Follow Dark Reading:
 December 06, 2018
LATEST SECURITY NEWS & COMMENTARY
MITRE Changes the Game in Security Product Testing
Nonprofit has published its first-ever evaluation of popular endpoint security tools - measured against its ATT&CK model.
Starwood Breach Reaction Focuses on 4-Year Dwell
The unusually long dwell time in the Starwood breach has implications for both parent company Marriott International and the companies watching to learn from.
'London Blue' BEC Cybercrime Gang Unmasked
Security firm turned the tables on attackers targeting its chief financial officer in an email-borne financial scam.
Toyota Builds Open-Source Car-Hacking Tool
'PASTA' testing platform specs will be shared via open-source.
6 Ways to Strengthen Your GDPR Compliance Efforts
Companies have some mistaken notions about how to comply with the new data protection and privacy regulation - and that could cost them.
The Case for a Human Security Officer
Wanted: a security exec responsible for identifying and mitigating the attack vectors and vulnerabilities specifically targeting and involving people.
MORE NEWS & COMMENTARY
HOT TOPICS
Filling the Cybersecurity Jobs Gap - Now and in the Future
Employers must start broadening their search for experienced security professionals to include people with the right traits rather than the right skills.

5 Emerging Trends in Cybercrime
Organizations can start today to protect against 2019's threats. Look out for crooks using AI "fuzzing" techniques, machine learning, and swarms.

Microsoft, Mastercard Aim to Change Identity Management
A new partnership wants to improve how people use and manage the virtual identities that govern their lives online.

MORE
EDITORS' CHOICE

Holiday Hacks: 6 Cyberthreats to Watch Right Now
'Tis the season for holiday crafted phishes, scams, and a range of cyberattacks. Experts list the hottest holiday hacks for 2018.
Threat Hunting: Improving Bot Detection in Enterprise SD-WANs
How security researchers tracked down Kuai and Bujoi malware through multiple vectors including client type, traffic frequency, and destination.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Stopping Email-Borne Threats from Spreading like the Flu

    Your organization likely has extensive security protections for your inbound email from the Internet. However, as much as two-thirds of many organizations' total email traffic is generated internally by users. And, of course, attackers know this.

  • 10 Emerging Threats to Today's Enterprise Applications

    In this Dark Reading webinar, application security experts offer a look at some of the latest and most potentially damaging threats to current enterprise apps, and how those threats can expose your organization to data compromise and theft. The experts ...

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Weekly
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Weekly Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.