Follow Dark Reading:
 May 09, 2018
LATEST SECURITY NEWS & COMMENTARY
Publicly Disclosed Breaches Down Drastically in Q1 2018
Quietest first quarter since 2012, according to new report from Risk Based Security.
APT Attacks on Mobile Rapidly Emerging
Mobile devices are becoming a 'primary' enterprise target for attackers.
Microsoft's Patch Tuesday Fixes Two CVEs Under Active Attack
This month's updates addressed vulnerabilities in Windows, Office, Edge, Internet Explorer, .Net Framework, Exchange Server, and other services.
Breakout Time: A Critical Key Cyber Metric
Why organizations need to detect an intrusion in under a minute, understand it in under 10 minutes, and eject the adversary in under an hour.
8.7B Identity Records on Surface, Deep, Dark Webs in 2017
The 4iQ Identity Breach Report shows a 182% increase in raw identity records discovered by its team between 2016 and 2017.
Properly Framing the Cost of a Data Breach
The expenses and actions typically associated with a cyberattack are not all created equal. Here's how to explain what's important to the C-suite and board.
MORE NEWS & COMMENTARY
HOT TOPICS
Why DDoS Just Won't Die
Distributed denial-of-service attacks are getting bigger, badder, and 'blended.' What you can (and can't) do about that.

Defending Against an Automated Attack Chain: Are You Ready?
Recent threats like AutoSploit bring malware-as-a-service to a whole new level. Here are four ways to be prepared.

Spectre Returns with 8 New Variants
Researchers have discovered versions of the processor vulnerability.

MORE
EDITORS' CHOICE

10 Lessons From an IoT Demo Lab
The Demo Lab at InteropITX 2018 was all about IoT and the traffic - legitimate and malicious - it adds to an enterprise network.
Start Your Day With A Smile...

Name That Toon: Threat Landscape

We provide the cartoon. You provide the caption. Win an Amazon gift card!


Tech Resources
ACCESS TECH LIBRARY NOW

MORE WEBINARS

Partner Perspectives

Report: More Breaches Despite Increasing Security Budgets
Lack of security talent, low security awareness among employees, and too much data to analyze tops the list of cyberthreats in the 2018 Cyberthreat Defense Threat Report from CyberEdge group.

4 Critical Applications and How to Protect Them
Since critical apps are, well, critical, security teams must take preventive measures to keep attackers from exploiting their vulnerabilities.

3 Ways to Maximize Security and Minimize Business Challenges
The best strategy for choosing security tools and architecting networks is to focus on staffing and resources, risk tolerance, and business change.

FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.