Follow Dark Reading:
 February 07, 2019
LATEST SECURITY NEWS & COMMENTARY
Some Airline Flight Online Check-in Links Expose Passenger Data
Several airlines send unencrypted links to passengers for flight check-in that could be intercepted by attackers to view passenger and other data, researchers found.
New Chrome Extension Takes Aim at Password Security
A Google/Harris Poll finds nearly two-thirds of users surveyed reuse passwords on multiple accounts.
Google Tackles Gmail Spam with Tensorflow
Tensorflow, Google's open-source machine learning framework, has been used to block 100 million spam messages.
4 Practical Questions to Ask Before Investing in AI
A pragmatic, risk-based approach can help CISOs plan for an efficient, effective, and economically sound implementation of AI for cybersecurity.
Consumers Care About Security - Sometimes
New RSA Security survey shows a generation gap in concerns over cybersecurity and privacy.
Attacks on Automotive Systems Feared Likely
Yet few engineers feel empowered to do anything about them, a survey shows.
HelpSystems Buys Core Security Assets to Grow Infosec Portfolio
Acquisition will enable it to provide threat detection, pen testing, and other security tools to customers.
MORE NEWS & COMMENTARY
HOT TOPICS
8 Cybersecurity Myths Debunked
The last thing any business needs is a swarm of myths and misunderstandings seeding common and frequent errors organizations of all sizes make in safeguarding data and infrastructure.

Dell, CrowdStrike, Secureworks Join Forces to Secure Endpoints
Dell SafeGuard and Response is geared toward businesses, governments, and schools that may lack resources they need to detect and remediate sophisticated threats.

Cisco Router Vulnerability Gives Window into Researchers' World
The research around a recent vulnerability shows how researchers follow leads and find unexpected results.

MORE
EDITORS' CHOICE

7 Tips For Communicating With the Board
The key? Rather than getting bogged down in the technical details, focus on how a security program is addressing business risk.
Serverless Computing: 'Function' vs. 'Infrastructure' as-a-Service
How much do companies really gain from offloading security duties to the cloud? Let's do the math.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Tools & Techniques to Disrupt Lateral Movement

    In this webinar you'll learn about the tools and techniques you can use to detect attackers' lateral movement within your computing environment and how to stop them before they launch their final payload.

  • Hadoop is Cool - Again!

    In this webinar, you will learn about 3 Hadoop trends that can impact the way you do data analytics.

MORE WEBINARS

Partner Perspectives

Get Smart About Network Segmentation & Traffic Routing
Through a combination of intelligent segmentation and traffic routing to tools, you can gain much better visibility into your network. Here's how.

Boosting Security Effectiveness with 'Adjuvants'
How integrating corporate resources like the IT help desk, system administration, quality assurance and HR can breathe new life into your security program.

FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.