Follow Dark Reading:
 October 07, 2017
LATEST SECURITY NEWS & COMMENTARY
Russian Hackers Targeted NSA Employee's Home Computer
New reports today say it was a National Security Agency employee, not a a contractor, whose home machine running Kaspersky Lab antivirus was hacked for classified files.
John Kelly's Personal Phone Compromised
Officials fear foreign entities may have accessed White House chief of staff Kelly's phone while he was secretary of Homeland Security.
Rise in Insider Threats Drives Shift to Training, Data-Level Security
As the value and volume of data grows, perimeter security is not enough to battle internal or external threats.
MORE NEWS & COMMENTARY
HOT TOPICS
Best and Worst Security Functions to Outsource
Which security functions are best handled by third parties, and which should be kept in-house? Experts weigh in.

5 IT Practices That Put Enterprises at Risk
No one solution will keep you 100% protected, but if you avoid these common missteps, you can shore up your security posture.

Ransomware Will Target Backups: 4 Ways to Protect Your Data
Backups are the best way to take control of your defense against ransomware, but they need protecting as well.

MORE
EDITORS' CHOICE

10 Steps for Writing a Secure Mobile App
Best practices to avoid the dangers of developing vulnerability-ridden apps.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Ransomware: Latest Developments & How to Defend Against Them

    Ransomware is one of the fastest growing types of malware, and new breeds that escalate quickly are just around the corner. Learn how ransomware can affect your organization and steps you can take to defend your systems and users against ...

  • 4 Key Steps in Implementing the Data Warehouse of the Future

    Today organizations need performance and flexibility at an affordable price. A Hadoop-based environment offers just that: speed, scalability, and flexibility while minimizing disruption to a company. Join this session to learn how to implement the technology gradually, target the right ...

MORE WEBINARS

Partner Perspectives

URL Obfuscation: Still a Phisher's Phriend
There are three primary techniques to trick users into thinking a website link is real: URL shorteners, URL doppelgangers, and URL redirects.

TrickBot Rapidly Expands its Targets in August
TrickBot shifted its focus to U.S banks and credit card companies, soaring past the 1,000 target URL mark in a single configuration.

Where Do Security Vulnerabilities Come From?
There are three major causes: code quality, complexity, and trusted data inputs.

FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.