Follow Dark Reading:
 May 10, 2018
LATEST SECURITY NEWS & COMMENTARY
Why DDoS Just Won't Die
Distributed denial-of-service attacks are getting bigger, badder, and 'blended.' What you can (and can't) do about that.
RSA CTO: 'Modernization Can Breed Malice'
Zulfikar Ramzan predicted the future of cybersecurity, drivers shaping it, and how enterprise IT should react in his InteropITX 2018 keynote.
Report: China's Intelligence Apparatus Linked to Previously Unconnected Threat Groups
Multiple groups operating under the China state-sponsored Winnti umbrella have been targeting organizations in the US, Japan, and elsewhere, says ProtectWise.
Breakout Time: A Critical Key Cyber Metric
Why organizations need to detect an intrusion in under a minute, understand it in under 10 minutes, and eject the adversary in under an hour.
APT Attacks on Mobile Rapidly Emerging
Mobile devices are becoming a 'primary' enterprise target for attackers.
What Meltdown and Spectre Mean for Mobile Device Security
Here are four tips to keep your mobile users safe from similar attacks.
MORE NEWS & COMMENTARY
HOT TOPICS
Defending Against an Automated Attack Chain: Are You Ready?
Recent threats like AutoSploit bring malware-as-a-service to a whole new level. Here are four ways to be prepared.

Spectre Returns with 8 New Variants
Researchers have discovered versions of the processor vulnerability.

We're Doing Security Wrong!
When you simply heap technology onto a system, you limit your hiring pool and spread your employees too thin. Focus on your people instead.

MORE
EDITORS' CHOICE

Calculating Cloud Cost: 8 Factors to Watch
If you're not careful and don't regularly assess the impact of your usage, moving to the cloud could have a negative impact on your bottom line.
10 Lessons From an IoT Demo Lab
The Demo Lab at InteropITX 2018 was all about IoT and the traffic - legitimate and malicious - it adds to an enterprise network.
Tech Resources
ACCESS TECH LIBRARY NOW

MORE WEBINARS
FEATURED REPORTS
  • 2018 State of the Cloud Report

    Cloud adoption is growing, but how are organizations taking advantage of it? Interop ITX and InformationWeek surveyed technology decision-makers to find out, read this report to discover what they had to say!

  • How Enterprises Are Attacking the IT Security Problem

    Enterprises are spending more of their IT budgets on cybersecurity technology. How do your organization's security plans and strategies compare to what others are doing? Here's an in-depth look.

MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Weekly
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Weekly Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.