Follow Dark Reading:
 April 05, 2017
LATEST SECURITY NEWS & COMMENTARY
Cybercriminals Seized Control of Brazilian Bank for 5 Hours
Sophisticated heist compromised major bank's entire DNS infrastructure.
Hackers Hit IAAF, Compromise Athlete Records
The IAAF is taking all measures to secure its network after an attack allegedly conducted by hacker group Fancy Bear.
As Cloud Use Expands, So Do Security Blind Spots, Studies Show
Three-quarters of IaaS and SaaS apps aren't monitored.
McAfee's Back as an Independent Security Firm
Security firm is no longer part of Intel Corp.
The Power of the Crowd: 3 Approaches to Sharing Threat Intel
Crowdsourced intelligence can help you build a stronger, more informed cyberdefense. Here's how.
Office 365 Gets Data Governance, Threat Intelligence Tools
Microsoft rolls out Advanced Data Governance and Threat Intelligence tools for Office 365, starting today.
FCC Privacy Rule Repeal Will Have Widespread Security Implications
Concerns over the action are sending VPN sales soaring, some vendors say.
AIG Rolls Out Policy for Cyberthreat Coverage
Insurance firm AIG will now cover expenses related to extortion, cyber bullying, and other digital threats.
MORE NEWS & COMMENTARY
HOT TOPICS
US Border Policy Shifts May Drive Changes in Laptop Security
In-cabin laptop ban and requirements to unlock devices for border patrol could have enterprises revisiting their on-device data policies.

Cerber Ransomware Now Evades Machine Learning
New variant has been broken into separate harmless-looking components to fool ML-based detection systems, Trend Micro says.

Payment Card Industry Security Compliance: What You Need to Know
A quick refresher on all the different PCI SSC security standards that are relevant for organizations that accept electronic payments.

MORE
SECURITY LIVE AT INTEROP ITX

ADP CISO Offers Tips to Leverage Security to Grow the Business
Savvy CISOs would do their companies a favor by broadly integrating security across the organization, a move that can yield greater revenues, cost savings and an entry into new markets.

Hear ADP CISO Roland Cloutier speak about Managing Risks to Reap Rewards: How to Use Security as a Growth Advantage during Interop ITX, May 15-19, at the MGM Grand in Las Vegas.


Tech Resources
ACCESS TECH LIBRARY NOW

  • NGES: Tips & Key Considerations for Evaluating Solutions

    Next generation endpoint security (NGES) is one of the hottest topics in today's cybersecurity market, and for good reason. Traditional preventative measures alone offer insufficient endpoint protection - causing an influx of vendors offering NGES. While the market is relatively ...

  • WANTED: Data Analysts, but are there enough?

    As the internet and availability of data has disrupted many industries, one career field that continues to experience high demand is data analytics. Organizations that are looking to get value out of their data and compete in a new economy ...

MORE WEBINARS

Partner Perspectives

Top 5 Dumbest Cyber Threats That Still Pay Off
Some hackers are fairly predictable in their successful use of really dumb attacks.

Exploit Kits: Winter 2017 Review
We take another look at the current EK scene by going over RIG, Sundown, Neutrino and Magnitude.

Malware Explained: Packer, Crypter & Protector
These three techniques can protect malware from analysis. Here's how they work.

FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.