Follow Dark Reading:
 May 03, 2017
LATEST SECURITY NEWS & COMMENTARY
DDoS Attacks Surge, Organizations Struggle to Respond
Organizations often discover a DDoS attack only after being alerted to the fact by a third-party or customer, Neustar survey shows.
Getting Threat Intelligence Right
Are you thinking of implementing or expanding a threat intelligence program? These guidelines will help you succeed.
New Global Resilience Federation Will Share Threat Intel Across Industries
Born out of a partnership of information sharing and analysis centers and organizations, Global Resilience Federation launches today to share intelligence and information across a number of industry sectors.
What's in a Name? Breaking Down Attribution
Here's what you really need to know about adversaries.
Striving For Improvement on World Password Day
Consumer hygiene and poor authentication practices create toxic combo.
Intel Patches 'Critical' Elevation Privilege Bug in High-End Chips
Semiconductor giant releases patch for its Intel Active Management Technology vulnerability that could allow an attacker to escalate privileges in its high-end chipsets.
CenturyLink, Medina Capital Deal Closes with Launch of Cyxtera Technologies
CenturyLink's former data centers and colocation business were combined with Medina Capital's cybersecurity and analytics holdings to create new secure data center infrastructure firm.
MORE NEWS & COMMENTARY
HOT TOPICS
10 Cybercrime Myths that Could Cost You Millions
Don't let a cybersecurity fantasy stop you from building the effective countermeasures you need to protect your organization from attack.

New OWASP Top 10 Reveals Critical Weakness in Application Defenses
It's time to move from a dependence on the flawed process of vulnerability identification and remediation to a two-pronged approach that also protects organizations from attacks.

Fileless Malware Attacks Continue to Gain Steam
Endpoint woes grow as fileless attacks grow in prevalence and file-based attacks remain largely undetected by AV engines.

MORE
SECURITY LIVE AT INTEROP ITX

Check out the two-day Dark Reading Cybersecurity Crash Course at Interop ITX, May 15 & 16, where Dark Reading editors and some of the industry's top cybersecurity experts will share the latest data security trends and best practices.


Tech Resources
ACCESS TECH LIBRARY NOW

  • Data Tells: Dissecting Every Day Data

    Join us as the author of the book "Everydata: The Misinformation Hidden in the Little Data You Consume Every Day" examines common ways data is misrepresented or misinterpreted, the limitations of forecasts and predictions, and how to recognize "Tells" in ...

  • Data Scientists 2017 & Beyond - How to Be One, Become One & Hire One (or more)

    In the years since data scientist was declared the sexiest job, the role itself has evolved. As happens with any job, hiring managers have been adjusting their expectations for data science candidates, and executives are defining the role of the ...

MORE WEBINARS

Partner Perspectives

OSX.Bella: Mac Malware Strikes Again
This variant of the OSX.Dok dropper behaves altogether differently, and installs a completely different payload.

OSX.Dok: New & Sophisticated Mac Malware Strikes
Phishing-deployed malware can capture account credentials for any website users log into.

Locky Returns with a New (Borrowed) Distribution Method
A layered defense is a strong security posture for dealing with a threat like Locky, that can come in different disguises.

FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.