Follow Dark Reading:
 April 03, 2018
LATEST SECURITY NEWS & COMMENTARY
Hudson's Bay Brands Hacked, 5 Million Credit Card Accounts Stolen
The infamous Carbanak/FIN7 cybercrime syndicate breached Saks and Lord & Taylor and is now selling some of the stolen credit card accounts on the Dark Web.
'Hack the Defense Travel System': DoD Extends its Bug Bounty Program
The fifth US Department of Defense bug bounty program, launched with HackerOne, will target a DoD enterprise system used by millions.
Is Security Accelerating Your Business?
With an ever-growing list of security and compliance requirements, security can hinder or slow business initiatives. Is your security department stuck in slow gear or can it go faster?
Qualys Buys 1Mobility Software Assets
Qualys has purchased the software assets of 1Mobility for an undisclosed sum.
MORE NEWS & COMMENTARY
HOT TOPICS
Microsoft Rushes Out Fix for Major Hole Caused by Previous Meltdown Patch
Issue affects Windows 7 x64 and Windows Server 2008 R2 x64 systems.

MITRE Evaluates Tools for APT Detection
A new service from MITRE will evaluate products based on how well they detect advanced persistent threats.

Attackers Shift From Adobe Flaws to Microsoft Products
Seven of the Top 10 most commonly exploited vulnerabilities in 2017 were Microsoft-related - not Adobe Flash as in years past, Recorded Future found.

MORE
EDITORS' CHOICE

10 Women in Security You May Not Know But Should
The first in a series of articles shining a spotlight on women who are quietly changing the game in cybersecurity.
The Cybersecurity Mandates Keep On Coming
There's a good reason for the proliferation of mandates like the one in New York state, but companies may struggle to answer this question: "Are we in compliance?"
Tech Resources

Partner Perspectives

Deconstructing a Business Email Compromise Attack
How a tech-savvy New Jersey couple outwitted a German hacker group and saved their home and life savings.

Getting Ahead of Internet of Things Security in the Enterprise
In anticipation of an IoT-centric future, CISOs must be rigorous in shoring up defenses that provide real-time insights across all network access points.

Applications & Identities Initial Targets in 86% of Breaches: Report
The startling numbers of breached data are sobering: 11.8 billion records compromised in 337 of 433 incidents examined by F5 researchers. They include 10.3 billion usernames, passwords, and email accounts.

FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.