Follow Dark Reading:
 November 14, 2017
LATEST SECURITY NEWS & COMMENTARY
Emerging IT Security Technologies: 13 Categories, 26 Vendors
A rundown of some of the hottest security product areas, and vendors helping to shape them.
Frequent Software Releases, Updates May Injure App Security
The more frequently you release apps, the more security vulnerabilities you are likely to introduce in the code, a new study confirms.
New Banking Trojan Similar to Dridex, Zeus, Gozi
IBM researchers uncover a new form of banking malware distributed as a second-stage infection via the Emotet Trojan.
How to Leverage the Rosetta Stone of Information Sharing
A common framework will help in the development of cyber-risk management efforts.
Optiv Buys Conexsys for Canadian Market Growth
Optiv ramps up its growth strategy with an acquisition of Conexsys, security and networking firm based in Toronto.
MORE NEWS & COMMENTARY
HOT TOPICS
New Locky Ransomware Takes Another Turn
A newly discovered strain of Locky ransomware has been discovered masquerading as legitimate Microsoft Word documents.

'Eavesdropper' Exposes Millions of Mobile Conversations
App developers fail to remove their hardcoded credentials, affecting hundreds of millions of data records.

How I Infiltrated a Fortune 500 Company with Social Engineering
Getting into the company proved surprisingly easy during a contest. Find out how to make your company better prepared for real-world attacks.

MORE
EDITORS' CHOICE

6 Steps for Sharing Threat Intelligence
Industry experts offer specific reasons to share threat information, why it's important - and how to get started.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Cloud Security: Don't Go Blind While Playing in the Cloud

    Attend this webinar to understand the security transformation from an on-prem fortress mentality to federated cloud services functioning outside your traditional zone of control.

  • Open Source Security for Containers in a DevOps World

    Managing container infrastructure in a production environment is challenged by problems of scale. One of the biggest problems is trust--specifically trust of the application. To put it another way, can you trust that all containers in your Kubernetes or OpenShift ...

MORE WEBINARS

Partner Perspectives

'Goldilocks' Legislation Aims to Clean up IoT Security
The proposed Internet of Things Cybersecurity Improvement Act of 2017 is not too hard, not too soft, and might be just right.

5 Reasons CISOs Should Keep an Open Mind about Cryptocurrency
With untold new markets for Bitcoin and other 'alt-coins,' it's going to be an exciting future -- and security leaders need to get ready for it.

5 Reasons Why the CISO is a Cryptocurrency Skeptic
If you think all you need is technology to defend against bad guys, you shouldn't be a CISO. But technology is all cryptocurrency is, starting with Bitcoin.

FEATURED REPORTS
  • The State of Ransomware

    Ransomware has become one of the most prevalent new cybersecurity threats faced by today's enterprises. This new report from Dark Reading includes feedback from IT and IT security professionals about their organization's ransomware experiences, defense plans, and malware challenges. Find ...

  • [ESG Report] Overcoming the Security Skills Gap
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.