Follow Dark Reading:
 October 19, 2019
LATEST SECURITY NEWS & COMMENTARY
How to Build a Rock-Solid Cybersecurity Culture
In part one of this two-part series, we start with the basics - getting everyone to understand what's at stake - and then look at lessons from the trenches.
Cybersecurity Advice From Betty White
Among the beloved entertainer's advice: "Double bag those passwords."Thanks, Betty.
14 Hot Cybersecurity Certifications Right Now
In an industry where certifications can make or break a job candidacy, which ones have security pros been going after in 2019?
A Murderers' Row of Poisoning Attacks
Poisoning can be used against network infrastructure and applications. Understanding how DNS cache poisoning, machine learning model poisoning, and other attacks work can help you prepare the proper antidote.
FROM THE NEWS DESK

SOC Puppet: Dark Reading Caption Contest Winners
Social engineering, SOC analysts, and Sock puns. And the winners are:

Cartoon: 'Artificial' Intelligence

Start your weekend with a laugh with the latest from Dark Reading cartoonist John Klossner.


MORE NEWS & COMMENTARY
HOT TOPICS
7 SMB Security Tips That Will Keep Your Company Safe
With National Cybersecurity Awareness Month as a backdrop, industry leaders weigh in on how SMBs can more effectively protect themselves from cyberattacks.

Cyber Theft, Humint Helped China Cut Corners on Passenger Jet
Beijing likely saved a lot of time and billions of dollars by copying components for its C919 plane from others, a new report from CrowdStrike says.

Sodinokibi Ransomware: Where Attackers' Money Goes
Researchers following the ransomware variant uncover new data on how much its affiliates earn and where they spend it.

MORE
EDITOR'S CHOICE

State of SMB Insecurity by the Numbers
SMBs still perceive themselves at low risk from cyberthreats - in spite of attack statistics that paint a different picture.
Learn About the Underground World of Anti-Cheats at Black Hat Europe
Applied Security Briefing lineup for this December event also includes expert looks at Google's ClusterFuzz and the art of breaking PDF encryption.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Defeating Advanced Adversaries with Tactical Analytics

    In this webinar, you will be provided with a clear and technical plan on how to transition to SOC 3.0 and, most importantly, on how to establish a tactical analytics capability to effectively detect and defeat advanced adversaries.

  • Building a Security Culture

    In this webinar, learn the elements of a security culture, how to build one at your organization, and how to know it's working.

MORE WEBINARS
FEATURED REPORTS
  • 2018 State of the Cloud Report

    Cloud adoption is growing, but how are organizations taking advantage of it? Interop ITX and InformationWeek surveyed technology decision-makers to find out, read this report to discover what they had to say!

  • [Strategic Security Report] Cloud Security's Changing Landscape

    The rapid migration to cloud services and applications has created a critical need for new strategies and technologies to keep data secure. In this survey, IT security professionals offer insight on their plans for securing data in the cloud. The ...

MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By Dark Reading
Informa Tech
303 Second St., Suite 900 South Tower, San Francisco, CA 94107
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.