Follow Dark Reading:
 October 30, 2019
LATEST SECURITY NEWS & COMMENTARY
Old RAT, New Moves: Adwind Hides in Java Commands to Target Windows
The Adwind remote access Trojan conceals malicious activity in Java commands to slip past threat intelligence tools and steal user data.
Cybersecurity Trumps Political, Reputational Concerns for Companies
The average company has seen its risk increase, with cybersecurity topping the list of business threats, followed by damage to reputation and financial risks, a report finds.
Why Cloud-Native Applications Need Cloud-Native Security
Today's developers and the enterprises they work for must prioritize security in order to reap the speed and feature benefits these applications and new architectures provide.
Who Made the List Of 2019's Nastiest Malware?
This year's compilation features well-known ransomware, botnet, and cryptomining software.
Why It's Imperative to Bridge the IT & OT Cultural Divide
As industrial enterprises face the disruptive forces of an increasingly connected world, these two cultures must learn to coexist.
Google Cloud Adds New Security Management Tools to G Suite
Desktop devices that log into G Suite will have device management enabled by default, streamlining processes for IT admins.
MORE NEWS & COMMENTARY
HOT TOPICS
Microsoft Office Bug Remains Top Malware Delivery Vector
CVE-2017-11882 has been attackers' favorite malware delivery mechanism throughout the second and third quarters of 2019.

40% of Security Pros Job Hunting as Satisfaction Drops
Symptoms of job dissatisfaction creep into an industry already plagued with gaps in diversity and work-life balance.

Fortinet Bolsters Endpoint Security with enSilo Acquisition
As companies reduce their vendor count, consolidation will likely continue to accelerate in the next year.

MORE
EDITORS' CHOICE

8 Tips for More Secure Mobile Computing
Mobile devices are a huge part of enterprise IT. Here's what to advise their users to do to keep their devices - and critical business data - best protected.
It's Time to Improve Website Identity Indicators, Not Remove Them
Why Google and Mozilla are wrong about the benefits of Extended Validation certificates that aim to prevent fraud and protect user privacy.
NEW FROM THE EDGE

The Real Reasons Why the C-Suite Isn't Complying with Security
Is the C-suite really that bad at following security policy? Or is it a case of mixed messages and misunderstanding?
Tech Resources
ACCESS TECH LIBRARY NOW

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By Dark Reading
Informa Tech
303 Second St., Suite 900 South Tower, San Francisco, CA 94107
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.