Follow Dark Reading:
 January 05, 2018
LATEST SECURITY NEWS & COMMENTARY
Vendors Rush to Issue Security Updates for Meltdown, Spectre Flaws
Apple says all Mac and iOS systems are affected by new side-channel attack vulnerabilities.
Google Apps Script Vulnerability Exposes SaaS to URL-based Threats
A new means of exploiting Google Apps Script lets attackers deliver malware using URLs.
Uber's Biggest Mistake: It Wasn't Paying Ransom
Rather than scrambling to deal with attacks after the fact, companies need to focus on improving detection capabilities with tools that help them work within data laws, not outside of them.
The Internet of (Secure) Things Checklist
Insecure devices put your company at jeopardy. Use this checklist to stay safer.
DHS Discovers Privacy Incident Involving Former Employee
Former DHS OIG employee makes an unauthorized copy of PII data of DHS employees and parties involved in DHS OIG investigations.
MORE NEWS & COMMENTARY
HOT TOPICS
Critical Microprocessor Flaws Affect Nearly Every Machine
Researchers release details of 'Meltdown' and 'Spectre' attacks that allow programs to steal sensitive data.

Top 8 Cybersecurity Skills IT Pros Need in 2018
Cloud security architecture skills to customer-service savvy are among the key IT security skills needed next year as CIOs ramp up hiring.

17 Things We Should Have Learned in 2017, but Probably Didn't
The worm has returned and the Yahoos have all been exposed, but did 2017 teach us any genuinely new lessons we shouldn't already have known?

MORE
IN CASE YOU MISSED IT

8 Steps for Building an IT Security Career Path Program
A cybersecurity career-path program can help with talent retention and recruitment.
The Argument for Risk-Based Security
A scanner can identify a vulnerability, but only a deep understanding of cyber exposure will tell you about the seriousness of that risk. Here's how and why.
Tech Resources
ACCESS TECH LIBRARY NOW

MORE WEBINARS

Partner Perspectives

Is a Good Offense the Best Defense Against Hackers?
The proposed Active Cyber Defense Certainty (ACDC) Act has its pros and cons. But it's not the only option for protecting your company's digital assets.

Be a More Effective CISO by Aligning Security to the Business
These five steps will you help marshal the internal resources you need to reduce risk, break down barriers, and thwart cyber attacks.

Is a Good Offense the Best Defense Against Hackers?
A proposed new law could make it legal for companies to hack back against attacker. But will it work?

FEATURED REPORTS
  • [Strategic Security Report] Cloud Security's Changing Landscape

    The rapid migration to cloud services and applications has created a critical need for new strategies and technologies to keep data secure. In this survey, IT security professionals offer insight on their plans for securing data in the cloud. The ...

  • 2017 State of IT Report

    In today's technology-driven world, "innovation" has become a basic expectation. IT leaders are tasked with making technical magic, improving customer experience, and boosting the bottom line -- yet often without any increase to the IT budget. How are organizations striking ...

MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.