Follow Dark Reading:
 October 02, 2017
LATEST SECURITY NEWS & COMMENTARY
Weakness In Windows Defender Lets Malware Slip Through Via SMB Shares
CyberArk says the manner in which Defender scans for malicious executables in SMB shares gives attackers an opening.
Analyzing Cybersecurity's Fractured Educational Ecosystem
We have surprisingly little data on how to evaluate infosec job candidates academic qualifications. That needs to change.
CISOs Offer Soup-to-Nuts C-Suite Strategy
Chief information security officers from Dell, RCB Bank and other organizations share what it takes to become a security exec, sit in the C-Suite, and keep the job.
Apple Mac Models Vulnerable to Targeted Attacks
Several updated Mac models don't receive EFI security fixes, putting machines at risk for targeted cyberattacks.
MORE NEWS & COMMENTARY
HOT TOPICS
7 SIEM Situations That Can Sack Security Teams
SIEMS are considered an important tool for incident response, yet a large swath of users find seven major problems when working with SIEMs.

New Locky Ransomware Phishing Attacks Beat Machine Learning Tools
Late September attacks highlight the persistent nature of ransomware threats, Comodo says.

Equihax: Identifying & Wrangling Vulnerabilities
Now that we know what was taken from Equifax, how it was taken, and what is being sold, what more do we need to learn before the next time?

MORE
EDITORS' CHOICE

Best and Worst Security Functions to Outsource
Which security functions are best handled by third parties, and which should be kept in-house? Experts weigh in.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Security Implications of Using VoIP & SIP

    This webinar will examine the security implications of using VoIP and SIP, how to best protect real-time communications traffic with tools you already have as well as with new tools, and how to orchestrate protections to prevent UC security from ...

  • How to Talk to Your Management about IT Security

    This webinar will bring you some new methods for describing and measuring your cybersecurity initiatives so that they can be understood by even the most business-oriented executives.

MORE WEBINARS

Partner Perspectives

TrickBot Rapidly Expands its Targets in August
TrickBot shifted its focus to U.S banks and credit card companies, soaring past the 1,000 target URL mark in a single configuration.

Where Do Security Vulnerabilities Come From?
There are three major causes: code quality, complexity, and trusted data inputs.

Artificial Intelligence: Getting the Results You Want
Finding a vendor that doesn't claim to do AI is hard these days. But getting the benefits you need and expect is even harder.

FEATURED REPORTS
  • Surviving the IT Security Skills Shortage

    Cybersecurity professionals are in high demand -- and short supply. Find out what Dark Reading discovered during their 2017 Security Staffing Survey and get some strategies for getting through the drought. Download the report today!

  • [Interop ITX 2017] State Of DevOps Report

    The DevOps movement brings application development and infrastructure operations together to increase efficiency and deploy applications more quickly. But embracing DevOps means making significant cultural, organizational, and technological changes. This research report will examine how and why IT organizations are ...

MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.