Follow Dark Reading:
 March 07, 2018
LATEST SECURITY NEWS & COMMENTARY
Identity Management: Where It Stands, Where It's Going
How companies are changing the approach to identity management as people become increasingly digital.
Pragmatic Security: 20 Signs You Are 'Boiling the Ocean'
Ocean-boiling is responsible for most of the draconian, nonproductive security policies I've witnessed over the course of my career. Here's why they don't work.
Design Weakness in Microsoft CFG Allows Complete Bypass
Researchers from Italy's University of Padua will demo a new technique to evade Control Flow Guard, the widely deployed security mechanism, at Black Hat Asia.
Connected Cars Pose New Security Challenges
The auto industry should seize the opportunity and get in front of this issue.
Second Ransomware Round Hits Colorado DOT
A variant of SamSam sends CDOT employees back to pen and paper with two attack waves in two weeks.
MORE NEWS & COMMENTARY
HOT TOPICS
Millions of Office 365 Accounts Hit with Password Stealers
Phishing emails disguised as tax-related alerts aim to trick users into handing attackers their usernames and passwords.

How & Why the Cybersecurity Landscape Is Changing
A comprehensive new report from Cisco should "scare the pants off" enterprise security leaders.

Hacking on TV: 8 Binge-Worthy and Cringe-Worthy Examples
From the psycho-drama Mr. Robot to portraying the outright dangers of ransomware taking down a hospital in Grey's Anatomy, hacking themes now run deep in today's TV shows.

MORE
EDITORS' CHOICE

6 Questions to Ask Your Cloud Provider Right Now
Experts share the security-focused issues all businesses should explore when researching and using cloud services.
Number of Sites Hosting Cryptocurrency Miners Surges 725% in 4 Months
The dramatic increase in cryptocurrency prices, especially for Monero, is behind the sudden explosive growth, says Cyren.
Tech Resources

Partner Perspectives

A Sneak Peek at the New NIST Cybersecurity Framework
Key focus areas include supply chain risks, identity management, and cybersecurity risk assessment and measurement.

Journey to the Cloud: Overcoming Security Risks
Lessons learned from a global consultancy's 10-year transition from on-premises to 99% cloud-based infrastructure.

Virtual Private Networks: Why Their Days Are Numbered
As companies move to the cloud and depend less on physical servers and network connections, their reliance on VPNs for security will eventually evolve, if not disappear altogether.

FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.