Follow Dark Reading:
 March 30, 2017
LATEST SECURITY NEWS & COMMENTARY
Hacking the Business Email Compromise
BEC attacks are on the rise, but plain-old spoofing of business executives' email accounts remains more prevalent.
7 Steps to Transforming Yourself into a DevSecOps Rockstar
Security practitioners at one education software firm offer lessons learned from merging DevOps with security.
Millions of Stolen US University Email Credentials for Sale on the Dark Web
Researchers find booming underground market for stolen and fake email credentials from the 300 largest universities in the US.
FBI: Attackers Targeting Anonymous FTP Servers in Healthcare
The FBI warns medical and dental organizations of cybercriminals targeting anonymous FTP servers to steal personal health data.
Windows 'DoubleAgent' Attack Turns AV Tools into Malware
Zero-day attack exploits a legitimate process in Windows, according to Cybellum; AV vendors downplay threat.
Data Visualization: Keeping an Eye on Security
Visualization can be one of the most powerful approaches a security team can use to make sense of vast quantities of data. So why does it end up as an afterthought?
MORE NEWS & COMMENTARY
HOT TOPICS
Intro to Cyber Insurance: 7 Questions to Ask
Buying a cyber insurance policy can be complex and difficult. Make sure you're asking these questions as you navigate the process.

5 Ways CISOs Could Work Better with Their Cyber Insurers
Risk management has become increasingly important, making it crucial companies have good relationships with their insurance company.

Future of the SIEM
Current SIEM systems have flaws. Here's how the SIEM's role will change as mobile, cloud, and IoT continue to grow.

MORE
SECURITY LIVE AT INTEROP ITX

MAY 15-19, 2017, MGM GRAND, LAS VEGAS

Learn how to defeat social engineering, BEC & Phishing during Interop ITX. And don't forget about the two-day Dark Reading Cybersecurity Summit -- a great "what you need to know now" refresher for the overworked infosec pro.


Tech Resources
ACCESS TECH LIBRARY NOW

  • NGES (Next Gen Endpoint Security): Tips & Key Considerations for Evaluating Solutions

    Next generation endpoint security (NGES) is one of the hottest topics in today's cybersecurity market, and for good reason. Traditional preventative measures alone offer insufficient endpoint protection - causing an influx of vendors offering NGES. While the market is relatively ...

  • How To Turn Your Data Into Dollars

    Organizations are swamped with data in the form of web traffic, ERP systems, CRM systems, point of sale data, and more. How do you turn that giant heap of data to an organized, integrated insight-generating machine? How do you turn ...

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Weekly
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Weekly Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.