Follow Dark Reading:
 September 20, 2017
LATEST SECURITY NEWS & COMMENTARY
New Spam Campaign Literally Doubles Down on Ransomware
An upgraded spam campaign alternates Locky and FakeGlobe ransomware, forcing victims to pay twice or lose all their data.
Siemens' New ICS/SCADA Security Service a Sign of the Times
Major ICS/SCADA vendors are entering the managed security services business with cloud-based offerings for energy and other industrial sectors.
How Apple's New Facial Recognition Technology Will Change Enterprise Security
Expect a trickle-down effect, as tech similar to Face ID becomes offered outside of Apple.
Viacom's Secret Cloud Keys Exposed
The entertainment giant is the latest company to misconfigure its Amazon Web Services S3 cloud storage bucket.
GDPR & the Rise of the Automated Data Protection Officer
Can artificial intelligence and machine learning solve the skills shortage as the EU's General Data Protection Regulation deadline approaches?
Avast-Owned Piriform Releases CCleaner Security Update
The Avast subsidiary has released two new versions of CCleaner following the discovery of a supply-chain attack.
MORE NEWS & COMMENTARY
HOT TOPICS
Equifax CIO, CSO Step Down
Embattled credit-monitoring company names interim replacements for both positions and outlines more details about the massive breach.

Equifax Exec Departures Raise Questions About Responsibility for Breach
Disclosed details suggest a failure by the technology team but senior executives and the board are not above responsibility as well, experts say.

FTC Opens Probe into Equifax Data Breach
Apache Struts flaw was known to be critical and should have been addressed, security researchers say.

MORE
EDITORS' CHOICE

10 Ways to Prevent Your Mobile Devices From Becoming Bots
Enterprises may not notice a huge impact on their network's bandwidth, but other repercussions may loom in the background.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Building a Cybersecurity Architecture to Combat Today's Risks

    "Layered defense" has traditionally been the modus operandi of IT security, but this approach can't be counted on to stand up to today's threats and attacks. In addition, attack surfaces are growing every day as companies adopt technologies like cloud ...

  • Threat Intelligence Overload?

    A wide range of threat intelligence feeds and services have cropped up keep IT organizations up to date on the latest security threats. But without mechanisms in place to actually use the information, these alerts provide little benefit.

MORE WEBINARS

Partner Perspectives

Artificial Intelligence: Getting the Results You Want
Finding a vendor that doesn't claim to do AI is hard these days. But getting the benefits you need and expect is even harder.

The Hunt for IoT: The Rise of Thingbots
Across all of our research, every indication is that today's "thingbots" - botnets built exclusively from Internet of Things devices - will become the infrastructure for a future Darknet.

Detection, Prevention & the Single-Vendor Syndrome
Why security teams need to integrate 'Defense in Depth' principles into traditional solutions designed with integration and continuity in mind.

FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.