Follow Dark Reading:
 March 15, 2017
LATEST SECURITY NEWS & COMMENTARY
New 'PetrWrap' Signals Intensified Rivalry Among Ransomware Gangs
PetrWrap modifies Petya ransomware so its authors can't control unauthorized use of their malware.
Debunking 5 Myths About DNS
From the boardroom to IT and the end user, the Domain Name System is often misunderstood, which can leave organizations vulnerable to attacks.
60% of Businesses Mistakenly Sent out Sensitive Documents
Some 43% of organizations say they lack widely understood policies for securing internal documents.
The Industrial Revolution of Application Security
DevOps is driving big changes in the industry, but a cultural shift is needed.
Canada Takes Tax Site Offline After Apache Struts Attacks
Hackers exploit vulnerability in Apache Struts 2 software of Statistics Canada but no damage done.
Awareness Training Can Help Quell Ransomware Attacks
53 percent of organizations fall victim to ransomware, despite multiple technological defenses; but the right awareness training brings that infection rate down significantly, KnowBe4 study finds.
MORE NEWS & COMMENTARY
HOT TOPICS
What Your SecOps Team Can (and Should) Do
If your organization has all of these pieces in place, congratulations!

Nigerian Cybercrime Matures, Morphs
INTERPOL, security researchers see West Africa cybercrime scene expanding and getting more sophisticated.

In Cybersecurity, 'Sales Engineers' Rake in Higher Salaries Than Tech Workers
Stop coding, start selling, and you could earn 50 percent more.

MORE
EDITORS' CHOICE

Security at InteropITX

Check out all the sessions in the Interop Security Track. And don't forget about the two-day Dark Reading Cybersecurity Summit -- a great "what you need to know now" refresher for the overworked infosec pro or security crash course for the IT generalists in your life.


9 Phishing Lures that Could Hijack your 2017 Tax Refund
Scammers are taking an aggressive, social-engineering approach to tax season this year.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Evolution of the Data Scientist Role

    In the years since data scientist was declared the sexiest job, the role itself has evolved. As happens with any job, hiring managers have been adjusting their expectations for data science candidates, and executives are defining the role of the ...

  • [Cybersecurity] Building an Architecture to Combat Today's Risks

    "Layered defense" has traditionally been the modus operandi of IT security, but this approach can't be counted on to stand up to today's threats and attacks. In addition, attack surfaces are growing every day as companies adopt technologies like cloud ...

MORE WEBINARS

Partner Perspectives

7 Things You Need to Know about Bayesian Spam Filtering
Knowing how spam filters work can clarify how some messages get through, and how your own emails can avoid being caught.

4 Ways to Recover from a Cyberattack
Be prepared and act quickly are two key steps that will help you bounce back quickly from a cyberattack.

Adware vs. Ad Fraud: Viva la Difference!
Both earn their money in the advertising trade but they each have very different means of operation and targets.

FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.