Follow Dark Reading:
 March 12, 2019
LATEST SECURITY NEWS & COMMENTARY
3 Places Security Teams Are Wasting Time
Dark Reading caught up with RSA Security president Rohit Ghai at the RSA Conference to discuss critical areas where CISOs and their teams are spinning their wheels.
Cryptominers Remain Top Threat but Coinhive's Exit Could Change That
Coinhive has remained on top of Check Point Software's global threat index for 15 straight months.
NSA, DHS Call for Info Sharing Across Public and Private Sectors
Industry leaders debate how government and businesses can work together on key cybersecurity issues.
763M Email Addresses Exposed in Latest Database Misconfiguration Episode
MongoDB once again used by database admin who opens unencrypted database to the whole world.
Georgia's Jackson County Pays $400K to Ransomware Attackers
The ransomware campaign started March 1 and shut down most of Jackson County's IT systems.
Hackers Break into System That Houses College Application Data
More than 900 colleges and universities use Slate, owned by Technolutions, to collect and manage information on applicants.
MORE NEWS & COMMENTARY
HOT TOPICS
6 Questions to Ask While Buying a Connected Car
Here are six questions to keep in mind when you walk into the showroom to buy a networked car.

6 Tips for Getting the Most from Your VPN
VPNs are critical for information security. But simply having these cozy security tunnels in the toolkit isn't enough to keep an organization's data safe.

MORE
EDITORS' CHOICE

IT Security Administrators Aren't Invincible
IT security administrators and their teams are responsible for evaluating an organization's security tools and technologies, but are they armed with the proper tools, considerations, and budget to do so? Fourth in a six-part series.
It's Time to Rethink Your Vendor Questionnaire
To get the most from a vendor management program you must trust, then verify. These six best practices are a good place to begin.
Tech Resources
ACCESS TECH LIBRARY NOW

  • How to Use AI & Machine Learning to Improve Security

    A top expert offers useful definitions of terms and discusses practical applications of the AI and ML technology that might speed your incident reaction time and improve your use of IT security staff resources.

  • Hadoop is Cool - Again!

    In this webinar, you will learn about 3 Hadoop trends that can impact the way you do data analytics.

MORE WEBINARS

Partner Perspectives

Get Smart About Network Segmentation & Traffic Routing
Through a combination of intelligent segmentation and traffic routing to tools, you can gain much better visibility into your network. Here's how.

Boosting Security Effectiveness with 'Adjuvants'
How integrating corporate resources like the IT help desk, system administration, quality assurance and HR can breathe new life into your security program.

FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.