Follow Dark Reading:
 April 14, 2017
LATEST SECURITY NEWS & COMMENTARY
New Breed of DDoS Attack On the Rise
Akamai Networks since October has detected and mitigated at least 50 DDoS attacks using Connectionless LDAP.
95% of Organizations Have Employees Seeking to Bypass Security Controls
Use of TOR, private VPNs on the rise in enterprises, Dtex report shows.
Got an Industrial Network? Reduce your Risk of a Cyberattack with Defense in Depth
If an aggressive, all-out cyberdefense strategy isn't already on your operational technology plan for 2017, it's time to get busy.
Hackers May Have DDoS'ed Brexit Vote Site: Report
British MPs suggest cyberattackers may have used DDoS attacks to bring site down before EU referendum.
Fifth Person Pleads Guilty in $5 Million ID Theft Case
A total of five Eastern Europeans were arrested for conspiracy involving cyberattacks and fraudulent purchases.
MORE NEWS & COMMENTARY
HOT TOPICS
Forget the Tax Man: Time for a DNS Security Audit
Here's a 5-step DNS security review process that's not too scary and will help ensure your site availability and improve user experience.

OWASP Top 10 Update: Long Overdue Or Same-Old, Same-Old?
The industry benchmark list is about to change for the first time in four years, but barring a few important changes, it looks a lot like it always has.

Apple Mac OS Malware Spiked in Q4
Malware samples sharply increased for Mac OS devices in Q4 2016 as threat actors expand their targets outside Windows PCs, new McAfee report says.

MORE
EDITORS' CHOICE

So You Want to Be a Security Rock Star?
While the thrill of crafting attention-grabbing stunt hacks may seem like the coolest job on earth, what our industry needs more of are strong defenders who can fix things as well as break them.
SECURITY LIVE AT INTEROP ITX

Surviving The Security Skills Shortage

Get tips from short-handed CISOs on how to attract, cultivate and retain talented cybersecurity staff when there are so few to go around - at Interop ITX, Wednesday, May 17, at the MGM Grand in Las Vegas.


Tech Resources
ACCESS TECH LIBRARY NOW

  • Becoming a Threat Hunter in Your Enterprise

    You're tired of waiting. Tired of waiting for your technology to alert you that there's already a problem. You want to be more proactive, sink your hands into those threat intelligence feeds, dig into those behavioral analytics reports, follow one ...

  • NGES: Tips & Key Considerations for Evaluating Solutions

    Next generation endpoint security (NGES) is one of the hottest topics in today's cybersecurity market, and for good reason. Traditional preventative measures alone offer insufficient endpoint protection - causing an influx of vendors offering NGES. While the market is relatively ...

MORE WEBINARS

Partner Perspectives

Securing your Privacy on Android
If you work at a company that allows you to use your mobile device to login to email, access company data, or connect to company Wi-Fi, you're more of a security risk than you think.

Top 5 Dumbest Cyber Threats That Still Pay Off
Some hackers are fairly predictable in their successful use of really dumb attacks.

Exploit Kits: Winter 2017 Review
We take another look at the current EK scene by going over RIG, Sundown, Neutrino and Magnitude.

FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.