Follow Dark Reading:
 October 31, 2018
LATEST SECURITY NEWS & COMMENTARY
Destructive Cyberattacks Spiked in Q3
Instead of simply fleeing when discovered, adversaries are actively engaging with incident response teams, a new Carbon Black study finds.
Kraken Resurfaces From the Deep Web
Fallout Exploit Kit releases Kraken Cryptor ransomware, giving the simple threat a much larger target pool.
10 Steps for Creating Strong Customer Authentication
Between usability goals and security/regulatory pressures, setting up customer-facing security is difficult. These steps and best practices can help.
The Case for MarDevSecOps
Why security must lead the integration of marketing into the collaborative security and development model in the cloud.
Companies Fall Short on 2FA
New research ranks organizations based on whether they offer two-factor authentication.
Girl Scouts Hacked, 2,800 Members Notified
A Girl Scouts of America branch in California was hacked, putting the data of 2,800 girls and their families at risk.
MORE NEWS & COMMENTARY
HOT TOPICS
Securing Serverless: Attacking an AWS Account via a Lambda Function
It's not every day that someone lets you freely wreak havoc on their account just to find out what happens when you do.

Windows 7 End-of-Life: Are You Ready?
Microsoft will terminate support for Windows 7 in January 2020, but some there's still some confusion among enterprises about when the OS officially gets retired.

8 Threats That Could Sink Your Company
Security researchers warn of both new and re-emerging threats that can cause serious harm.

MORE
EDITORS' CHOICE

7 Ways an Old Tool Still Teaches New Lessons About Web AppSec
Are your Web applications secure? WebGoat, a tool old enough to be in high school, continues to instruct.
3 Keys to Reducing the Threat of Ransomware
Following these steps could mean the difference between an inconvenience and a multimillion-dollar IT system rebuild -- for the public and private sectors alike.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Building a Cyber Defense for 2019 (Brought to you by Dark Reading)

    Hear as security practitioners, industry visionaries, and technology developers come together to discuss the key changes to expect in the next 12 months - and how you can prepare for them.

  • The Network of the Future is Powered by AI

    In this webinar, the CIO of Dartmouth, Mitch Davis, is joined by experts from Mist and Juniper to describe how AI-driven networks are boosting the user experience at the esteemed Ivy League college and the lessons that enterprise IT can ...

MORE WEBINARS

Partner Perspectives

Get Smart About Network Segmentation & Traffic Routing
Through a combination of intelligent segmentation and traffic routing to tools, you can gain much better visibility into your network. Here's how.

Boosting Security Effectiveness with 'Adjuvants'
How integrating corporate resources like the IT help desk, system administration, quality assurance and HR can breathe new life into your security program.

FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.