Follow Dark Reading:
 March 24, 2017
LATEST SECURITY NEWS & COMMENTARY
7 Steps to Transforming Yourself into a DevSecOps Rockstar
Security practitioners at one education software firm offer lessons learned from merging DevOps with security.
20 Million Mobile Devices at High Risk of Attack, Study Finds
Meanwhile, a separate report by Google says half of all Android devices didn't install a single security update in 2016.
5 Ways CISOs Could Work Better with Their Cyber Insurers
Risk management has become increasingly important, making it crucial companies have good relationships with their insurance company.
LastPass Fixes Serious Security Flaw in Chrome, Firefox Extensions
Password manager LastPass creates a workaround for a serious vulnerability affecting browser extensions in Chrome, Firefox, and Microsoft Edge.
Russian Man Pleads Guilty for Role in Citadel Malware Attacks
Russian national Mark Vartanyan pleads guilty in US federal court following his December 2016 extradition from Norway.
US May Charge North Korea in Bangladesh Bank Cybertheft
The potential case accuses North Korea, and suspected Chinese middlemen, of spearheading an $81-million theft from Bangladesh Bank.
MORE NEWS & COMMENTARY
HOT TOPICS
The 6 Riskiest Social Media Habits to Avoid at Work
Cybercriminals are turning to Facebook Twitter and other platforms to launch attacks via employee behavior that could be putting your business at risk.

Windows 'DoubleAgent' Attack Turns AV Tools into Malware
Zero-day attack exploits a legitimate process in Windows, according to Cybellum; AV vendors downplay threat.

Future of the SIEM
Current SIEM systems have flaws. Here's how the SIEM's role will change as mobile, cloud, and IoT continue to grow.

MORE
EDITORS' CHOICE

New Wave of Security Acquisitions Signals Start of Consolidation Trend
A dozen recent high-profile deals reflect cybersecurity vendors' hopes of expanding their offerings with next-generation technology, ideas, and talent.
Tech Resources
ACCESS TECH LIBRARY NOW

  • NGES (Next Gen Endpoint Security): Tips & Key Considerations for Evaluating Solutions

    Next generation endpoint security (NGES) is one of the hottest topics in today's cybersecurity market, and for good reason. Traditional preventative measures alone offer insufficient endpoint protection - causing an influx of vendors offering NGES. While the market is relatively ...

  • Cloud Security: Myths & Reality

    Enterprises are expanding their use of cloud services and cloud applications every day - but what are the security implications? Are cloud environments less secure than traditional enterprise networks? What can enterprises do to protect critical data in these cloud ...

MORE WEBINARS

Partner Perspectives

Malware Explained: Packer, Crypter & Protector
These three techniques can protect malware from analysis. Here's how they work.

7 Things You Need to Know about Bayesian Spam Filtering
Knowing how spam filters work can clarify how some messages get through, and how your own emails can avoid being caught.

4 Ways to Recover from a Cyberattack
Be prepared and act quickly are two key steps that will help you bounce back quickly from a cyberattack.

FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.