Follow Dark Reading:
 November 09, 2017
LATEST SECURITY NEWS & COMMENTARY
It Takes a Buck to Make a Million on the Dark Web
The cost for malware tools and services can add up, but the returns from cybercrime campaigns can be enormous, says Recorded Future.
Data Breach Record Exposure Up 305% from 2016
There have been 3,833 publicly disclosed data breaches in the first nine months of 2017, exposing more than seven billion records.
8 Older Companies Doing New Things in Security
These organizations have been around for a while but aren't slowing down on security releases.
Burnout, Culture Drive Security Talent Out the Door
Security's efforts to bridge the talent gap mean little when workers don't want to stay in the industry.
How I Infiltrated a Fortune 500 Company with Social Engineering
Getting into the company proved surprisingly easy during a contest. Find out how to make your company better prepared for real-world attacks.
4 Ways the Next Generation of Security Is Changing
The CISO's job will get easier because of trends in the industry. Here's how.
Hiring Outside the Box in Cybersecurity
Candidates without years of experience can still be great hires, as long as they are ready, willing, and able.
MORE NEWS & COMMENTARY
HOT TOPICS
Hackers Poison Google Search Results to Deliver Zeus Panda
Threat actors leverage SEO to ensure malicious links rank highly in Google results to infect targets with Trojan.

Social Engineer Spills Tricks of the Trade
A social engineer points out gaping holes in businesses' human security and shares lessons learned from years of phishing research.

10 Mistakes End Users Make That Drive Security Managers Crazy
Here's a list of common, inadvertent missteps end users make that can expose company data.

MORE
EDITORS' CHOICE

Inhospitable: Hospitality & Dining's Worst Breaches in 2017
Hotels and restaurants are in the criminal crosshairs this year.
Greg Touhill: How an Air Force Lieutenant Became One of Cybersecurity's Top Guns
Security Pro File: After leading cyber efforts in the military, DHS, and the federal government, the former Federal CISO now sets his sights on new security technology

Flash Poll: Political Climate Change

Tell us if the U.S. political climate is changing your infosecurity-related disaster recovery or business continuity plans.


Tech Resources
ACCESS TECH LIBRARY NOW

  • Open Source Security for Containers in a DevOps World

    Managing container infrastructure in a production environment is challenged by problems of scale. One of the biggest problems is trust--specifically trust of the application. To put it another way, can you trust that all containers in your Kubernetes or OpenShift ...

  • Ransomware: Trends, Use Cases & Protection

    Ransomware is one of the favorite flavors of malware and is particularly vicious and showing no signs of slowing down. Join this webinar as Senior Security Researcher Kyle Wilhoit helps us to understand ransomware trends, ransomware use cases, the financial ...

MORE WEBINARS
FEATURED REPORTS
  • The State of Ransomware

    Ransomware has become one of the most prevalent new cybersecurity threats faced by today's enterprises. This new report from Dark Reading includes feedback from IT and IT security professionals about their organization's ransomware experiences, defense plans, and malware challenges. Find ...

  • [Security Breach Report] Overall Impact of & Steps to Prevent Breaches

    Despite the escalation of cybersecurity staffing and technology, enterprises continue to suffer data breaches and compromises at an alarming rate. How do these breaches occur? How are enterprises responding, and what is the impact of these compromises on the business? ...

MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Weekly
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Weekly Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.