Follow Dark Reading:
 September 14, 2019
LATEST SECURITY NEWS & COMMENTARY
Escaping Email: Unlocking Message Security for SMS, WhatsApp
Messaging is growing in importance as dislike for email increases. That means knowing how to protect critical data in the messaging era is a must for IT security.
Community Projects Highlight Need for Security Volunteers
From university courses to open source self-starters, community software projects aim to solve problems for populations in need. A focus on security is required as well.
Security Pros' Painless Guide to Machine Intelligence, AI, ML & DL
Artificial intelligence, machine learning, or deep learning? Knowing what the major terms really mean will help you sort through the morass of words on the subject and the security uses of each.
Phishers' Latest Tricks for Reeling in New Victims
Phishing works because people are, by nature, trusting -- but these evolving phishing techniques make it even tougher for security managers to stay on top.
Just a Few Questions Before That Bank Withdrawal ...
And be ready to turn over your first born.
FROM THE NEWS DESK

No Quick Fix for Security-Worker Shortfall
Security professionals see acquiring skills as the way forward, but only half of companies are training their workers, with more continuing to search for highly skilled employees.
US Sanctions 3 Cyber Attack Groups Tied to DPRK
Lazarus Group, Bluenoroff, and Andariel were named and sanctioned by the US Treasury for ongoing attacks on financial systems.
MORE NEWS & COMMENTARY
HOT TOPICS
New Technique Makes Passwords 14M Percent Harder to Crack, Nonprofit Claims
Tide's method for protecting passwords splinters them up into tiny pieces and stores them on distributed nodes.

Chinese Group Built Advanced Trojan by Reverse Engineering NSA Attack Tool
APT3 quietly monitored an NSA attack on its systems and used the information to build a weapon of its own.

APIs Get Their Own Top 10 Security List
OWASP's new list of API weaknesses focuses on issues that have caused recent data breaches and pose common security hazards in modern cloud-based applications.

MORE
EDITORS' CHOICE

Security Leaders Share Tips for Boardroom Chats
Cisco, Oracle, and LinkedIn security leaders share their challenges in communicating with business teams and advice for how CISOs can navigate the relationship.
Taking a Fresh Look at Security Ops: 10 Tips
Maybe you love your executive team, your security processes, tools, or strategy. Maybe you hate them. Whatever the situation, it's likely at some point that things will have changed.
Tech Resources
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.