Follow Dark Reading:
 April 06, 2017
LATEST SECURITY NEWS & COMMENTARY
Cybercriminals Seized Control of Brazilian Bank for 5 Hours
Sophisticated heist compromised major bank's entire DNS infrastructure.
The Power of the Crowd: 3 Approaches to Sharing Threat Intel
Crowdsourced intelligence can help you build a stronger, more informed cyberdefense. Here's how.
McAfee's Back as an Independent Security Firm
Security firm is no longer part of Intel Corp.
Half of Security Pros Ignore Some Important Alerts
Short-staffed, more than half of organizations admit they ignore alerts that should be investigated because they lack resources to handle the overflow.
Russian-Speaking APT Recycles Code Used in '90s Cyberattacks Against US
Researchers discover connection between Turla cyber espionage gang and wave of attacks against US government agencies in the 1990's.
The Business of Security: How your Organization Is Changing beneath You
And why it's your job to change with it and 'skate where the puck is headed.'
MORE NEWS & COMMENTARY
HOT TOPICS
US Border Policy Shifts May Drive Changes in Laptop Security
In-cabin laptop ban and requirements to unlock devices for border patrol could have enterprises revisiting their on-device data policies.

Customized Malware: Confronting an Invisible Threat
Hackers are gaining entry to networks through a targeted approach. It takes a rigorous defense to keep them out.

Millions of Stolen US University Email Credentials for Sale on the Dark Web
Researchers find booming underground market for stolen and fake email credentials from the 300 largest universities in the US.

MORE
EDITORS' CHOICE

Matching Wits with a North Korea-Linked Hacking Group
Skilled 'Bluenoroff' arm of infamous Lazarus hacking team behind Bangladesh Bank heist and Sony attacks actively resists investigators on its trail, Kaspersky Lab says.
SECURITY LIVE AT INTEROP ITX

Check out the two-day  Dark Reading Cybersecurity Crash Course at Interop ITX, May 15 & 16, where Dark Reading editors and some of the industry's top cybersecurity experts will share the latest data security trends and best practices. To learn more about other Interop Security tracks, or to register, visit the live links.


Tech Resources
ACCESS TECH LIBRARY NOW

  • Threat Intelligence: Fight Threats, Not Logs

    How to operationalize threat intelligence for protection & prevention More is not always better. When it comes to data and threat intelligence, better prevention is offered via the right approach. Don't waste your resources by drowning them in a sea of ...

  • WANTED: Data Analysts, but are there enough?

    As the internet and availability of data has disrupted many industries, one career field that continues to experience high demand is data analytics. Organizations that are looking to get value out of their data and compete in a new economy ...

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Weekly
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Weekly Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.