Follow Dark Reading:
 October 12, 2018
LATEST SECURITY NEWS & COMMENTARY
Window Snyder Shares Her Plans for Intel Security
The security leader, known for her role in securing Microsoft, Apple, and Mozilla, discusses her new gig and what she's working on now.
Chinese Intelligence Officer Under Arrest for Trade Secret Theft
Yanjun Xu attempted to steal data on advanced aviation technology that GE Aviation, among others, had spent billions developing.
Most Malware Arrives Via Email
Watch out for messages with the word "invoice" in the subject line, too.
Google Adds New Identity, Security Tools to Cloud Platform
A wave of cloud news includes new tools for identity and access management and policies for stronger controls on cloud resources.
Pair of Reports Paint Picture of Enterprise Security Struggling to Keep Up
Many organizations have yet to create an effective cybersecurity strategy - and it's costing them millions.
One-Third of US Adults Hit with Identity Theft
That's double the global average and more than three times the rate of French and German adults.
Not All Multifactor Authentication Is Created Equal
Users should be aware of the strengths and weaknesses of the various MFA methods.
MORE NEWS & COMMENTARY
HOT TOPICS
The Better Way: Threat Analysis & IIoT Security
Threat analysis offers a more nuanced and multidimensional approach than go/no-go patching in the Industrial Internet of Things. But first, vendors must agree on how they report and address vulnerabilities.

7 Most Prevalent Phishing Subject Lines
The most popular subject lines crafted to trick targets into opening malicious messages, gleaned from thousands of phishing emails.

MORE
EDITORS' CHOICE

Meet 5 Women Shaping Microsoft's Security Strategy
Profiles of some of the women currently leading Microsoft security operations - and their efforts to drive inclusivity.
Lesser Skilled Cybercriminals Adopt Nation-State Hacking Methods
The trend underscores the need for organizations of all sizes to be prepared to detect and respond to threats faster, CrowdStrike says.
Tech Resources
ACCESS TECH LIBRARY NOW

MORE WEBINARS

Partner Perspectives

Get Smart About Network Segmentation & Traffic Routing
Through a combination of intelligent segmentation and traffic routing to tools, you can gain much better visibility into your network. Here's how.

Boosting Security Effectiveness with 'Adjuvants'
How integrating corporate resources like the IT help desk, system administration, quality assurance and HR can breathe new life into your security program.

FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.