Follow Dark Reading:
 January 10, 2019
LATEST SECURITY NEWS & COMMENTARY
NCSC Launches Nation-State Cyber Threat Protection Program for Businesses
National Counterintelligence and Security Center (NCSC) released free online security awareness materials for businesses to defend against nation-state hackers.
Web Vulnerabilities Up, IoT Flaws Down
The number of flaws found in WordPress and its associated plugins have tripled since 2017, while Internet of Things vulnerabilities dropped significantly, according to data collected by Imperva.
Kaspersky Lab Helped US Nab NSA Data Thief: Report
But this new development unlikely to do much to clear government suspicions about security vendor's ties to Russian intelligence, analyst says.
Container Deployments Bring Security Woes at DevOps Speed
Nearly half of all companies know that they're deploying containers with security flaws, according to a new survey.
Security at the Speed of DevOps: Maturity, Orchestration, and Detection
Container and microservices technologies, including the orchestrator Kubernetes, create an extraordinary opportunity to build infrastructure and applications that are secure by design.
Security Concerns Limit Remote Work Opportunities
When companies limit the remote work options that they know will benefit the organization, security concerns are often to blame.
Magecart Mayhem Continues in OXO Breach
The home goods company confirmed users' data may have been compromised during multiple time frames over a two-year period.
MORE NEWS & COMMENTARY
HOT TOPICS
How Intel Has Responded to Spectre and Meltdown
In a newly published editorial and video, Intel details what specific actions it has taken in the wake of the discovery of the CPU vulnerabilities.

Emotet Malware Gets More Aggressive
Emotet's operators have been adding new capabilities, making the malware now even more dangerous to its enterprise targets.

Threat of a Remote Cyberattack on Today's Aircraft Is Real
We need more stringent controls and government action to prevent a catastrophic disaster.

MORE
EDITORS' CHOICE

6 Ways to Beat Back BEC Attacks
Don't assume your employees know how to spot business email compromises - they need some strong training and guidance on how to respond in the event of an attack.
Cutting Through the Jargon of AI & ML: 5 Key Issues
Ask the tough questions before you invest in artificial intelligence and machine learning technology. The security of your enterprise depends on it.
Tech Resources
ACCESS TECH LIBRARY NOW

MORE WEBINARS

Partner Perspectives

Get Smart About Network Segmentation & Traffic Routing
Through a combination of intelligent segmentation and traffic routing to tools, you can gain much better visibility into your network. Here's how.

Boosting Security Effectiveness with 'Adjuvants'
How integrating corporate resources like the IT help desk, system administration, quality assurance and HR can breathe new life into your security program.

FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.