Follow Dark Reading:
 April 17, 2018
LATEST SECURITY NEWS & COMMENTARY
Microsoft to Roll Out Azure Sphere for IoT Security
Azure Sphere, now in preview, is a three-part program designed to secure the future of connected devices and powered by its own custom version of Linux.
DevOps May Be Cause of and Solution to Open Source Component Chaos
DevOps is accelerating the trend of componentized development approaches, but its automation can also help enforce better governance and security.
Large Majority of Businesses Store Sensitive Data in Cloud Despite Lack of Trust
Researchers report 97% of survey respondents use some type of cloud service but continue to navigate issues around visibility and control.
How GDPR Forces Marketers to Rethink Data & Security
The European regulation is making marketing technology companies re-examine their security, and that's a good thing.
Companies Still Suffering From Poor Credential Hygiene: New Report
Credentials are being mis-handled and it's hurting most companies, according to a new report out today.
Symantec Now Offers Threat Detection Tools Used by its Researchers
TAA now is part of Symantec's Integrated Cyber Defense Platform.
MORE NEWS & COMMENTARY
HOT TOPICS
Stats on the Cybersecurity Skills Shortage: How Bad Is It, Really?
Is it just a problem of too few security professionals, or are there other reasons enterprises struggle to build infosec teams?

Attackers Exploit Cisco Switch Issue as Vendor Warns of Yet Another Critical Flaw
Cisco says companies fixing previously known protocol issue should also patch against critical remote-code execution issue.

New Email Campaign Employs Malicious URLs
A new attack dropping the Quant Loader Trojan bypasses scanners and sandboxes.

MORE
EDITORS' CHOICE

INsecurity Conference Seeks Security Pros to Speak on Best Practices
Dark Reading's second annual data defense conference will be held Oct. 23-25 in Chicago; call for speakers is issued.
7 Non-Financial Data Types to Secure
Credit card and social security numbers aren't the only sensitive information that requires protection.
Tech Resources

Partner Perspectives

How Attackers Can Exploit rTorrent with Monero Cryptocurrency Miner
As cryptomining campaigns become more profitable, cybercriminals are becoming more creative about finding new ways to extend their operations.

Avoiding the Ransomware Mistakes that Crippled Atlanta
What made Atlanta an easy target was its outdated use of technology: old computers running on non-supported platforms, which are also a characteristic of many municipalities and most major cities.

Cryptomining: Fast-Becoming the Web's Most Profitable Attack Method
The ROI of 'cryptojacking' has never been higher, making bitcoin and other cryptocurrencies a more attractive target for cybercriminals. Here's why.

FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.