Follow Dark Reading:
 November 18, 2017
LATEST SECURITY NEWS & COMMENTARY
We're Still Not Ready for GDPR? What is Wrong With Us?
The canary in the coalmine died 12 years ago, the law went into effect 19 months ago, but many organizations still won't be ready for the new privacy regulations when enforcement begins in May.
Mobile Malware Incidents Hit 100% of Businesses
Attempted malware infections against BYOD and corporate mobile devices are expected to continue to grow, new data shows.
Tips to Protect the DNS from Data Exfiltration
If hackers break in via the Domain Name System, most business wouldn't know until it's too late. These tips can help you prepare.
IBM, Nonprofits Team Up in New Free DNS Service
Quad9 blocks malicious sites used in phishing, other nefarious activity.
Businesses Can't Tell Good Bots from Bad Bots: Report
Bots make up more than 75% of total traffic for some businesses, but one in three can't distinguish legitimate bots from malicious ones.
MORE NEWS & COMMENTARY
HOT TOPICS
Emerging IT Security Technologies: 13 Categories, 26 Vendors
A rundown of some of the hottest security product areas, and vendors helping to shape them.

Death of the Tier 1 SOC Analyst
Say goodbye to the entry-level security operations center (SOC) analyst as we know it.

New Locky Ransomware Takes Another Turn
A newly discovered strain of Locky ransomware has been discovered masquerading as legitimate Microsoft Word documents.

MORE
EDITORS' CHOICE

Insider Threats: Red Flags and Best Practices
Security pros list red flags indicating an insider attack and best practices to protect against accidental and malicious exposure.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Cloud Security: Don't Go Blind While Playing in the Cloud

    Attend this webinar to understand the security transformation from an on-prem fortress mentality to federated cloud services functioning outside your traditional zone of control.

  • Open Source Security for Containers in a DevOps World

    Managing container infrastructure in a production environment is challenged by problems of scale. One of the biggest problems is trust--specifically trust of the application. To put it another way, can you trust that all containers in your Kubernetes or OpenShift ...

MORE WEBINARS

Partner Perspectives

'Reaper': The Professional Bot Herder's Thingbot
Is it malicious? So far it's hard to tell. For now it's a giant blinking red light in security researchers faces warning us that we'd better figure out how to secure the Internet of Things.

'Goldilocks' Legislation Aims to Clean up IoT Security
The proposed Internet of Things Cybersecurity Improvement Act of 2017 is not too hard, not too soft, and might be just right.

5 Reasons CISOs Should Keep an Open Mind about Cryptocurrency
With untold new markets for Bitcoin and other 'alt-coins,' it's going to be an exciting future -- and security leaders need to get ready for it.

FEATURED REPORTS
  • [Security] Budgets, Plans & Priorities

    Enterprises are spending an unprecedented amount of money on IT security -- where does it all go? In this survey, Dark Reading polled senior IT management on security budgets and spending plans, and their priorities for the coming year. Download ...

  • Surviving the IT Security Skills Shortage

    Cybersecurity professionals are in high demand -- and short supply. Find out what Dark Reading discovered during their 2017 Security Staffing Survey and get some strategies for getting through the drought. Download the report today!

MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.