Follow Dark Reading:
 March 11, 2019
LATEST SECURITY NEWS & COMMENTARY
Tina Fey, RSAC, and Parallels Between Improv and Cyber
This year's RSA Conference concluded with actress Tina Fey and program chair Hugh Thompson chatting about teambuilding, diversity, and improv.
Shifting Attacks Put Increasing ID Fraud Burden on Consumers
Card-present fraud is down, but attackers continue to find new strategies, and consumers are paying the price.
DHS: No Investigation Planned for Electrical Grid Incursions
The subtext to a panel discussion during RSA is that risks to national infrastructure are fraught with political considerations.
Citrix Hacked by 'International Cybercriminals'
FBI informed Citrix this week of a data breach that appears to have begun with a 'password spraying' attack to steal weak credentials to access the company's network.
Ultrasound Machine Diagnosed with Major Security Gaps
Check Point researchers investigate security risks and point to implications for medical IoT devices.
It's Time to Rethink Your Vendor Questionnaire
To get the most from a vendor management program you must trust, then verify. These six best practices are a good place to begin.
MORE NEWS & COMMENTARY
HOT TOPICS
Chronicle Releases Chapter One: Backstory
Google spin-off Alphabet rolls out a new cloud-based security data platform that ultimately could displace some security tools in organizations.

Word Bug Allows Attackers to Sneak Exploits Past Anti-Malware Defenses
Problem lies in the manner in which Word handles integer overflow errors in OLE file format, Mimecast says.

Here's What Happened When a SOC Embraced Automation
Despite initial apprehension, security pros immediately began to notice some benefits.

MORE
EDITORS' CHOICE

6 Questions to Ask While Buying a Connected Car
Here are six questions to keep in mind when you walk into the showroom to buy a networked car.

Name That Toon: The Advanced Persistent Threat

We provide the cartoon. You write the caption. Enter to win a $25 Amazon gift card.


Tech Resources
ACCESS TECH LIBRARY NOW

  • Tools & Techniques to Disrupt Lateral Movement

    In this webinar you'll learn about the tools and techniques you can use to detect attackers' lateral movement within your computing environment and how to stop them before they launch their final payload.

  • Hadoop is Cool - Again!

    In this webinar, you will learn about 3 Hadoop trends that can impact the way you do data analytics.

MORE WEBINARS

Partner Perspectives

Get Smart About Network Segmentation & Traffic Routing
Through a combination of intelligent segmentation and traffic routing to tools, you can gain much better visibility into your network. Here's how.

Boosting Security Effectiveness with 'Adjuvants'
How integrating corporate resources like the IT help desk, system administration, quality assurance and HR can breathe new life into your security program.

FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.