Follow Dark Reading:
 December 27, 2018
LATEST SECURITY NEWS & COMMENTARY
Spending Spree: What's on Security Investors' Minds for 2019
Cybersecurity threats, technology, and investment trends that are poised to dictate venture capital funding in 2019.
3 Steps for Cybersecurity Leaders to Bridge the Gender Equality Gap
By encouraging female participation through education and retaining this interest through an inclusive culture and visible role models, we can begin to close the skill and gender gap in cybersecurity.
7 Business Metrics Security Pros Need to Know
These days, security has to speak the language of business. These KPIs will get you started.
Attackers Use Google Cloud to Target US, UK Banks
Employees at financial services firms hit with an email attack campaign abusing a Google Cloud storage service.
MORE NEWS & COMMENTARY
HOT TOPICS
6 Ways to Anger Attackers on Your Network
Because you can't hack back without breaking the law, these tactics will frustrate, deceive, and annoy intruders instead.

How to Optimize Security Spending While Reducing Risk
Risk scoring is a way of getting everyone on the same page with a consistent, reliable method of gathering and analyzing security data.

3 Reasons to Train Security Pros to Code
United Health chief security strategist explains the benefits the organization reaped when it made basic coding training a requirement for security staff.

MORE
EDITORS' CHOICE

8 Security Tips to Gift Your Loved Ones For the Holidays
Before the wrapping paper starts flying, here's some welcome cybersecurity advice to share with friends and family.
2018 In the Rearview Mirror
Among this year's biggest news stories: epic hardware vulnerabilities, a more lethal form of DDoS attack, Olympic 'false flags,' hijacked home routers, fileless malware - and a new world's record for data breaches.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Stopping Email-Borne Threats from Spreading like the Flu

    Your organization likely has extensive security protections for your inbound email from the Internet. However, as much as two-thirds of many organizations' total email traffic is generated internally by users. And, of course, attackers know this.

  • Consistency is Key with Cloud Security

    When it comes to cloud security, consistency is everything - your cloud controls should mimic your on-premise implementations, so you have complete consistency of security policy enforcement across environments.

MORE WEBINARS

Partner Perspectives

Get Smart About Network Segmentation & Traffic Routing
Through a combination of intelligent segmentation and traffic routing to tools, you can gain much better visibility into your network. Here's how.

Boosting Security Effectiveness with 'Adjuvants'
How integrating corporate resources like the IT help desk, system administration, quality assurance and HR can breathe new life into your security program.

FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.