Follow Dark Reading:
 January 02, 2019
LATEST SECURITY NEWS & COMMENTARY
The Coolest Hacks of 2018
In-flight airplanes, social engineers, and robotic vacuums were among the targets of resourceful white-hat hackers this year.
2018: The Year Machine Intelligence Arrived in Cybersecurity
Machine intelligence, in its many forms, began having a significant impact on cybersecurity this year - setting the stage for growing intelligence in security automation for 2019.
Spending Spree: What's on Security Investors' Minds for 2019
Cybersecurity threats, technology, and investment trends that are poised to dictate venture capital funding in 2019.
IoT Bug Grants Access to Home Video Surveillance
Due to a shared Amazon S3 credential, all users of a certain model of the Guardzilla All-In-One Video Security System can view each other's videos.
US Petroleum Employee Charged with Stealing Trade Secrets for Chinese Firm
Longtime US resident allegedly stole information for petroleum firm in China that had offered him a position.
3 Steps for Cybersecurity Leaders to Bridge the Gender Equality Gap
By encouraging female participation through education and retaining this interest through an inclusive culture and visible role models, we can begin to close the skill and gender gap in cybersecurity.
MORE NEWS & COMMENTARY
HOT TOPICS
Start Preparing Now for the Post-Quantum Future
Quantum computing will break most of the encryption schemes on which we rely today. These five tips will help you get ready.

6 Ways to Anger Attackers on Your Network
Because you can't hack back without breaking the law, these tactics will frustrate, deceive, and annoy intruders instead.

Toxic Data: How 'Deepfakes' Threaten Cybersecurity
The joining of 'deep learning' and 'fake news' makes it possible to create audio and video of real people saying words they never spoke or things they never did.

MORE
EDITORS' CHOICE

7 Business Metrics Security Pros Need to Know
These days, security has to speak the language of business. These KPIs will get you started.
Cybersecurity in 2019: From IoT & Struts to Gray Hats & Honeypots
While you prepare your defenses against the next big thing, also pay attention to the longstanding threats that the industry still hasn't put to rest.
Tech Resources
ACCESS TECH LIBRARY NOW

  • How You Can Use Machine Learning to Improve Data Defense

    In this webinar, experts will discuss the ways that machine learning can help in security operations, how it can speed threat analysis, and how to evaluate and choose technologies that will work in your organization.

  • The Key to Cloud Security

    When it comes to cloud security, consistency is everything - your cloud controls should mimic your on-premise implementations, so you have complete consistency of security policy enforcement across environments.

MORE WEBINARS

Partner Perspectives

Get Smart About Network Segmentation & Traffic Routing
Through a combination of intelligent segmentation and traffic routing to tools, you can gain much better visibility into your network. Here's how.

Boosting Security Effectiveness with 'Adjuvants'
How integrating corporate resources like the IT help desk, system administration, quality assurance and HR can breathe new life into your security program.

FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.