Follow Dark Reading:
 October 05, 2017
LATEST SECURITY NEWS & COMMENTARY
Yahoo, Equifax Serve as Cautionary Tales in Discerning Data Breach Scope
Both companies this week revealed that their previously disclosed breaches impacted a lot more people than previously thought.
DNS a 'Victim of its Own Success'
Why securing the Domain Name System remains an afterthought at many organizations.
Nation-State Attackers Steal, Copy Each Other's Tools
When advanced actors steal and re-use tools and infrastructure from other attack groups, it makes it harder to attribute cybercrime.
What Security Teams Need to Know about the NIAC Report
Which of the recommendations made by the NIAC working group will affect security teams the most, and how should they prepare?
Ransomware Will Target Backups: 4 Ways to Protect Your Data
Backups are the best way to take control of your defense against ransomware, but they need protecting as well.
MORE NEWS & COMMENTARY
HOT TOPICS
New Locky Ransomware Phishing Attacks Beat Machine Learning Tools
Late September attacks highlight the persistent nature of ransomware threats, Comodo says.

5 IT Practices That Put Enterprises at Risk
No one solution will keep you 100% protected, but if you avoid these common missteps, you can shore up your security posture.

7 SIEM Situations That Can Sack Security Teams
SIEMs are considered an important tool for incident response, yet a large swath of users find seven major problems when working with SIEMs.

MORE
EDITORS' CHOICE

Best and Worst Security Functions to Outsource
Which security functions are best handled by third parties, and which should be kept in-house? Experts weigh in.
Tech Resources
ACCESS TECH LIBRARY NOW

MORE WEBINARS

Partner Perspectives

TrickBot Rapidly Expands its Targets in August
TrickBot shifted its focus to U.S banks and credit card companies, soaring past the 1,000 target URL mark in a single configuration.

Where Do Security Vulnerabilities Come From?
There are three major causes: code quality, complexity, and trusted data inputs.

Artificial Intelligence: Getting the Results You Want
Finding a vendor that doesn't claim to do AI is hard these days. But getting the benefits you need and expect is even harder.

FEATURED REPORTS
  • [Security] Budgets, Plans & Priorities

    Enterprises are spending an unprecedented amount of money on IT security -- where does it all go? In this survey, Dark Reading polled senior IT management on security budgets and spending plans, and their priorities for the coming year. Download ...

  • [Interop ITX 2017] State Of DevOps Report

    The DevOps movement brings application development and infrastructure operations together to increase efficiency and deploy applications more quickly. But embracing DevOps means making significant cultural, organizational, and technological changes. This research report will examine how and why IT organizations are ...

MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.