterprise security team.

The Three Dimensions of the Threat Intelligence Scale Problem
To succeed, organizations must be empowered to reduce their attack surface and staff overload so they can get more out of their existing firewall and threat intelligence investments.

Spies Among Us: Tracking, IoT & the Truly Inside Threat
In today's ultra-connected world, it's important for users to understand how to safeguard security while browsing the web and using electronic devices.

4 Ways to Fight the Email Security Threat
It's time to reimagine employee training with fresh, more aggressive approaches that better treat email security as a fundamentally human problem.

MORE
EDITORS' CHOICE

(ISC) 2 : Global Cybersecurity Workforce Short 3 Million People
With the skills gap still wide, security leaders explain the challenges of hiring and retaining security experts.
IBM Builds 'SOC on Wheels' to Drive Cybersecurity Training
A tractor trailer housing a Cyber Tactical Operation Center will travel throughout the US and Europe for incident response training, security support, and education.
12 Free, Ready-to-Use Security Tools
There's no excuse for not knowing your exposure. These free tools can help you analyze what your company is up against and point ways to developing a more thorough security program.
Tech Resources
FEATURED REPORTS
  • How Data Breaches Affect the Enterprise

    This report, offers new data on the frequency of data breaches, the losses they cause, and the steps that organizations are taking to prevent them in the future. Read the report today!

  • 2018 State of the Cloud Report

    Cloud adoption is growing, but how are organizations taking advantage of it? Interop ITX and InformationWeek surveyed technology decision-makers to find out, read this report to discover what they had to say!

MORE REPORTS
CURRENT ISSUE
PRODUCTS & RELEASES
Dark Reading Weekly
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Weekly Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.