Follow Dark Reading:
 April 18, 2017
LATEST SECURITY NEWS & COMMENTARY
Microsoft Fixed Windows Vulns Before Shadow Brokers Dump
Microsoft reports the Windows exploits released by Shadow Brokers had already been fixed in earlier patches.
Why Brand Trumps Tech in C-Level Conversations
Brand reputation, not technical tools, should be the focus of the CIO's conversations with board members about the importance of security.
The Second Coming of Managed File Transfer Has Arrived
Sometimes, a mature, embedded technology still makes the most sense, especially when it comes to data security.
Man Admits Hacking into His Former Employer's Network
Tennessee man pleads guilty in federal court, acknowledging he illegally accessed his former employer's networks to gain an edge over his rival.
MORE NEWS & COMMENTARY
HOT TOPICS
Forget the Tax Man: Time for a DNS Security Audit
Here's a 5-step DNS security review process that's not too scary and will help ensure your site availability and improve user experience.

95% of Organizations Have Employees Seeking to Bypass Security Controls
Use of TOR, private VPNs on the rise in enterprises, Dtex report shows.

Health Savings Account Fraud: The Rapidly Growing Threat
As income tax season comes to a close, financially-motivated cybercriminals are honing new tactics for monetizing medical PII.

MORE
EDITORS' CHOICE

6 New Security Startups Named to MACH37 Spring Cohort
The companies selected this year include technical talent that draws from Silicon Valley to Hungary and Western Europe.
SECURITY LIVE AT INTEROP ITX

10 Questions To Get Practical Answers At Interop ITX
May 15-19 in Las Vegas: How to get solutions and advice from top speakers for the things that you really want to know.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Get Control Over Your Data Quality/Data Governance

    AllAnalytics' year-end online poll asking about 2017 goals revealed that your top priority this year is around data quality and data trust. How is your data quality program measuring up so far this year? Attend this radio show and find out!

  • Becoming a Threat Hunter in Your Enterprise

    You're tired of waiting. Tired of waiting for your technology to alert you that there's already a problem. You want to be more proactive, sink your hands into those threat intelligence feeds, dig into those behavioral analytics reports, follow one ...

MORE WEBINARS

Partner Perspectives

Securing your Privacy on Android
If you work at a company that allows you to use your mobile device to login to email, access company data, or connect to company Wi-Fi, you're more of a security risk than you think.

Top 5 Dumbest Cyber Threats That Still Pay Off
Some hackers are fairly predictable in their successful use of really dumb attacks.

Exploit Kits: Winter 2017 Review
We take another look at the current EK scene by going over RIG, Sundown, Neutrino and Magnitude.

FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.