Follow Dark Reading:
 October 28, 2017
LATEST SECURITY NEWS & COMMENTARY
Web Attacks Spike in Financial Industry
Web application compromise beats human error as the top data breach cause, putting finance companies at risk for larger attacks, according to a new study.
Passwords Use Alone Still Trumps Multi-Factor Authentication
Strong authentication use overall remains weak but is starting to gain some ground with enterprises.
3 Steps to Reduce Risk in Your Supply Chain
Many companies have very limited visibility into their vendors' security posture -- and some may have thousands of vendors. Here are steps that every company should take to lock down their supply chains.
Identity Theft Ring Hit with Credit Card Fraud Indictment
A federal grand jury indicts six individuals on criminal charges relating to credit card and debit card fraud.
MORE NEWS & COMMENTARY
HOT TOPICS
10 Social Engineering Attacks Your End Users Need to Know About
It's Cybersecurity Awareness Month. Make sure your users are briefed on these 10 attacker techniques that are often overlooked.

10 Steps for Stretching Your IT Security Budget
When the budget gods decline your request for an increase, here are 10 ways to stretch that dollar.

'Bad Rabbit' Ransomware Attacks Rock Russia, Ukraine - and Beyond
Attack employs new version of infamous NotPetya ransomware used in June attacks on Ukraine targets.

MORE
EDITORS' CHOICE

Windows 10 Update: 10 Key New Security Features
Microsoft is tightening its focus on Windows 10 security with several new security tools in its latest major OS update.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Ransomware: A Hunting We Will Go

    Ransomware is one of the favorite flavors of malware and is particularly vicious and showing no signs of slowing down. Join this webinar as Senior Security Researcher Kyle Wilhoit helps us to understand ransomware trends, ransomware use cases, the financial ...

  • Security Implications of VoIP & SIP

    This webinar will examine the security implications of using VoIP and SIP, how to best protect real-time communications traffic with tools you already have as well as with new tools, and how to orchestrate protections to prevent UC security from ...

MORE WEBINARS

Partner Perspectives

5 Reasons Why the CISO is a Cryptocurrency Skeptic
If you think all you need is technology to defend against bad guys, you shouldn't be a CISO. But technology is all cryptocurrency is, starting with Bitcoin.

CISOs: Striving Toward Proactive Security Strategies
A new survey paints a compelling picture of the modern security executive, how they succeed, and how much power they wield.

6 Steps to Finding Honey in the OWASP
The most famous project of the Open Web Application Security Project is getting an update. Here's what you need to know, and how you can get involved.

FEATURED REPORTS
  • [Security] Budgets, Plans & Priorities

    Enterprises are spending an unprecedented amount of money on IT security -- where does it all go? In this survey, Dark Reading polled senior IT management on security budgets and spending plans, and their priorities for the coming year. Download ...

  • Surviving the IT Security Skills Shortage

    Cybersecurity professionals are in high demand -- and short supply. Find out what Dark Reading discovered during their 2017 Security Staffing Survey and get some strategies for getting through the drought. Download the report today!

MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.