Follow Dark Reading:
 September 16, 2019
LATEST SECURITY NEWS & COMMENTARY
6 Questions to Ask Once You've Learned of a Breach
With GDPR enacted and the California Consumer Privacy Act on the near horizon, companies have to sharpen up their responses. Start by asking these six questions.
Malware Linked to Ryuk Targets Financial & Military Data
A newly discovered campaign, packing traces of Ryuk ransomware, aims to steal confidential information.
No Quick Fix for Security-Worker Shortfall
Security professionals see acquiring skills as the way forward, but only half of companies are training their workers, with more continuing to search for highly skilled employees.
Taking a Fresh Look at Security Ops: 10 Tips
Maybe you love your executive team, your security processes, tools, or strategy. Maybe you hate them. Whatever the situation, it's likely at some point that things will have changed.
US Sanctions 3 Cyber Attack Groups Tied to DPRK
Lazarus Group, Bluenoroff, and Andariel were named and sanctioned by the US Treasury for ongoing attacks on financial systems.

Name That Toon: Sock Puppets

Start your week with a smile! Enter the Dark Reading cartoon caption contest. We provide the cartoon. You write the caption! Enter to win an Amazon gift card.


MORE NEWS & COMMENTARY
HOT TOPICS
APIs Get Their Own Top 10 Security List
OWASP's new list of API weaknesses focuses on issues that have caused recent data breaches and pose common security hazards in modern cloud-based applications.

More Than 99% of Cyberattacks Need Victims' Help
Research highlights how most criminals exploit human curiosity and trust to click, download, install, open, and send money or information.

Security Pros' Painless Guide to Machine Intelligence, AI, ML & DL
Artificial intelligence, machine learning, or deep learning? Knowing what the major terms really mean will help you sort through the morass of words on the subject and the security uses of each.

MORE
EDITORS' CHOICE

Security Leaders Share Tips for Boardroom Chats
Cisco, Oracle, and LinkedIn security leaders share their challenges in communicating with business teams and advice for how CISOs can navigate the relationship.
A Definitive Guide to Crowdsourced Vulnerability Management
Knowing about a bug and actually securing it are very different things. These six steps will get you from "oh, sh*t" to fixed.
NEW FROM THE EDGE

ASK THE EXPERT

Most cloud data breaches leave only trace signs of malfeasance, so it can be tricky, says Josh Stella, co-founder and CTO of Fugue. Find out more on The Edge.


Tech Resources
ACCESS TECH LIBRARY NOW

  • Building a Better IT Security Architecture for Your Enterprise

    In this Dark Reading webinar, attendees will learn to build an overarching security architecture that is built on a stronger foundation and better anticipates the potential threats to your organization.

  • Future-Proofing Your Next-Generation Firewall

    Attend this Dark Reading webinar and hear as Ovum Senior Analyst Eric Parizo and a special guest from Cisco Security discuss the fundamental capabilities of an emerging "new" generation of NGFW platforms, and how enterprises can benefit from the NGFW ...

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.