Follow Dark Reading:
 November 29, 2017
LATEST SECURITY NEWS & COMMENTARY
Git Some Security: Locking Down GitHub Hygiene
In the age of DevOps and agile development practices that lean heavily on GitHub and other cloud resources, strong controls are more important than ever.
Suspect in Yahoo Breach Case Pleads Guilty
Karim Baratov admits he worked on behalf of Russia's FSB.
The Looming War of Good AI vs. Bad AI
The rise of artificial intelligence, machine learning, hivenets, and next-generation morphic malware is leading to an arms race that enterprises must prepare for now.
Developers Can Do More to Up Their Security Game: Report
Developers can play a vital role in accelerating the adoption of AppSec practices, security vendor says.
Retail and Hospitality Breaches Declined Over Past 2 Years
A drop in publicly disclosed breaches for the two industries is due in part to fewer point-of-sale breaches.
Trend Micro Buys Immunio
The acquisition is aimed at balancing the speed of DevOps with application security.
MORE NEWS & COMMENTARY
HOT TOPICS
6 Real Black Friday Phishing Lures
As the mega-shopping day approaches, here's a look at six examples of phishing attacks - and ways to avoid taking the bait.

New OWASP Top 10 List Includes Three New Web Vulns
But dropping cross-site request forgeries from list is a mistake, some analysts say.

3 Pillars of Cyberthreat Intelligence
Strong enterprise cybersecurity programs must be a built on a framework that incorporates strategic, operational, and tactical leadership and goals.

MORE
EDITORS' CHOICE

8 Low or No-Cost Sources of Threat Intelligence
Here's a list of sites that for little or no cost give you plenty of ideas for where to find first-rate threat intelligence.

Name that Toon: 'Tis the Season

We provide the cartoon. You provide the caption.


Tech Resources
ACCESS TECH LIBRARY NOW

  • Fearless & Secure Cloud Migration

    In this webinar, learn how to make a safe, secure migration to the cloud, that both manages risks and takes advantage of all the security benefits. Also, learn how other security pros are approaching their cloud security efforts.

  • Lean Analytics for 2018

    Alistair Croll, Author of Lean Analytics joins AllAnalytics radio Nov. 27, find out more.

MORE WEBINARS

Partner Perspectives

'Reaper': The Professional Bot Herder's Thingbot
Is it malicious? So far it's hard to tell. For now it's a giant blinking red light in security researchers faces warning us that we'd better figure out how to secure the Internet of Things.

'Goldilocks' Legislation Aims to Clean up IoT Security
The proposed Internet of Things Cybersecurity Improvement Act of 2017 is not too hard, not too soft, and might be just right.

5 Reasons CISOs Should Keep an Open Mind about Cryptocurrency
With untold new markets for Bitcoin and other 'alt-coins,' it's going to be an exciting future -- and security leaders need to get ready for it.

FEATURED REPORTS
  • 2017 State of IT Report

    In today's technology-driven world, "innovation" has become a basic expectation. IT leaders are tasked with making technical magic, improving customer experience, and boosting the bottom line -- yet often without any increase to the IT budget. How are organizations striking ...

  • [Security] Budgets, Plans & Priorities

    Enterprises are spending an unprecedented amount of money on IT security -- where does it all go? In this survey, Dark Reading polled senior IT management on security budgets and spending plans, and their priorities for the coming year. Download ...

MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.