Follow Dark Reading:
 March 20, 2018
LATEST SECURITY NEWS & COMMENTARY
AMD Processor Flaws Real, But Limited
A vulnerability report threatened falling skies over AMD processor vulnerabilities that are real but limited in impact.

Russian APT Compromised Cisco Router in Energy Sector Attacks
DragonFly hacking team that targeted US critical infrastructure compromised a network router as part of its attack campaign against UK energy firms last year.
New Method Proposed for Secure Government Access to Encrypted Data
'Crumple Zones' in crypto mechanisms can make it possible - but astronomically expensive - to access encrypted data, say researchers from Boston University and Portland State University.
Cybercriminals Launder Up to $200B in Profit Per Year
Cybercrime funds make up 8-10% of all illegal profits laundered and amount to $80-200 billion each year.
A Data Protection Officer's Guide to the GDPR Galaxy
Impending deadline got you freaking out? These five tips might help you calm down, at least a little.
Half of Cyberattacks in the Middle East Target Oil & Gas Sector: Siemens
Nearly one-third of all cyberattacks worldwide are against operations technology (OT), or industrial networks, a new report by Siemens and The Ponemon Institute shows.
Microsoft Offers New Bug Bounties for Spectre, Meltdown-Type Flaws
Microsoft is offering a short-term bug bounty program for speculative execution side-channel vulnerabilities and threats.
MORE NEWS & COMMENTARY
HOT TOPICS
New Hosted Service Lowers Barriers to Malware Distribution
BlackTDS is a traffic distribution service for directing users to malware and exploit kits based on specific parameters.

Russian APT Compromised Cisco Router in Energy Sector Attacks
DragonFly hacking team that targeted US critical infrastructure compromised a network router as part of its attack campaign against UK energy firms last year.

77% of Businesses Lack Proper Incident Response Plans
New research shows security leaders have false confidence in their ability to respond to security incidents.

MORE
EDITORS' CHOICE

Who Does What in Cybersecurity at the C-Level
As security evolve as a corporate priority, so do the roles and responsibilities of the executive team. These seven titles are already feeling the impact.

Cartoon: Reverse Ransomware

Enjoy the fun!


Tech Resources
ACCESS TECH LIBRARY NOW

MORE WEBINARS

Partner Perspectives

How to Interpret the SEC's Latest Guidance on Data Breach Disclosure
Forward-looking organizations should view this as an opportunity to reevaluate their cybersecurity posture and install best practices that should have already been in place.

A Sneak Peek at the New NIST Cybersecurity Framework
Key focus areas include supply chain risks, identity management, and cybersecurity risk assessment and measurement.

Journey to the Cloud: Overcoming Security Risks
Lessons learned from a global consultancy's 10-year transition from on-premises to 99% cloud-based infrastructure.

FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.