Follow Dark Reading:
 October 30, 2017
LATEST SECURITY NEWS & COMMENTARY
It's Time to Change the Cybersecurity Conversation
The IT security industry needs more balance between disclosure of threats and discussion of defense practices - and greater sharing of ideas
Web Attacks Spike in Financial Industry
Web application compromise beats human error as the top data breach cause, putting finance companies at risk for larger attacks, according to a new study.
3 Steps to Reduce Risk in Your Supply Chain
Many companies have very limited visibility into their vendors' security posture -- and some may have thousands of vendors. Here are steps that every company should take to lock down their supply chains.
Passwords Use Alone Still Trumps Multi-Factor Authentication
Strong authentication use overall remains weak but is starting to gain some ground with enterprises.
Identity Theft Ring Hit with Credit Card Fraud Indictment
A federal grand jury indicts six individuals on criminal charges relating to credit card and debit card fraud.
MORE NEWS & COMMENTARY
HOT TOPICS
10 Steps for Stretching Your IT Security Budget
When the budget gods decline your request for an increase, here are 10 ways to stretch that dollar.

10 Social Engineering Attacks Your End Users Need to Know About
It's Cybersecurity Awareness Month. Make sure your users are briefed on these 10 attacker techniques that are often overlooked.

'Bad Rabbit' Ransomware Attacks Rock Russia, Ukraine - and Beyond
Attack employs new version of infamous NotPetya ransomware used in June attacks on Ukraine targets.

MORE
EDITORS' CHOICE

Windows 10 Update: 10 Key New Security Features
Microsoft is tightening its focus on Windows 10 security with several new security tools in its latest major OS update.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Analytics 101: Machine Learning

    Machine learning is a key component in the Artificial Intelligence (AI) toolbox. This technology automates the building of analytical models as machines learn from experience. More enterprises are experimenting with this technology now. Are you ready?

  • Moving UEBA Beyond the Ground Floor

    This webinar will provide the details you need about UEBA so you can make the decisions on how best to protect your organization from the inside out!

MORE WEBINARS

Partner Perspectives

5 Reasons Why the CISO is a Cryptocurrency Skeptic
If you think all you need is technology to defend against bad guys, you shouldn't be a CISO. But technology is all cryptocurrency is, starting with Bitcoin.

CISOs: Striving Toward Proactive Security Strategies
A new survey paints a compelling picture of the modern security executive, how they succeed, and how much power they wield.

6 Steps to Finding Honey in the OWASP
The most famous project of the Open Web Application Security Project is getting an update. Here's what you need to know, and how you can get involved.

FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.