Follow Dark Reading:
 October 05, 2017
LATEST SECURITY NEWS & COMMENTARY
DNS a 'Victim of its Own Success'
Why securing the Domain Name System remains an afterthought at many organizations.
Yahoo, Equifax Serve as Cautionary Tales in Discerning Data Breach Scope
Both companies this week revealed that their previously disclosed breaches impacted a lot more people than previously thought.
Weakness In Windows Defender Lets Malware Slip Through Via SMB Shares
CyberArk says the manner in which Defender scans for malicious executables in SMB shares gives attackers an opening.
CISOs Offer Soup-to-Nuts C-Suite Strategy
Chief information security officers from Dell, RCB Bank and other organizations share what it takes to become a security exec, sit in the C-Suite, and keep the job.
Analyzing Cybersecurity's Fractured Educational Ecosystem
We have surprisingly little data on how to evaluate infosec job candidates academic qualifications. That needs to change.
Equihax: Identifying & Wrangling Vulnerabilities
Now that we know what was taken from Equifax, how it was taken, and what is being sold, what more do we need to learn before the next time?
MORE NEWS & COMMENTARY
HOT TOPICS
New Locky Ransomware Phishing Attacks Beat Machine Learning Tools
Late September attacks highlight the persistent nature of ransomware threats, Comodo says.

5 IT Practices That Put Enterprises at Risk
No one solution will keep you 100% protected, but if you avoid these common missteps, you can shore up your security posture.

7 SIEM Situations That Can Sack Security Teams
SIEMs are considered an important tool for incident response, yet a large swath of users find seven major problems when working with SIEMs.

MORE
EDITOR'S CHOICE

Best and Worst Security Functions to Outsource
Which security functions are best handled by third parties, and which should be kept in-house? Experts weigh in.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Building a Cybersecurity Architecture to Combat Today's Risks

    "Layered defense" has traditionally been the modus operandi of IT security, but this approach can't be counted on to stand up to today's threats and attacks. In addition, attack surfaces are growing every day as companies adopt technologies like cloud ...

  • IP Intelligence: The Utility Player for Your Online Business

    Join us as we explore the many benefits of IP Intelligence, and how you can use IPI to improve your customer experience, reduce fraud, improve security, protect digital content, and more. It's the utility player for your online business.

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Weekly
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Weekly Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.