Follow Dark Reading:
 January 04, 2018
LATEST SECURITY NEWS & COMMENTARY
Critical Microprocessor Flaws Affect Nearly Every Machine
Researchers release details of 'Meltdown' and 'Spectre' attacks that allow programs to steal sensitive data.
Intel Processor Security Flaw Prompts Kernel Makeovers in Linux, Windows
As-yet undisclosed design flaw in Intel processors has OS programmers working on kernel updates that reportedly could slow performance.
Open Source Components, Code Volume Drag Down Web App Security
The number of new Web application vulnerabilities published last year was 212% greater than the number disclosed in 2016, Imperva says in a new report this week.
In Mobile, It's Back to the Future
The mobile industry keeps pushing forward while overlooking some security concerns of the past.
Barracuda Hooks PhishLine in Social Engineering Security Acquisition
Barracuda plans to use PhishLine's user awareness training to protect against targeted email-based attacks.
MORE NEWS & COMMENTARY
HOT TOPICS
17 Things We Should Have Learned in 2017, but Probably Didn't
The worm has returned and the Yahoos have all been exposed, but did 2017 teach us any genuinely new lessons we shouldn't already have known?

Top 8 Cybersecurity Skills IT Pros Need in 2018
Cloud security architecture skills to customer-service savvy are among the key IT security skills needed next year as CIOs ramp up hiring.

The Coolest Hacks of 2017
Robots, voting machines, machine learning, and the wind were among the hacks security researchers pulled off this year.

MORE
EDITORS' CHOICE

By Mike McConnell, Former US Director of National Intelligence and Patrick Gorman, CEO, CybrIQ Solutions

A Pragmatic Approach to Fixing Cybersecurity: 5 Steps
The digital infrastructure that supports our economy, protects our national security, and empowers our society must be made more secure, more trusted, and more reliable. Here's how.
Tech Resources

Partner Perspectives

Be a More Effective CISO by Aligning Security to the Business
These five steps will you help marshal the internal resources you need to reduce risk, break down barriers, and thwart cyber attacks.

Is a Good Offense the Best Defense Against Hackers?
A proposed new law could make it legal for companies to hack back against attacker. But will it work?

Why Third-Party Security Is your Security
Managing third-party risk isn't just a good idea, in many cases, it's the law. This security framework can help you minimize the threat.

FEATURED REPORTS
  • 2017 State of IT Report

    In today's technology-driven world, "innovation" has become a basic expectation. IT leaders are tasked with making technical magic, improving customer experience, and boosting the bottom line -- yet often without any increase to the IT budget. How are organizations striking ...

  • The State of Ransomware

    Ransomware has become one of the most prevalent new cybersecurity threats faced by today's enterprises. This new report from Dark Reading includes feedback from IT and IT security professionals about their organization's ransomware experiences, defense plans, and malware challenges. Find ...

MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.