Follow Dark Reading:
 January 11, 2018
LATEST SECURITY NEWS & COMMENTARY
CISOs' No. 1 Concern in 2018: The Talent Gap
Survey finds 'lack of competent in-house staff' outranks all other forms of cybersecurity worry, including data breaches to ransomware attacks.
Cisco Adds Encrypted Traffic Analysis Function
New Encrypted Traffic Analytics is designed to help enterprises inspect encrypted traffic for malicious activity without having to decrypt it first.
'Shift Left': Codifying Intuition into Secure DevOps
Shifting left is more than a catchy phrase. It's a mindset that emphasizes the need to think about security in all phases of the software development life cycle.
Oracle WebLogic Exploit Used in Cryptocurrency Mining Campaign
PeopleSoft and WebLogic app servers, as well as cloud systems using WebLogic, hacked and used to net some $226K in digital currency.
'Back to Basics' Might Be Your Best Security Weapon
A company's ability to successfully reduce risk starts with building a solid security foundation.
FBI Director: Cryptocurrency, Nation-State Attacks, Among Agency's Top Cybersecurity Concerns
Speaking at International Conference on Cyber Security, FBI director Christopher Wray pointed to a rise in nation-state attacks - and strong encryption that limits bureau investigations.
MORE NEWS & COMMENTARY
HOT TOPICS
Microsoft Confirms Windows Performance Hits with Meltdown, Spectre Patches
Windows servers will see biggest degradation, as will Windows 7 and 8 client machines, Microsoft said.

Meltdown, Spectre Likely Just Scratch the Surface of Microprocessor Vulnerabilities
There's a lot at stake when it comes to patching the hardware flaws.

LockPoS Malware Sneaks onto Kernel via new Injection Technique
"Alarming evolution" of Flokibot bypasses antivirus software and was likely built by a group of advanced attackers, researchers say.

MORE
EDITORS' CHOICE

20 Cybersecurity Vendors Getting Venture Capital Love
VCs splashed a record $4B in funding in the cybersecurity pool - here are some highlights among the early- to middle-stage startups who snagged big deals last year.

Cartoon: C-Suite & Cybersecurity

John Klossner's humorous take on security discussions inside the corporate board room.


Tech Resources
ACCESS TECH LIBRARY NOW

MORE WEBINARS

Partner Perspectives

Is a Good Offense the Best Defense Against Hackers?
The proposed Active Cyber Defense Certainty (ACDC) Act has its pros and cons. But it's not the only option for protecting your company's digital assets.

Be a More Effective CISO by Aligning Security to the Business
These five steps will you help marshal the internal resources you need to reduce risk, break down barriers, and thwart cyber attacks.

Is a Good Offense the Best Defense Against Hackers?
A proposed new law could make it legal for companies to hack back against attacker. But will it work?

FEATURED REPORTS
  • [Strategic Security Report] Cloud Security's Changing Landscape

    The rapid migration to cloud services and applications has created a critical need for new strategies and technologies to keep data secure. In this survey, IT security professionals offer insight on their plans for securing data in the cloud. The ...

  • The State of Ransomware

    Ransomware has become one of the most prevalent new cybersecurity threats faced by today's enterprises. This new report from Dark Reading includes feedback from IT and IT security professionals about their organization's ransomware experiences, defense plans, and malware challenges. Find ...

MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.