Follow Dark Reading:
 May 10, 2018
LATEST SECURITY NEWS & COMMENTARY
FBI: Reported Internet Crimes Topped $1.4 Billion Last Year
Business email compromise (BEC) campaigns outnumbered ransomware cases.
Phishing Threats Move to Mobile Devices
Mobile devices are emerging as a primary gateway for phishing attacks aimed at stealing data.
Email Security Tools Try to Keep Up with Threats
Email has long been a prime vector for cyberattacks, and hackers are only getting sneakier. Can email platforms and security tools keep up?
Compliance Complexity: The (Avoidable) Risks of Not Playing by the Rules
Achieving compliance is a challenging process, but with the right systems and customized data management policy, your organization can stay ahead of the next data breach -- and the regulators.
Millennials, Women May Bridge Cyber Talent Gap
Younger generations, particularly women, could be the answer to a cybersecurity skill shortage expected to reach 1.8 million unfilled roles by 2020.
Script Kiddies, Criminals Hacking Video Streams for Fun & Profit
Video streams are getting hijacked for 'prestige,' DDoS, and financial gain, a new report found.
MORE NEWS & COMMENTARY
HOT TOPICS
Why DDoS Just Won't Die
Distributed denial-of-service attacks are getting bigger, badder, and 'blended.' What you can (and can't) do about that.

Defending Against an Automated Attack Chain: Are You Ready?
Recent threats like AutoSploit bring malware-as-a-service to a whole new level. Here are four ways to be prepared.

Spectre Returns with 8 New Variants
Researchers have discovered versions of the processor vulnerability.

MORE
EDITORS' CHOICE

Calculating Cloud Cost: 8 Factors to Watch
If you're not careful and don't regularly assess the impact of your usage, moving to the cloud could have a negative impact on your bottom line.
20 Signs You Are Heading for a Retention Problem
If you don't invest in your best security talent, they will look to burnish their resumes elsewhere. Here's why.
Tech Resources

Partner Perspectives

Report: More Breaches Despite Increasing Security Budgets
Lack of security talent, low security awareness among employees, and too much data to analyze tops the list of cyberthreats in the 2018 Cyberthreat Defense Threat Report from CyberEdge group.

4 Critical Applications and How to Protect Them
Since critical apps are, well, critical, security teams must take preventive measures to keep attackers from exploiting their vulnerabilities.

3 Ways to Maximize Security and Minimize Business Challenges
The best strategy for choosing security tools and architecting networks is to focus on staffing and resources, risk tolerance, and business change.

FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.