Follow Dark Reading:
 November 01, 2018
LATEST SECURITY NEWS & COMMENTARY
Hardware Cyberattacks: How Worried Should You Be?
How to fit hardware threats into your security model as hardware becomes smaller, faster, cheaper, and more complex.
Pervasive Emotet Botnet Now Steals Emails
Researchers discover new cyber-spying function in the persistent malware operation's arsenal.
SamSam Ransomware Goes on a Tear
SamSam ransomware hasn't gone away and it's adapting to meet evolving defenses.
How the Power of Quantum Can Be Used Against Us
There has been a palpable shift from volumetric attacks to "quantum attacks," and they look to be one of the biggest cybersecurity challenges on the rise today.
Chinese Intel Agents Indicted for 5-Year IP Theft Campaign
Intelligence agents aimed for aerospace manufacturing targets, with help of cyberattackers, corporate insiders, and one IT security manager.
Apple Patches Multiple Major Security Flaws
New security updates cross all Apple platforms.
Qualys Snaps Up Container Firm
Plans to use Layered Insight's technology to add runtime capabilities and automated enforcement to its container security tool.
MORE NEWS & COMMENTARY
HOT TOPICS
Securing Serverless: Attacking an AWS Account via a Lambda Function
It's not every day that someone lets you freely wreak havoc on their account just to find out what happens when you do.

FTC Offers Small Businesses Free Cybersecurity Resources
Cybersecurity for Small Businesses campaign kicks off.

Windows Defender: First Full Antivirus Tool to Run in a Sandbox
Sandboxed version now available to Windows Insiders and anyone else who force-enables it in Windows 10 version 1703 and above.

MORE
EDITORS' CHOICE

9 Traits of A Strong Infosec Resume
Security experts share insights on which skills and experiences are most helpful to job hunters looking for their next gig.
Spooking the C-Suite: The Ephemeral Specter of Third-Party Cyber-Risk
Halloween movies are the perfect metaphor for breaking down today's scariest supplier breach tropes.
Tech Resources
ACCESS TECH LIBRARY NOW

MORE WEBINARS

Partner Perspectives

Get Smart About Network Segmentation & Traffic Routing
Through a combination of intelligent segmentation and traffic routing to tools, you can gain much better visibility into your network. Here's how.

Boosting Security Effectiveness with 'Adjuvants'
How integrating corporate resources like the IT help desk, system administration, quality assurance and HR can breathe new life into your security program.

FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.