Follow Dark Reading:
 July 07, 2018
LATEST SECURITY NEWS & COMMENTARY
Trading Platforms Riddled With Severe Flaws
In spite of routing trillions of dollars of stock and commodity trades every day, financial cousins to online banking applications are written very insecurely.
Reactive or Proactive? Making the Case for New Kill Chains
Classic kill chain models that aim to find and stop external attacks don't account for threats from insiders. Here what a modern kill chain should include.
New Malware Strain Targets Cryptocurrency Fans Who Use Macs
OSX.Dummy depends on substantial help from an unwary victim.
Former NSO Group Employee Steals, Sells Spy Tools
The Israeli hacking firm says its stolen software is worth hundreds of millions of dollars.
Putin Pushes for Global Cybersecurity Cooperation
At a Moscow-based security conference, Russian President Vladimir Putin said countries should work together amid the rise of cyberthreats.
MORE NEWS & COMMENTARY
HOT TOPICS
4 Basic Principles to Help Keep Hackers Out
The most effective hackers keep things simple, something organizations must take into account.

The 6 Worst Insider Attacks of 2018 - So Far
Stalkers, fraudsters, saboteurs, and all nature of malicious insiders have put the hurt on some very high-profile employers.

Bigger, Faster, Stronger: 2 Reports Detail the Evolving State of DDoS
DDoS attacks continue to plague the Internet, getting bigger and more dangerous. And now, the kids are involved.

MORE
EDITORS' CHOICE

9 SMB Security Trends
SMBs understand they have to focus more on cybersecurity. Here's a look at the areas they say matter most.
Ransomware vs. Cryptojacking
Cybercriminals are increasingly turning to cryptojacking over ransomware for a bigger payday. Here's what enterprises need to know in order to protect their digital assets and bank accounts.
Tech Resources

Partner Perspectives

Get Smart About Network Segmentation & Traffic Routing
Through a combination of intelligent segmentation and traffic routing to tools, you can gain much better visibility into your network. Here's how.

Boosting Security Effectiveness with 'Adjuvants'
How integrating corporate resources like the IT help desk, system administration, quality assurance and HR can breathe new life into your security program.

FEATURED REPORTS
  • The State of IT and Cybersecurity

    IT and security are often viewed as different disciplines - and different departments. Find out what our survey data revealed, read the report today!

  • 2018 State of the Cloud Report

    Cloud adoption is growing, but how are organizations taking advantage of it? Interop ITX and InformationWeek surveyed technology decision-makers to find out, read this report to discover what they had to say!

MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.