Follow Dark Reading:
 January 30, 2019
LATEST SECURITY NEWS & COMMENTARY
FaceTime Bug an AppSec Fail
Apple has shut off Group FaceTime while it prepares a fix for a newly found security flaw found by a 14-year-old gamer.
Microsoft Exchange Vuln Enables Attackers to Gain Domain Admin Privileges
Anyone with access to an Exchange mailbox can take control of domain, security researcher says.
Creating a Security Culture & Solving the Human Problem
People are the biggest weakness to security breaches; people can also be your organization's biggest defense.
Remote Access & the Diminishing Security Perimeter
Where security really matters, the enterprise is only as secure as the endpoints it allows to access its sensitive core systems.
Americans Worried More About Computer - Not Border - Security
A new survey shows more Americans are more concerned about their computer's security than the US border's.
Symantec Rolls Out New Endpoint Security Tools, Updates
Today's releases include more advanced EDR tools, a new managed EDR service, and protection and hardening for Symantec's endpoint portfolio.
MORE NEWS & COMMENTARY
HOT TOPICS
The 5 Stages of CISO Success, Past & Future
In cybersecurity, as in history, security leaders who forget the lessons of the past will be doomed to repeat them.

DHS Issues Emergency Directive on DNS Security
All government domain owners are instructed to take immediate steps to strengthen the security of their DNS servers following a successful hacking campaign.

Database of 24 Million Mortgage, Loan Records Left Exposed Online
Breach latest example of how misconfigurations, human errors undermine security in a big way, experts say.

MORE
EDITORS' CHOICE

Credential Compromises By the Numbers
Recent statistics show just how much credential stealing has become a staple in the attacker playbook.
3 Ways Companies Mess Up GDPR Compliance the Most
The best way to conform to the EU's new privacy regulation is to assume that you don't need to hold on to personal data, versus the opposite.
Tech Resources
ACCESS TECH LIBRARY NOW

MORE WEBINARS

Partner Perspectives

Get Smart About Network Segmentation & Traffic Routing
Through a combination of intelligent segmentation and traffic routing to tools, you can gain much better visibility into your network. Here's how.

Boosting Security Effectiveness with 'Adjuvants'
How integrating corporate resources like the IT help desk, system administration, quality assurance and HR can breathe new life into your security program.

FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.