Follow Dark Reading:
 March 23, 2018
LATEST SECURITY NEWS & COMMENTARY
Hunting Cybercriminals with AWS Honey Tokens
Researchers at Black Hat Asia demonstrated how they used AWS honey tokens to detect security breaches at scale.
Criminals Using Web Injects to Steal Cryptocurrency
Man-in-the-browser attacks targeting Blockchain.info and Coinbase websites, SecurityScorecard says.
5 Ways to Get Ready for Public Cloud Deployment
Syncing security and product development early is now a "must do."
Is Application Security Dead?
The nature of the field has changed greatly because of the move to the cloud and enterprise digital transformation.
US Federal Spending Bill Includes $380 Million for Securing Election Systems
Spending bill includes election technology grants for states to shore up security of their voting systems, reports say.
MORE NEWS & COMMENTARY
HOT TOPICS
7 Spectre/Meltdown Symptoms That Might Be Under Your Radar
The Spectre/Meltdown pair has a set of major effects on computing but there are impacts on the organization that IT leaders might not have considered in the face of the immediate problem.

Russian APT Compromised Cisco Router in Energy Sector Attacks
DragonFly hacking team that targeted US critical infrastructure compromised a network router as part of its attack campaign against UK energy firms last year.

Who Does What in Cybersecurity at the C-Level
As security evolve as a corporate priority, so do the roles and responsibilities of the executive team. These seven titles are already feeling the impact.

MORE
EDITORS' CHOICE

7 Ways to Protect Against Cryptomining Attacks
Implementing basic security hygiene can go a long way in ensuring your systems and website don't get hijacked.
How Serverless Computing Reshapes Security
The new division of responsibility moves some security concerns off a business's plate while changing priorities for other risks.
Tech Resources
ACCESS TECH LIBRARY NOW

MORE WEBINARS

Partner Perspectives

Applications & Identities Initial Targets in 86% of Breaches: Report
The startling numbers of breached data are sobering: 11.8 billion records compromised in 337 of 433 incidents examined by F5 researchers. They include 10.3 billion usernames, passwords, and email accounts.

Cybersecurity Spring Cleaning: 3 Must-Dos for 2018
Why 'Spectre' and 'Meltdown,' GDPR, and the Internet of Things are three areas security teams should declutter and prioritize in the coming months.

How to Interpret the SEC's Latest Guidance on Data Breach Disclosure
Forward-looking organizations should view this as an opportunity to reevaluate their cybersecurity posture and install best practices that should have already been in place.

FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.