Follow Dark Reading:
 January 18, 2018
LATEST SECURITY NEWS & COMMENTARY
Which CISO 'Tribe' Do You Belong To?
New research categorizes CISOs into four distinct groups based on factors related to workforce, governance, and security controls.
Google Rolls Out Security Center for G Suite Enterprise
New dashboards give admins a look at data such as suspicious device activity and spam email delivery across the business.
Threats from Russia, North Korea Loom as Geopolitics Spills into Cyber Realm
Threat actors from both nations ramped up their activities sharply in 2017, Flashpoint says in a new threat intelligence report.
Living with Risk: Where Organizations Fall Short
People tasked with protecting data are too often confused about what they need to do, even with a solid awareness of the threats they face.
One Identity Acquires Balabit
Union expands One Identity's privileged access management and analytics offerings.
WatchGuard Buys DNS-Filtering Company Percipient Networks
Percipient's 'Strongarm' to become part of WatchGuard's SMB security services.
MORE NEWS & COMMENTARY
HOT TOPICS
Doh!!! The 10 Most Overlooked Security Tasks
Here's a list of gotchas that often slip past overburdened security pros.

Four Malicious Google Chrome Extensions Affect 500K Users
ICEBRG Security Research team's finding highlights an often-overlooked threat.

Kaspersky Lab Warns of Extremely Sophisticated Android Spyware Tool
Skygofree appears to have been developed for lawful intercept, offensive surveillance purposes.

MORE
EDITORS' CHOICE

Where to Find Security Holes in Serverless Architecture
Serverless architectures take away business responsibility for server management, but security should still be top of mind.
How AI Would Have Caught the Forever 21 Breach
Companies must realize that the days of the desktop/server model are over and focus on "nontraditional" devices.
Tech Resources
ACCESS TECH LIBRARY NOW

MORE WEBINARS

Partner Perspectives

Top 3 Pitfalls of Securing the Decentralized Enterprise
Doubling down on outdated security practices while the number of users leveraging your enterprise network grows is a race to the bottom for businesses moving to distributed workflows.

Why Facebook Security Questions Are no Substitute for MFA
If identity is established based on one thing you know and one thing you have, the latter should not also be a thing you know because in the sharing economy, we share everything.

Be a More Effective CISO by Aligning Security to the Business
These five steps will you help marshal the internal resources you need to reduce risk, break down barriers, and thwart cyber attacks.

FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.