Follow Dark Reading:
 March 06, 2019
LATEST SECURITY NEWS & COMMENTARY
Trust, or Lack of It, Is a Key Theme on RSAC Keynote Stage
Neither machines nor humans might be entirely trustworthy, but the cooperation of the two might be the answer to issues of misinformation, deep fake videos, and other issues of trust, say security leaders.
Lazarus Research Highlights Threat from North Korea
A widespread attack against companies and government agencies have been linked to the North Korean Lazarus group, underscoring that the countries hackers are becoming more brazen.
Consumers Care About Privacy, but Not Enough to Act on It
People claim to value data privacy and don't trust businesses to protect them - but most fail to protect themselves.
Word Bug Allows Attackers to Sneak Exploits Past Anti-Malware Defenses
Problem lies in the manner in which Word handles integer overflow errors in OLE file format, Mimecast says.
Cybercriminals Target Young Gamers
Deceptive and inappropriate tactics are prevalent in free gaming apps, according to a new report to be released at the RSA Conference.
Organizations Taking Less Time to Detect Breaches
But by the time they became aware, attackers have been on their networks for more than six months, new 2018 data shows.
Incident Response: Having a Plan Isn't Enough
Data shows organizations neglect to review and update breach response plans as employees and processes change, putting data at risk.
Care and Feeding of Your SIEM
Six simple steps to mitigate the grunt work and keep your organization safe.
MORE NEWS & COMMENTARY
HOT TOPICS
Security Experts, Not Users, Are the Weakest Link
CISOs: Stop abdicating responsibility for problems with users - it's part of your job.

Microsoft Debuts Azure Sentinel SIEM, Threat Experts Service
New services, which are both available in preview, arrive at a time when two major trends are converging on security.

More Than 22,000 Vulns Were Disclosed in 2018, 27% Without Fixes
As in previous years, input validation vulnerabilities accounted for a substantial proportion of total, Risk Based Security report shows.

MORE
EDITORS' CHOICE

6 Questions to Ask While Buying a Connected Car
Here are six questions to keep in mind when you walk into the showroom to buy a networked car.
Axonius' 'Unsexy' Tool Wins RSAC Innovation Sandbox
Judges award top honor to new company solving an old, unsolved problem: asset discovery and management.
Artificial Intelligence: The Terminator of Malware
Is it possible that the combination of AI, facial recognition, and the coalescence of global mass-hack data could lead us toward a Skynet-like future?
Tech Resources
ACCESS TECH LIBRARY NOW

  • Closing the Threat Intelligence Effectiveness Gap

    This webinar will cover the State of threat detection, eight best practices in threat intelligence, threat detection strategies and threat hunting and more. Learn more.

  • Understanding and Preventing Social Engineering Attacks

    How can enterprises prevent "social engineering" attacks? Can users be trained to recognize such exploits and avoid them? Join Dark Reading as we invite top experts to discuss the most effective methods of defending against social engineering attacks.

MORE WEBINARS

Partner Perspectives

Get Smart About Network Segmentation & Traffic Routing
Through a combination of intelligent segmentation and traffic routing to tools, you can gain much better visibility into your network. Here's how.

Boosting Security Effectiveness with 'Adjuvants'
How integrating corporate resources like the IT help desk, system administration, quality assurance and HR can breathe new life into your security program.

FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.