Follow Dark Reading:
 May 04, 2018
LATEST SECURITY NEWS & COMMENTARY
RSA CTO: 'Modernization Can Breed Malice'
Zulfikar Ramzan predicted the future of cybersecurity, drivers shaping it, and how enterprise IT should react in his InteropITX 2018 keynote.
Encryption is Necessary, Tools and Tips Make It Easier
In the InteropITX conference, a speaker provided tips, tools, and incentives for moving to pervasive encryption in the enterprise.
No Computing Device Too Small For Cryptojacking
Research by Trend Micro shows IoT and almost all connected devices are targets for illegal cryptocurrency mining.
Twitter Alerts Users to Change Passwords Due to Flaw that Stored Them Unprotected
Social media giant discovered bug in an internal system that inadvertently stored passwords in plain text.
GDPR Requirements Prompt New Approach to Protecting Data in Motion
The EU's General Data Protection Regulation means that organizations must look at new ways to keep data secure as it moves.
Hackers Leverage GDPR to Target Airbnb Customers
Fraudsters are taking advantage of new EU privacy laws to demand personal information from Airbnb users.
MORE NEWS & COMMENTARY
HOT TOPICS
10 Security Innovators to Watch
Startups in the RSA Conference Innovation Sandbox competed for the title of "Most Innovative."

LoJack Attack Finds False C2 Servers
A new attack uses compromised LoJack endpoint software to take root on enterprise networks.

Slack Releases Open Source SDL Tool
After building an SDL tool for their own use, Slack has released it on Github under an open source license.

MORE
EDITORS' CHOICE

6 Enterprise Password Managers That Lighten the Load for Security
EPMs offer the familiar password wallet model with more substantial administrative management and multiple deployment models.
What Meltdown and Spectre Mean for Mobile Device Security
Here are four tips to keep your mobile users safe from similar attacks.
Tech Resources

Partner Perspectives

4 Critical Applications and How to Protect Them
Since critical apps are, well, critical, security teams must take preventive measures to keep attackers from exploiting their vulnerabilities.

3 Ways to Maximize Security and Minimize Business Challenges
The best strategy for choosing security tools and architecting networks is to focus on staffing and resources, risk tolerance, and business change.

Europe and Asia Take on More DDoS Attacks
While North American targets have historically been on the receiving end of the majority of DDoS attacks since their inception, that trend changed in 2017.

FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.