Follow Dark Reading:
 February 15, 2018
LATEST SECURITY NEWS & COMMENTARY
Encrypted Attacks Continue to Dog Perimeter Defenses
Attacks using SSL to obfuscate malicious traffic finding fertile ground for growth.
Windows 10 Critical Vulnerability Reports Grew 64% in 2017
The launch and growth of new operating systems is mirrored by an increase in reported vulnerabilities.
Intel Expands Bug Bounty Program, Offers up to $250K
Microprocessor giant adds vulnerability-finding category for Meltdown, Spectre-type flaws.
Cybercrime Costs for Financial Sector up 40% Since 2014
A 9.6% increase just in the past year, and denial-of-service attacks are partly to blame.
3 Tips to Keep Cybersecurity Front & Center
In today's environment, a focus on cybersecurity isn't a luxury. It's a necessity, and making sure that focus is achieved starts with the company's culture.
Filing Deadline for New Infosec Law Hits NY Finance Firms Thursday
Banks and financial services companies in New York must file by tomorrow to certify they are compliant with the state Department of Financial Services' new cybersecurity regulation, 23 NYCRR 500.
MORE NEWS & COMMENTARY
HOT TOPICS
8 Nation-State Hacking Groups to Watch in 2018
The aliases, geographies, famous attacks, and behaviors of some of the most prolific threat groups.

New POS Malware Steals Data via DNS Traffic
UDPoS is disguised to appear like a LogMeIn service pack, Forcepoint says.

One in Three SOC Analysts Now Job-Hunting
The more experienced a SOC analyst gets, the more his or her job satisfaction declines, a new survey of security operations center staffers shows.

MORE
EDITORS' CHOICE

Fileless Malware: Not Just a Threat, but a Super-Threat
Exploits are getting more sophisticated by the day, and cybersecurity technology just isn't keeping up.

Name That Toon: Digital Disappearing Act

We provide the cartoon. You provide the caption. The winner gets a prize!


Tech Resources
ACCESS TECH LIBRARY NOW

  • Building Your Identity-aware Infrastructure

    Join Darran Rolls, the CTO & CISO of SailPoint, the leader in the Gartner Magic Quadrant for Identity Governance and Administration, as he demonstrates how to build an identity-aware infrastructure.

  • Strategies for Monitoring & Measuring Cloud Security

    In this Dark Reading webinar, a top expert offers a look at practices and tools that will help your team monitor security in IT environments that incorporate many cloud applications and services.

MORE WEBINARS

Partner Perspectives

The GDPR Clock Is Running Out. Now What?
Many organizations impacted by new European Union data privacy rules that go into effect May 25 are still blind to some of the basics.

BrickerBot: Internet Vigilantism Ends Don't Justify the Means
However noble the intention, obtaining unauthorized access to devices and making them unusable is illegal and undermines the work of ethical researchers.

Top Cloud Security Misconceptions Plaguing Enterprises
Contrary to popular opinion, there is no one single cloud. There are a wealth of cloud-based providers that own dedicated server space across the globe. Here's how to find the best fit for your company.

FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.