Follow Dark Reading:
 February 01, 2018
LATEST SECURITY NEWS & COMMENTARY
Lazarus Group, Fancy Bear Most Active Threat Groups in 2017
Lazarus, believed to operate out of North Korea, and Fancy Bear, believed to operate out of Russia, were most referenced threat actor groups in last year's cyberattacks.
Passwords: 4 Biometric Tokens and How They Can Be Beaten
Authentication security methods are getting better all the time, but they are still not infallible.
K-12 Study Gives Schools Low Marks for Protecting Student Privacy Online
Survey says local school districts and education departments lack even the most basic security and privacy safeguards.
Google Cloud Least-Privilege Function Goes Live
Custom Roles for Cloud IAM now available in production from Google.
5 Questions to Ask about Machine Learning
Marketing hyperbole often exceeds reality. Here are questions you should ask before buying.
700,000 Bad Apps Deleted from Google Play in 2017
Google rejected 99% of apps with abusive content before anyone could install them, according to a 2017 security recap.
MORE NEWS & COMMENTARY
HOT TOPICS
Microsoft Issues Emergency Patch to Disable Intel's Broken Spectre Fix
Affected Windows systems can also be set to "disable" or "enable" the Intel microcode update for Spectre attacks.

DNS Hijacking: The Silent Threat That's Putting Your Network at Risk
The technique is easy to carry out and can cause much damage. Here's what you need to know about fighting back.

Former CIA CTO Talks Meltdown and Spectre Cost, Federal Threats
Gus Hunt, former technology leader for the CIA, explains the potential long-term cost of Meltdown and Spectre.

MORE
EDITORS' CHOICE

IoT Botnets by the Numbers
IoT devices are a botherder's dream attack-vector.
5 Steps to Better Security in Hybrid Clouds
Following these tips can improve your security visibility and standardize management across hybrid environments.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Strategies for Monitoring & Measuring Cloud Security

    In this Dark Reading webinar, a top expert offers a look at practices and tools that will help your team monitor security in IT environments that incorporate many cloud applications and services.

  • Open Source Security for Containers in a DevOps World

    Managing container infrastructure in a production environment is challenged by problems of scale. One of the biggest problems is trust--specifically trust of the application. To put it another way, can you trust that all containers in your Kubernetes or OpenShift ...

MORE WEBINARS

Partner Perspectives

Data Encryption: 4 Common Pitfalls
To maximize encryption effectiveness you must minimize adverse effects in network performance and complexity. Here's how.

Selling Cloud-Based Cybersecurity to a Skeptic
When it comes to security, organizations don't need to look at cloud as an either/or proposition. But there are misconceptions that need to be addressed.

Avoiding the Epidemic of Hospital Hacks
Lessons learned about cyber hygiene from inside one of America's highest ranked medical institutions.

FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.