Follow Dark Reading:
 September 20, 2018
LATEST SECURITY NEWS & COMMENTARY
The Security Costs of Cloud-Native Applications
More than 60% of organizations report the bulk of new applications are built in the cloud. What does this mean for security?
NSS Labs Files Antitrust Suit Against Symantec, CrowdStrike, ESET, AMTSO
Suit underscores longtime battle between vendors and labs over control of security testing protocols.
Military, Government Users Just as Bad About Password Hygiene as Civilians
New report comes out just as group of US senators chastise Secretary of State Mike Pompeo for not using multifactor authentication.
Websites Attack Attempts Rose in Q2
New data shows hackers hit websites, on average, every 25 minutes.
Cybersecurity Is Only 1 Part of Election Security
Protecting the 2018 election cycle means fixing the information infrastructure.
Symantec Offers Free Website Security Service for Midterm Elections
Security vendor offers US election jurisdictions its Project Dolphin phishing/website spoofing-detection service and security resources.
WebAuthn, FIDO2 Infuse Browsers, Platforms with Strong Authentication
New standards offer protection against hacking, credential theft, phishing attacks, and hope for the end of an era of passwords as a security construct.
MORE NEWS & COMMENTARY
HOT TOPICS
The 7 Habits of Highly Effective Security Teams
Security requires smart people, processes, and technology. Too often, the "people" portion of the PPT equation is neglected.

New Xbash Malware a Cocktail of Malicious Functions
The new malware tool targeting Windows and Linux systems combines cryptomining, ransomware, botnet, and self-propagation capabilities.

RDP Ports Prove Hot Commodities on the Dark Web
Remote desktop protocol access continues to thrive in underground markets, primarily to hackers who lack expertise to find exposed ports themselves.

MORE
EDITORS' CHOICE

8 Keys to a Successful Penetration Test
Pen tests are expensive, but there are key factors that can make them worth the investment.
The Increasingly Vulnerable Software Supply Chain
Nation-state adversaries from Iran to Russia have leveraged the supply chain as a vehicle to compromise infrastructure and disrupt businesses.

Name that Toon: Risky Business

We provide the cartoon. You provide the caption. Winner earns a $25 Amazon gift card.


Tech Resources
ACCESS TECH LIBRARY NOW

  • Make Your Organization's Email Safer

    With nearly all security incidents and breaches originating from both email and the web -- and the necessity of these tools for your organizations day to day operations -- how can you protect your organization from the cyberattackers and their ...

  • AI & Machine Learning - How to Improve Enterprise Security With Them

    Hear a top expert review useful definitions of AI & ML terms, and discuss some practical applications of the technology that might speed your incident reaction time and improve your use of IT security staff resources.

MORE WEBINARS
FEATURED REPORTS
  • The State of IT and Cybersecurity

    IT and security are often viewed as different disciplines - and different departments. Find out what our survey data revealed, read the report today!

  • 2017 State of IT Report

    In today's technology-driven world, "innovation" has become a basic expectation. IT leaders are tasked with making technical magic, improving customer experience, and boosting the bottom line -- yet often without any increase to the IT budget. How are organizations striking ...

MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Weekly
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Weekly Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.