Follow Dark Reading:
 April 18, 2018
LATEST SECURITY NEWS & COMMENTARY
Trump Administration Cyber Czar Rob Joyce to Return to the NSA
First year of Trump White House's cybersecurity policy mostly followed in the footsteps of the Obama administration.
2018 RSA Conference: Execs Push Cooperation, Culture & Civilian Safety
Executives from Microsoft, McAfee, and RSA discuss X and a new collaboration on Y.
Majority of Men Think Women Have Equal Opportunity to Advance in Cybersecurity Career
Not so fast, say women.
NIST Seeking Comments on New AppSec Practices Standards
Working in conjunction with SAFECode, NIST is opening the floor to suggestions at RSA about secure software development life cycle guidelines.
New Malware Adds RAT to a Persistent Loader
A newly discovered variant of a long-known malware loader adds the ability to control the victim from afar.
Why We Need Privacy Solutions That Scale Across Borders
New privacy solutions are becoming scalable, smarter, and easier to address compliance across industries and geographies.
MORE NEWS & COMMENTARY
HOT TOPICS
7 Non-Financial Data Types to Secure
Credit card and social security numbers aren't the only sensitive information that requires protection.

Stats on the Cybersecurity Skills Shortage: How Bad Is It, Really?
Is it just a problem of too few security professionals, or are there other reasons enterprises struggle to build infosec teams?

New Email Campaign Employs Malicious URLs
A new attack dropping the Quant Loader Trojan bypasses scanners and sandboxes.

MORE
EDITORS' CHOICE

8 Ways Hackers Monetize Stolen Data
Hackers are craftier than ever, pilfering PII piecemeal so bad actors can combine data to set up schemes to defraud medical practices, steal military secrets and hijack R&D product information.
Microsegmentation: Strong Security in Small Packages
A deep dive into how organizations can effectively devise and implement microsegmentation in a software-defined networking data center.
Tech Resources
ACCESS TECH LIBRARY NOW

MORE WEBINARS

Partner Perspectives

How Attackers Can Exploit rTorrent with Monero Cryptocurrency Miner
As cryptomining campaigns become more profitable, cybercriminals are becoming more creative about finding new ways to extend their operations.

Avoiding the Ransomware Mistakes that Crippled Atlanta
What made Atlanta an easy target was its outdated use of technology: old computers running on non-supported platforms, which are also a characteristic of many municipalities and most major cities.

Cryptomining: Fast-Becoming the Web's Most Profitable Attack Method
The ROI of 'cryptojacking' has never been higher, making bitcoin and other cryptocurrencies a more attractive target for cybercriminals. Here's why.

FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.