Follow Dark Reading:
 February 13, 2019
LATEST SECURITY NEWS & COMMENTARY
Devastating Cyberattack on Email Provider Destroys 18 Years of Data
All data belonging to US users-including backup copies-have been deleted in catastrophe, VMEmail says.
Up to 100,000 Reported Affected in Landmark White Data Breach
Australian property valuation firm Landmark White exposed files containing personal data and property valuation details.
Microsoft, Adobe Both Close More Than 70 Security Issues
With their regularly scheduled Patch Tuesday updates, both companies issued fixes for scores of vulnerabilities in their widely used software.
Identifying, Understanding & Combating Insider Threats
Your organization is almost certainly on the lookout for threats from outside the company. But are you ready to address threats from within?
'Picnic' Passes Test for Protecting IoT From Quantum Hacks
Researchers from DigiCert, Utimaco, and Microsoft Research gives thumbs-up to a new algorithm for implementing quantum hacking-proof digital certificates.
Symantec Acquires Luminate to Build on Cloud Security
Luminate Security, which specializes in software-defined perimeter technology, will extend Symantec's integrated defense platform.
MORE NEWS & COMMENTARY
HOT TOPICS
Ransomware Attack Via MSP Locks Customers Out of Systems
Vulnerable plugin for a remote management tool gave attackers a way to encrypt systems belonging to all customers of a US-based MSP.

New Zombie 'POODLE' Attack Bred from TLS Flaw
Citrix issues update for encryption weakness dogging the popular security protocol.

6 Reasons to Be Wary of Encryption in Your Enterprise
Encryption can be critical to data security, but it's not a universal panacea.

MORE
EDITORS' CHOICE

2019 Security Spending Outlook
Cybersecurity and IT risk budgets continue to grow. Here's how they'll be spent.
Cybersecurity and the Human Element: We're All Fallible
We examine the issue of fallibility from six sides: end users, security leaders, security analysts, IT security administrators, programmers, and attackers.
Tech Resources
ACCESS TECH LIBRARY NOW

  • 10 Emerging Enterprise App Threats

    Hear as application security experts offer a look at the latest and most potentially damaging threats to current enterprise apps, and how those threats can expose your organization to data compromise and theft.

  • Overcoming Cyberthreats to Critical Infrastructure with Integrated IT/OT Cybersecurity

    Security professionals interested in effectively executing an integrated IT/OT cybersecurity strategy should join this webinar to learn how they can achieve end-to-end visibility into the full spectrum of both IT and OT network devices, as well as unified business ...

MORE WEBINARS

Partner Perspectives

Get Smart About Network Segmentation & Traffic Routing
Through a combination of intelligent segmentation and traffic routing to tools, you can gain much better visibility into your network. Here's how.

Boosting Security Effectiveness with 'Adjuvants'
How integrating corporate resources like the IT help desk, system administration, quality assurance and HR can breathe new life into your security program.

FEATURED REPORTS
  • How Enterprises Are Attacking the Cybersecurity Problem

    Online attackers are constantly developing new, innovative ways to break into the enterprise. This Dark Reading Tech Digest gives an in-depth look at five emerging attack trends and exploits your security team should look out for, along with helpful recommendations ...

  • How Data Breaches Affect the Enterprise

    This report, offers new data on the frequency of data breaches, the losses they cause, and the steps that organizations are taking to prevent them in the future. Read the report today!

MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.