Follow Dark Reading:
 March 07, 2019
LATEST SECURITY NEWS & COMMENTARY
Trust, or Lack of It, Is a Key Theme on RSAC Keynote Stage
Neither machines nor humans might be entirely trustworthy, but the cooperation of the two might be the answer to issues of misinformation, deep fake videos, and other issues of trust, say security leaders.
Meet the New 'Public-Interest Cybersecurity Technologist'
A grassroots movement is emerging to train high-risk groups and underrepresented communities in cybersecurity protection and skills - all for the public good.
Consumers Care About Privacy, but Not Enough to Act on It
People claim to value data privacy and don't trust businesses to protect them - but most fail to protect themselves.
Lazarus Research Highlights Threat from North Korea
A widespread attack against companies and government agencies have been linked to the North Korean Lazarus group, underscoring that the countries hackers are becoming more brazen.
Chronicle Releases Chapter One: Backstory
Google spin-off Alphabet rolls out a new cloud-based security data platform that ultimately could displace some security tools in organizations.
It's Time to Rethink Your Vendor Questionnaire
To get the most from a vendor management program you must trust, then verify. These six best practices are a good place to begin.
MORE NEWS & COMMENTARY
HOT TOPICS
Security Experts, Not Users, Are the Weakest Link
CISOs: Stop abdicating responsibility for problems with users - it's part of your job.

Microsoft Debuts Azure Sentinel SIEM, Threat Experts Service
New services, which are both available in preview, arrive at a time when two major trends are converging on security.

Security Pros Agree: Cloud Adoption Outpaces Security
Oftentimes, responsibility for securing the cloud falls to IT instead of the security organization, researchers report.

MORE
EDITORS' CHOICE

6 Questions to Ask While Buying a Connected Car
Here are six questions to keep in mind when you walk into the showroom to buy a networked car.
Axonius' 'Unsexy' Tool Wins RSAC Innovation Sandbox
Judges award top honor to new company solving an old, unsolved problem: asset discovery and management.
More Than 22,000 Vulns Were Disclosed in 2018, 27% Without Fixes
As in previous years, input validation vulnerabilities accounted for a substantial proportion of total, Risk Based Security report shows.
Tech Resources
ACCESS TECH LIBRARY NOW

MORE WEBINARS
FEATURED REPORTS
  • The State of Cyber Security Incident Response

    Organizations are responding to new threats with new processes for detecting and mitigating them. Here's a look at how the discipline of incident response is evolving.

  • Managing the Risk of Post-breach or Resident Attacks

    How well-equipped is your organization to stop insider attacks or external attackers once they're inside your network? According to this study, almost two-thirds of respondents lack efficient capabilities to detect and investigate "stealth" attackers before serious damage occurs.

MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Weekly
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Weekly Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.