Follow Dark Reading:
 March 15, 2018
LATEST SECURITY NEWS & COMMENTARY
77% of Businesses Lack Proper Incident Response Plans
New research shows security leaders have false confidence in their ability to respond to security incidents.
New Hosted Service Lowers Barriers to Malware Distribution
BlackTDS is a traffic distribution service for directing users to malware and exploit kits based on specific parameters.
Segmentation: The Neglected (Yet Essential) Control
Failure to deploy measures to contain unauthorized intruders is a recipe for digital disaster.
A Secure Enterprise Starts with a Cyber-Aware Staff
An attack doesn't have to be super high-tech to cause a lot of damage. Make sure your employees know how to spot an old-fashioned phishing campaign.
SEC Charges Former Equifax Exec with Insider Trading
CIO of a US business unit within Equifax had reportedly learned of the company's data breach and sold his shares for nearly $1 million.
Electric Utility Hit with Record Fine for Vulnerabilities
An unnamed power company has consented to a record fine for leaving critical records exposed.
MORE NEWS & COMMENTARY
HOT TOPICS
Chinese APT Backdoor Found in CCleaner Supply Chain Attack
Avast discovers ShadowPad tool for use in apparent planned third stage of the targeted attack campaign.

Microsoft Remote Access Protocol Flaw Affects All Windows Machines
Attackers can exploit newly discovered critical crypto bug in CredSSP via a man-in-the-middle attack and then move laterally within a victim network.

Google 'Distrust Dates' Are Coming Fast
All the tools are in place for the migration of SSL digital certificates on a scale that is unprecedented for the certificate authority industry. Are you ready?

MORE
EDITORS' CHOICE

What CISOs Should Know About Quantum Computing
As quantum computing approaches real-world viability, it also poses a huge threat to today's encryption measures.
New 'Mac-A-Mal' Tool Automates Mac Malware Hunting & Analysis
Researchers at Black Hat Asia will demonstrate a new framework they created for catching and studying Apple MacOS malware.
Tech Resources
ACCESS TECH LIBRARY NOW

MORE WEBINARS

Partner Perspectives

How to Interpret the SEC's Latest Guidance on Data Breach Disclosure
Forward-looking organizations should view this as an opportunity to reevaluate their cybersecurity posture and install best practices that should have already been in place.

A Sneak Peek at the New NIST Cybersecurity Framework
Key focus areas include supply chain risks, identity management, and cybersecurity risk assessment and measurement.

Journey to the Cloud: Overcoming Security Risks
Lessons learned from a global consultancy's 10-year transition from on-premises to 99% cloud-based infrastructure.

FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.