Follow Dark Reading:
 November 16, 2017
LATEST SECURITY NEWS & COMMENTARY
White House Releases New Charter for Using, Disclosing Security Vulnerabilities
Updated Vulnerability Equities Process provides transparency into how government will handle new vulnerabilities that it discovers in vendor products and services.
Deception Technology: Prevention Reimagined
How state-of-the-art tools make it practical and cost-effective to identify and engage attackers in early lateral movement stages to prevent them from reaching critical systems and data.
Who Am I? Best Practices for Next-Gen Authentication
By their very nature, antiquated, static identifiers like Social Security numbers and dates of birth are worse than passwords.
Stealthy Android Malware Found in Google Play
Eight apps found infected with a new Trojan family that ups the ante in obfuscation with four payload stages.
NSA Veterans Land $1.5 Million in Funding for Startup
ReFirm Labs' launches Centrifuge Platform, which aims to automatically detect security vulnerabilities in IoT firmware.
Forever 21 Informs Shoppers of Data Breach
Forever 21 learned an unauthorized actor may have accessed payment card data at certain retail stores.
MORE NEWS & COMMENTARY
HOT TOPICS
Emerging IT Security Technologies: 13 Categories, 26 Vendors
A rundown of some of the hottest security product areas, and vendors helping to shape them.

New Locky Ransomware Takes Another Turn
A newly discovered strain of Locky ransomware has been discovered masquerading as legitimate Microsoft Word documents.

Microsoft Word Vuln Went Unnoticed for 17 Years: Report
Researchers claim Microsoft Word vulnerability, patched today, has existed for 17 years.

MORE
EDITORS' CHOICE

Insider Threats: Red Flags and Best Practices
Security pros list red flags indicating an insider attack and best practices to protect against accidental and malicious exposure.
Fred Kwong: The Psychology of Being a CISO
Security Pro File: Fred Kwong learned people skills in the classroom and technical skills on the job. The former psychology major, now CISO at Delta Dental, shares his path to cybersecurity and how he applies his liberal arts background to his current role.
ICYMI

(Sponsored Article) 'KnockKnock:' Make Sure You Lock Your Door
Don't assume that just because you have moved an application to the cloud you are insulated from security risks and responsibilities.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Cloud Security: Don't Go Blind While Playing in the Cloud

    Attend this webinar to understand the security transformation from an on-prem fortress mentality to federated cloud services functioning outside your traditional zone of control.

  • Get Started with Edge Analytics

    Join All Analytics and Andrew Hopkins, Managing Director - IoT Products Industries at Accenture for this 101-style session where we will:
    •&nbspCover basic edge analytics terms and concepts
    •&nbspTake a closer look at common use cases

MORE WEBINARS

Partner Perspectives

'Goldilocks' Legislation Aims to Clean up IoT Security
The proposed Internet of Things Cybersecurity Improvement Act of 2017 is not too hard, not too soft, and might be just right.

5 Reasons CISOs Should Keep an Open Mind about Cryptocurrency
With untold new markets for Bitcoin and other 'alt-coins,' it's going to be an exciting future -- and security leaders need to get ready for it.

5 Reasons Why the CISO is a Cryptocurrency Skeptic
If you think all you need is technology to defend against bad guys, you shouldn't be a CISO. But technology is all cryptocurrency is, starting with Bitcoin.

FEATURED REPORTS
  • The State of Ransomware

    Ransomware has become one of the most prevalent new cybersecurity threats faced by today's enterprises. This new report from Dark Reading includes feedback from IT and IT security professionals about their organization's ransomware experiences, defense plans, and malware challenges. Find ...

  • How Enterprises Are Attacking the IT Security Problem

    Enterprises are spending more of their IT budgets on cybersecurity technology. How do your organization's security plans and strategies compare to what others are doing? Here's an in-depth look.

MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.