Follow Dark Reading:
 October 04, 2017
LATEST SECURITY NEWS & COMMENTARY
70% of US Employees Lack Security and Privacy Awareness
Acceptable use of social media and adherence to workplace physical security drops, new survey shows.
Yahoo: All 3 Billion Accounts Affected in 2013 Breach
Every single Yahoo account was affected in a 2013 data breach, bringing the total from 1 billion to 3 billion.
New Standards Will Shore up Internet Router Security
The BGP Path Validation draft standards were designed to ensure that Internet traffic flows only along digitally signed, authorized paths.
DevOpsSec: A Big Step in Cloud Application Security
Why it's time for DevOps and security teams to bury the hatchet -- and not in each other's back.
Google Updates Cloud Access Management Policies
Custom roles for Cloud Identity and Access Management will give users full control of 1,287 public permissions in the Google Cloud.
Less Than Half of Consumers Take Protective Steps Post-Breach
New data on consumer behavior and identity theft shows most don't protect themselves after their personal data is compromised.
MORE NEWS & COMMENTARY
HOT TOPICS
7 SIEM Situations That Can Sack Security Teams
SIEMs are considered an important tool for incident response, yet a large swath of users find seven major problems when working with SIEMs.

New Locky Ransomware Phishing Attacks Beat Machine Learning Tools
Late September attacks highlight the persistent nature of ransomware threats, Comodo says.

5 IT Practices That Put Enterprises at Risk
No one solution will keep you 100% protected, but if you avoid these common missteps, you can shore up your security posture.

MORE
EDITORS' CHOICE

Best and Worst Security Functions to Outsource
Which security functions are best handled by third parties, and which should be kept in-house? Experts weigh in.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Moving UEBA Beyond the Ground Floor

    This webinar will provide the details you need about UEBA so you can make the decisions on how best to protect your organization from the inside out!

  • IP Intelligence: The Utility Player for Your Online Business

    Join us as we explore the many benefits of IP Intelligence, and how you can use IPI to improve your customer experience, reduce fraud, improve security, protect digital content, and more. It's the utility player for your online business.

MORE WEBINARS

Partner Perspectives

TrickBot Rapidly Expands its Targets in August
TrickBot shifted its focus to U.S banks and credit card companies, soaring past the 1,000 target URL mark in a single configuration.

Where Do Security Vulnerabilities Come From?
There are three major causes: code quality, complexity, and trusted data inputs.

Artificial Intelligence: Getting the Results You Want
Finding a vendor that doesn't claim to do AI is hard these days. But getting the benefits you need and expect is even harder.

FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.