Follow Dark Reading:
 November 17, 2018
LATEST SECURITY NEWS & COMMENTARY
BlackBerry Doubles Down on Security in $1.4B Acquisition of Cylance
BlackBerry aims to bring Cylance artificial intelligence and security tools into its software portfolio.
DHS Task Force Moves Forward on Playbooks for Supply Chain Security
The public/private task force takes early steps toward securing the end-to-end supply chain.
New Bluetooth Hack Affects Millions of Vehicles
Attack could expose the personal information of drivers who sync their mobile phone to a vehicle entertainment system.
95% of Organizations Have Cultural Issues Around Cybersecurity
Very few organizations have yet baked cybersecurity into their corporate DNA, research finds.
AI Poised to Drive New Wave of Exploits
Criminals are ready to use AI to dramatically speed the process of finding zero-day vulnerabilities in systems.
26M Texts Exposed in Poorly Secured Vovox Database
The server, which lacked password protection, contained tens of millions of SMS messages, two-factor codes, shipping alerts, and other user data.
MORE NEWS & COMMENTARY
HOT TOPICS
7 Cool New Security Tools to be Revealed at Black Hat Europe
Black Hat Europe's Arsenal lineup will include demonstrations of tools addressing everything from unsecured cloud buckets to unknown IoT devices.

20 Cybersecurity Firms to Watch
A look at some of the more interesting investments, acquisitions, and strategic moves in the security sector over the past year.

MORE
EDITORS' CHOICE

7 Free (or Cheap) Ways to Increase Your Cybersecurity Knowledge
Building cybersecurity skills is a must; paying a lot for the education is optional. Here are seven options for increasing knowledge without depleting a budget.
Cyber Crooks Diversify Business with Multi-Intent Malware
The makers of malware have realized that if they're going to invest time and money in compromising cyber defenses, they should do everything they can to monetize their achievement.
Tech Resources
ACCESS TECH LIBRARY NOW

MORE WEBINARS

Partner Perspectives

Get Smart About Network Segmentation & Traffic Routing
Through a combination of intelligent segmentation and traffic routing to tools, you can gain much better visibility into your network. Here's how.

Boosting Security Effectiveness with 'Adjuvants'
How integrating corporate resources like the IT help desk, system administration, quality assurance and HR can breathe new life into your security program.

FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.