Follow Dark Reading:
 March 28, 2017
LATEST SECURITY NEWS & COMMENTARY
Hacking the Business Email Compromise
BEC attacks are on the rise, but plain-old spoofing of business executives' email accounts remains more prevalent.
FBI: Attackers Targeting Anonymous FTP Servers in Healthcare
The FBI warns medical and dental organizations of cybercriminals targeting anonymous FTP servers to steal personal health data.
Data Visualization: Keeping an Eye on Security
Visualization can be one of the most powerful approaches a security team can use to make sense of vast quantities of data. So why does it end up as an afterthought?
Symantec Seeks to Quell CA Customer Concerns over Google Warning
Exec at Symantec spells out what company will do if Google follows through on its proposed plans to degrade trust in Symantec certs.
40% of Discarded Digital Devices Contain Personal Data
NAID study of 250 devices in resale markets found tablets contained the most recoverable personal information.
MORE NEWS & COMMENTARY
HOT TOPICS
Phishing Your Employees for Schooling & Security
Your education program isn't complete until you test your users with fake phishing emails.

Intro to Cyber Insurance: 7 Questions to Ask
Buying a cyber insurance policy can be complex and difficult. Make sure you're asking these questions as you navigate the process.

Future of the SIEM
Current SIEM systems have flaws. Here's how the SIEM's role will change as mobile, cloud, and IoT continue to grow.

MORE
EDITORS' CHOICE

7 Steps to Transforming Yourself into a DevSecOps Rockstar
Security practitioners at one education software firm offer lessons learned from merging DevOps with security.
This Week On Dark Reading: Event Calendar
Ransomware remediation and recovery this week, with clouds on the horizon.
Tech Resources
ACCESS TECH LIBRARY NOW

MORE WEBINARS

Partner Perspectives

Malware Explained: Packer, Crypter & Protector
These three techniques can protect malware from analysis. Here's how they work.

7 Things You Need to Know about Bayesian Spam Filtering
Knowing how spam filters work can clarify how some messages get through, and how your own emails can avoid being caught.

4 Ways to Recover from a Cyberattack
Be prepared and act quickly are two key steps that will help you bounce back quickly from a cyberattack.

FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.