Follow Dark Reading:
 November 09, 2017
LATEST SECURITY NEWS & COMMENTARY
Data Breach Record Exposure Up 305% from 2016
There have been 3,833 publicly disclosed data breaches in the first nine months of 2017, exposing more than seven billion records.
Cybercriminals Employ 'Driveby' Cryptocurrency Mining
Mining digital coins is a legal activity, but cybercriminals have discovered a new way to inject malware to perform the task.
The IoT Blindspot
Confusion over whether IT staff or line of business professions are responsible for IoT management and security plays big role in a lack of visibility into those devices.
How Law Firms Can Make Information Security a Higher Priority
Lawyers always have been responsible for protecting their clients' information, but that was a lot easier to do when everything was on paper. Here are four best practices to follow.
Siemens Teams Up with Tenable
ICS/SCADA vendor further extends its managed security services for critical infrastructure networks.
Yahoo's Ex-CEO Mayer Calls Out Russian Hackers
Former Yahoo Chief Executive Marissa Mayer apologizes for massive data breach that exposed billions of user accounts.
Windows Defender ATP Extended to iOS, macOS, Android, Linux
Microsoft partners will begin rolling out Windows Defender Advanced Threat Protection to macOS, Linux, iOS, and Android devices.
MORE NEWS & COMMENTARY
HOT TOPICS
Hackers Poison Google Search Results to Deliver Zeus Panda
Threat actors leverage SEO to ensure malicious links rank highly in Google results to infect targets with Trojan.

10 Mistakes End Users Make That Drive Security Managers Crazy
Here's a list of common, inadvertent missteps end users make that can expose company data.

Social Engineer Spills Tricks of the Trade
A social engineer points out gaping holes in businesses' human security and shares lessons learned from years of phishing research.

MORE
EDITORS' CHOICE

Inhospitable: Hospitality & Dining's Worst Breaches in 2017
Hotels and restaurants are in the criminal crosshairs this year.
IN CASE YOU MISSED IT

(Sponsored Article) The Death Knell of Passwords? It's Closer than You Think
Powerful authentication tools will soon make enterprises more secure and end-users less frustrated. Here's why and how.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Open Source Security for Containers in a DevOps World

    Managing container infrastructure in a production environment is challenged by problems of scale. One of the biggest problems is trust--specifically trust of the application. To put it another way, can you trust that all containers in your Kubernetes or OpenShift ...

  • Ransomware: Trends, Use Cases & Protection

    Ransomware is one of the favorite flavors of malware and is particularly vicious and showing no signs of slowing down. Join this webinar as Senior Security Researcher Kyle Wilhoit helps us to understand ransomware trends, ransomware use cases, the financial ...

MORE WEBINARS

Partner Perspectives

5 Reasons CISOs Should Keep an Open Mind about Cryptocurrency
With untold new markets for Bitcoin and other 'alt-coins,' it's going to be an exciting future -- and security leaders need to get ready for it.

5 Reasons Why the CISO is a Cryptocurrency Skeptic
If you think all you need is technology to defend against bad guys, you shouldn't be a CISO. But technology is all cryptocurrency is, starting with Bitcoin.

CISOs: Striving Toward Proactive Security Strategies
A new survey paints a compelling picture of the modern security executive, how they succeed, and how much power they wield.

FEATURED REPORTS
  • The State of Ransomware

    Ransomware has become one of the most prevalent new cybersecurity threats faced by today's enterprises. This new report from Dark Reading includes feedback from IT and IT security professionals about their organization's ransomware experiences, defense plans, and malware challenges. Find ...

  • 2017 State of IT Report

    In today's technology-driven world, "innovation" has become a basic expectation. IT leaders are tasked with making technical magic, improving customer experience, and boosting the bottom line -- yet often without any increase to the IT budget. How are organizations striking ...

MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.