Follow Dark Reading:
 November 16, 2017
LATEST SECURITY NEWS & COMMENTARY
Death of the Tier 1 SOC Analyst
Say goodbye to the entry-level security operations center (SOC) analyst as we know it.
White House Releases New Charter for Using, Disclosing Security Vulnerabilities
Updated Vulnerability Equities Process provides transparency into how government will handle new vulnerabilities that it discovers in vendor products and services.
Cybersecurity Staffing Shortage Tied to Cyberattacks, Data Breaches
Short-staffed cybersecurity teams contribute to data breaches and cyberattacks levied against their organizations, a survey finds.
Frequent Software Releases, Updates May Injure App Security
The more frequently you release apps, the more security vulnerabilities you are likely to introduce in the code, a new study confirms.
Why Common Sense Is Not so Common in Security: 20 Answers
Or, questions vendors need to ask themselves before they write a single word of marketing material.
Fred Kwong: The Psychology of Being a CISO
Security Pro File: Fred Kwong learned people skills in the classroom and technical skills on the job. The former psychology major, now CISO at Delta Dental, shares his path to cybersecurity and how he applies his liberal arts background to his current role.
MORE NEWS & COMMENTARY
HOT TOPICS
Emerging IT Security Technologies: 13 Categories, 26 Vendors
A rundown of some of the hottest security product areas, and vendors helping to shape them.

Microsoft Word Vuln Went Unnoticed for 17 Years: Report
Researchers claim Microsoft Word vulnerability, patched today, has existed for 17 years.

New Locky Ransomware Takes Another Turn
A newly discovered strain of Locky ransomware has been discovered masquerading as legitimate Microsoft Word documents.

MORE
EDITORS' CHOICE

Insider Threats: Red Flags and Best Practices
Security pros list red flags indicating an insider attack and best practices to protect against accidental and malicious exposure.
Who Am I? Best Practices for Next-Gen Authentication
By their very nature, antiquated, static identifiers like Social Security numbers and dates of birth are worse than passwords.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Cloud Security: Don't Go Blind While Playing in the Cloud

    Attend this webinar to understand the security transformation from an on-prem fortress mentality to federated cloud services functioning outside your traditional zone of control.

  • Building Security for the IoT

    In this webcast, experts discuss the most effective approaches to securing Internet-enabled systems and offer advice on monitoring and protecting next-generation IoT technology. Register today!

MORE WEBINARS
FEATURED REPORTS
  • The State of Ransomware

    Ransomware has become one of the most prevalent new cybersecurity threats faced by today's enterprises. This new report from Dark Reading includes feedback from IT and IT security professionals about their organization's ransomware experiences, defense plans, and malware challenges. Find ...

  • [ESG Report] Overcoming the Security Skills Gap
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Weekly
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Weekly Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.