Follow Dark Reading:
 October 14, 2019
LATEST SECURITY NEWS & COMMENTARY
7 SMB Security Tips That Will Keep Your Company Safe
With National Cybersecurity Awareness Month as a backdrop, industry leaders weigh in on how SMBs can more effectively protect themselves from cyberattacks.
iTunes Zero-Day Exploited to Deliver BitPaymer
The ransomware operators targeted an "unquoted path" vulnerability in iTunes for Windows to evade detection and install BitPaymer.
How the Software-Defined Perimeter Is Redefining Access Control
In a world where traditional network boundaries no longer exist, VPNs are showing their age.
How to Think Like a Hacker
In the arms race of computer security, it's never been more important to develop an adversarial mindset that can identify assumptions and determine if and how they can be violated.
FBI: Phishing Can Defeat Two-Factor Authentication
A recent Privacy Industry Notification points to two new hacker tools that can turn a victim's browser into a credential-stealing zombie.
Click2Mail Suffers Data Breach
Mail provider discovered customer data being used in spam messages.
MORE NEWS & COMMENTARY
HOT TOPICS
6 Active Directory Security Tips for Your Poor, Neglected AD
The unappreciated core of your enterprise IT network needs your security team's TLC. Here are a few ways to give Active Directory the security love it needs.

Security Tool Sprawl Reaches Tipping Point
How a new open source initiative for interoperable security tools and a wave of consolidation could finally provide some relief for overwhelmed security analysts and SOCs.

Microsoft Issues 9 Critical Security Patches
None of the total 59 patches were for previously known vulnerabilities nor are any under active attack, Microsoft reports.

MORE
EDITORS' CHOICE

Close the Gap Between Cyber-Risk and Business Risk
Four steps outlining how security teams can better understand their company's cyber-risk and demonstrate to company leadership what's being done to mitigate the resulting business risk.
7 Considerations Before Adopting Security Standards
Here's what to think through as you prepare your organization for standards compliance.
NEW FROM THE EDGE

A Murderers' Row of Poisoning Attacks
Poisoning can be used against network infrastructure and applications. Understanding how DNS cache poisoning, machine learning model poisoning and other attacks work can help you prepare the proper antidote.
ASK THE EDGE EXPERTS

Can I Get More Mileage From My Existing Security Tools?
Some points to consider before you break open your wallet.
Tech Resources
ACCESS TECH LIBRARY NOW

MORE WEBINARS
FEATURED REPORTS
  • How Enterprises Are Attacking the IT Security Problem

    Enterprises are spending more of their IT budgets on cybersecurity technology. How do your organization's security plans and strategies compare to what others are doing? Here's an in-depth look.

  • [Forrester Report] Digital Experience Technology & Delivery Priorities

    Across the board, organizations' investments revolve around implementing personalized initiatives, solving people challenges, and assembling digital experience platforms. In this report, Forrester outlines top 2015 priorities that application development and delivery professionals are aware of.

MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By Dark Reading
Informa Tech
303 Second St., Suite 900 South Tower, San Francisco, CA 94107
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.