Follow Dark Reading:
 February 23, 2019
LATEST SECURITY NEWS & COMMENTARY
Lessons From the War on Malicious Mobile Apps
Despite the openness of the Android platform, Google has managed to keep its Play store mainly free of malware and malicious apps. Outside of the marketplace is a different matter.
To Mitigate Advanced Threats, Put People Ahead of Tech
Preventative technologies are only part of the picture and often come at the expense of the humans behind them.
New Legislation Builds on California Data Breach Law
This bill requires businesses to notify consumers of compromised passport numbers and biometric data.
New Malware Campaign Targets Job Seekers
LinkedIn profiles provide a persistent, patient threat actor with the information required to craft spear-phishing messages.
Learn to Plug (or Exploit) New Vulnerabilities at Black Hat Asia
There's no better place to bone up on the ins and outs of web security than Black Hat Asia in Singapore next month.
MORE NEWS & COMMENTARY
HOT TOPICS
High Stress Levels Impacting CISOs Physically, Mentally
Some have even turned to alcohol and medication to cope with pressure.

The Anatomy of a Lazy Phish
A security engineer breaks down how easy it is for unskilled attackers to trick an unsuspecting user to submit credentials to a phishing site.

ICS/SCADA Attackers Up Their Game
With attackers operating more aggressively and stealthily, some industrial network operators are working to get a jump on the threats.

MORE
EDITORS' CHOICE

6 Tips for Getting the Most from Your VPN
VPNs are critical for information security. But simply having these cozy security tunnels in the toolkit isn't enough to keep an organization's data safe.
Why Cybersecurity Burnout Is Real (and What to Do About It)
The constant stresses from advanced malware to zero-day vulnerabilities can easily turn into employee overload with potentially dangerous consequences. Here's how to turn down the pressure.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Tools & Techniques to Disrupt Lateral Movement

    In this webinar you'll learn about the tools and techniques you can use to detect attackers' lateral movement within your computing environment and how to stop them before they launch their final payload.

  • Choosing the Right Strategies for Endpoint Security

    In this webinar, experts will discuss methods for rationalizing endpoint protection tools and strategies and building a comprehensive strategy that works across the entire organization.

MORE WEBINARS

Partner Perspectives

Get Smart About Network Segmentation & Traffic Routing
Through a combination of intelligent segmentation and traffic routing to tools, you can gain much better visibility into your network. Here's how.

Boosting Security Effectiveness with 'Adjuvants'
How integrating corporate resources like the IT help desk, system administration, quality assurance and HR can breathe new life into your security program.

FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.