Follow Dark Reading:
 March 26, 2019
LATEST SECURITY NEWS & COMMENTARY
Attackers Compromise ASUS Software Update Servers to Distribute Malware
ShadowHammer campaign latest to highlight dangers of supply chain attacks.
Pwn2Own: Tesla Hack, Broken VMs, and Skewed Economics
In the latest Pwn2Own vulnerability throwdown at the CanSecWest conference, two researchers walk away with the lion's share of rewards-just like the real marketplace.
A Glass Ceiling? Not in Privacy
According to a new study, female professionals in the US privacy profession outnumber males 53% to 47%.
IT Leaders, Employees Divided on Data Security
Execs and employees have dramatically different ideas of how much information is being lost and why - a gap that puts enterprise data in grave danger.
MORE NEWS & COMMENTARY
HOT TOPICS
Microsoft Office Dominates Most Exploited List
Lone Android vulnerability among the top 10 software flaws most abused by cybercriminals.

6 Ways Mature DevOps Teams Are Killing It in Security
New survey shows where "elite" DevOps organizations are better able to incorporate security into application security.

TLS 1.3: A Good News/Bad News Scenario
Stronger encryption standards are improving the privacy of data in motion, but enterprises will need to adapt their security architectures to maintain visibility into network traffic.

MORE
EDITORS' CHOICE

Inside Incident Response: 6 Key Tips to Keep in Mind
Experts share the prime window for detecting intruders, when to contact law enforcement, and what they wish they did differently after a breach.
Dark Reading's Kelly Jackson Higgins Honored as Top Cybersecurity Journalist
In voting conducted by the SANS Institute, Jackson Higgins is named by peers as one of the top 10 journalists in the industry.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Zero Trust in Practice

    Zero Trust is quickly becoming the dominant security model for the cloud, shifting the perimeter from the network to the people and devices that make up a modern workforce. Find out how you can get started with Zero Trust today!

  • Overcoming Cyberthreats to Critical Infrastructure with Integrated IT/OT Cybersecurity

    Security professionals interested in effectively executing an integrated IT/OT cybersecurity strategy should join this webinar to learn how they can achieve end-to-end visibility into the full spectrum of both IT and OT network devices, as well as unified business ...

MORE WEBINARS

Partner Perspectives

Get Smart About Network Segmentation & Traffic Routing
Through a combination of intelligent segmentation and traffic routing to tools, you can gain much better visibility into your network. Here's how.

Boosting Security Effectiveness with 'Adjuvants'
How integrating corporate resources like the IT help desk, system administration, quality assurance and HR can breathe new life into your security program.

FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.