Follow Dark Reading:
 March 15, 2019
LATEST SECURITY NEWS & COMMENTARY
Ransomware's New Normal
GandCrab's evolution underscores a shift in ransomware attack methods.
Criminals Use One Line of Code to Steal Card Data from E-Commerce Sites
New JavaScript sniffer is similar to malware used in the Magecart campaign last year that affected over 800 sites.
Anomaly Detection Techniques: Defining Normal
The challenge is identifying suspicious events in training sets where no anomalies are encountered. Part two of a two-part series.
US Prosecutors Investigate Facebook's Data-Sharing Deals
The news follows a long, tumultuous period of scandal around Facebook and its privacy practices.
Businesses Increase Investments in AI and Machine Learning
More than three-quarters of IT pros say they feel safer for having done so, according to a new report.
4 Reasons to Take an 'Inside Out' View of Security
When you approach security from the inside out, you're protecting your data by determining the most vital applications and using a risk-based strategy, which focuses on the most valuable and vulnerable assets.
MORE NEWS & COMMENTARY
HOT TOPICS
Citrix Breach Underscores Password Perils
Attackers used a short list of passwords to knock on every digital door to find vulnerable systems in the vendor's network.

It Takes an Average of 3 to 6 Months to Fill a Cybersecurity Job
Meanwhile, organizations are looking at unconventional ways to staff up and train their workforce as technical expertise gets even harder to find.

3 Places Security Teams Are Wasting Time
Dark Reading caught up with RSA Security president Rohit Ghai at the RSA Conference to discuss critical areas where CISOs and their teams are spinning their wheels.

MORE
EDITORS' CHOICE

6 Tax Season Tips for Security Pros
Here are some practical ways to ensure your company's safety as Uncle Sam comes calling.
5 Essentials for Securing and Managing Windows 10
It's possible to intelligently deploy and utilize Windows 10's many security enhancements while avoiding common and costly migration pitfalls.
Tech Resources
ACCESS TECH LIBRARY NOW

  • How to Use AI & Machine Learning to Improve Security

    A top expert offers useful definitions of terms and discusses practical applications of the AI and ML technology that might speed your incident reaction time and improve your use of IT security staff resources.

  • Tools & Techniques to Disrupt Lateral Movement

    In this webinar you'll learn about the tools and techniques you can use to detect attackers' lateral movement within your computing environment and how to stop them before they launch their final payload.

MORE WEBINARS

Partner Perspectives

Get Smart About Network Segmentation & Traffic Routing
Through a combination of intelligent segmentation and traffic routing to tools, you can gain much better visibility into your network. Here's how.

Boosting Security Effectiveness with 'Adjuvants'
How integrating corporate resources like the IT help desk, system administration, quality assurance and HR can breathe new life into your security program.

FEATURED REPORTS
  • Dark Reading Report Roundup

    We've compiled all our latest reports in one place. Check them out today!

  • How Enterprises Are Attacking the Cybersecurity Problem

    Online attackers are constantly developing new, innovative ways to break into the enterprise. This Dark Reading Tech Digest gives an in-depth look at five emerging attack trends and exploits your security team should look out for, along with helpful recommendations ...

MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.