Follow Dark Reading:
 December 26, 2017
LATEST SECURITY NEWS & COMMENTARY
CISO Holiday Miracle Wish List
If CISOs could make a wish to solve a problem, these would be among the top choices.
Hit the Cyber Underground for the Hottest Travel Deals
You can get everything from inexpensive flights and hotels to fake passports in the cyber underground, says Trend Micro.
Block Threats Faster: Pattern Recognition in Exploit Kits
When analysts investigate an indicator of compromise, our primary goal is to determine if it is malicious as quickly as possible. Identifying attack patterns helps you mitigate quicker.
Network Printer & Scanner Spoofing Campaign Targets Millions
Cybercriminals distribute malicious email attachments purportedly coming from three common brands of network printer-scanner devices.
MORE NEWS & COMMENTARY
HOT TOPICS
Top 8 Cybersecurity Skills IT Pros Need in 2018
Cloud security architecture skills to customer-service savvy are among the key IT security skills needed next year as CIOs ramp up hiring.

'Starwars' Debuts on List of Worst Passwords of 2017
Many of the old standbys made this year's list of the 25 stolen - and weakest - passwords found dumped online.

Advanced Deception: How It Works & Why Attackers Hate It
While cyberattacks continue to grow, deception-based technology is providing accurate and scalable detection and response to in-network threats.

MORE
EDITORS' CHOICE

9 Banking Trojans & Trends Costing Businesses in 2017
New Trojans appeared, old ones resurfaced, and delivery methods evolved as cybercriminals set their sights on financial data.
Tech Resources
ACCESS TECH LIBRARY NOW

  • 5 Things to Prepare For in 3rd Party Cyber Risk Management in 2018

    Join Michael Rasmussen, Founder of GRC20/20, and Gary Phipps, Senior Director of Solution Engineering at CyberGRX, so you can kick off 2018 with a strategic approach to third-party cyber risk management.

  • Analytics: What's Hot & What You Need to Know

    Keeping up with the newest trends in data and analytics can be exhausting, don't get left behind the curve on the biggest trends in analytics today like Natural Language Processing, Machine Learning, Augmented Analytics, Real Time Analytics, and Edge Analytics. ...

MORE WEBINARS

Partner Perspectives

Be a More Effective CISO by Aligning Security to the Business
These five steps will you help marshal the internal resources you need to reduce risk, break down barriers, and thwart cyber attacks.

Is a Good Offense the Best Defense Against Hackers?
A proposed new law could make it legal for companies to hack back against attacker. But will it work?

Why Third-Party Security Is your Security
Managing third-party risk isn't just a good idea, in many cases, it's the law. This security framework can help you minimize the threat.

FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.