Follow Dark Reading:
 September 22, 2018
LATEST SECURITY NEWS & COMMENTARY
The 'Opsec Fail' That Helped Unmask a North Korean State Hacker
How Park Jin Hyok - charged by the US government for alleged computer crimes for the Sony, Bank of Bangladesh, WannaCry cyberattacks - inadvertently blew his cover via email accounts.
Executive Branch Makes Significant Progress As DMARC Deadline Nears
The DHS directive on email security has an approaching deadline that most departments in the executive branch might actually meet.
Data Manipulation: How Security Pros Can Respond to an Emerging Threat
Industry leaders are scrambling to address the issue, which will take new thinking to overcome.
Romanian Hacker Pleads Guilty for Role in Inauguration Surveillance Ransomware
Attack against the Metropolitan Police Department was disrupted before malware could be sent to additional systems.
US Approves Cyber Weapons Against Foreign Enemies
The White House is changing the rules on its use of digital weapons to fight adversaries targeting US networks.
MORE NEWS & COMMENTARY
HOT TOPICS
NSS Labs Files Antitrust Suit Against Symantec, CrowdStrike, ESET, AMTSO
Suit underscores longtime battle between vendors and labs over control of security testing protocols.

Turn the NIST Cybersecurity Framework into Reality: 5 Steps
Actionable advice for tailoring the National Institute of Standards and Technology's security road map to your company's business needs.

The 7 Habits of Highly Effective Security Teams
Security requires smart people, processes, and technology. Too often, the "people" portion of the PPT equation is neglected.

MORE
EDITORS' CHOICE

6 Security Training Hacks to Increase Cyber IQ Org-Wide
Move beyond generic, annual security awareness training with these important tips.
3 Drivers Behind the Increasing Frequency of DDoS Attacks
What's causing the uptick? Motivation, opportunity, and new capabilities.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Make Your Organization's Email Safer

    With nearly all security incidents and breaches originating from both email and the web -- and the necessity of these tools for your organizations day to day operations -- how can you protect your organization from the cyberattackers and their ...

  • Want Security in the Cloud? Look to Identity 1st

    All the benefits of the cloud disappear if you can't keep your data and users safe. In a perimeter-less world, it's identity that becomes the heart of security. Join us to discover why modern security starts with identity first and ...

MORE WEBINARS

Partner Perspectives

Get Smart About Network Segmentation & Traffic Routing
Through a combination of intelligent segmentation and traffic routing to tools, you can gain much better visibility into your network. Here's how.

Boosting Security Effectiveness with 'Adjuvants'
How integrating corporate resources like the IT help desk, system administration, quality assurance and HR can breathe new life into your security program.

FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.