Follow Dark Reading:
 March 13, 2019
LATEST SECURITY NEWS & COMMENTARY
It Takes an Average of 3 to 6 Months to Fill a Cybersecurity Job
Meanwhile, organizations are looking at unconventional ways to staff up and train their workforce as technical expertise gets even harder to find.
Microsoft Patch Tuesday: 64 Vulnerabilities Patched, 2 Under Attack
Seventeen vulnerabilities patches today are rated critical, four are publicly known, and two have been exploited in the wild.
How the Best DevSecOps Teams Make Risk Visible to Developers
DevOps-minded CISOs say enterprise security teams need to do a better job scoring and visualizing risk for developers and business executives.
Citrix Breach Underscores Password Perils
Attackers used a short list of passwords to knock on every digital door to find vulnerable systems in the vendor's network.
There May be A Ceiling on Vulnerability Remediation
Most organizations are doing all they can to keep up with the release of vulnerabilities, new research shows.
MORE NEWS & COMMENTARY
HOT TOPICS
4 Ways At-Work Apps Are Vulnerable to Attack
Collaboration applications make users and IT teams more efficient. But they come with an added cost: security.

Web Apps Are Becoming Less Secure
Critical vulnerabilities in Web applications tripled in 2018, according to a new study.

IT Security Administrators Aren't Invincible
IT security administrators and their teams are responsible for evaluating an organization's security tools and technologies, but are they armed with the proper tools, considerations, and budget to do so? Fourth in a six-part series.

MORE
EDITORS' CHOICE

5 Essentials for Securing and Managing Windows 10
It's possible to intelligently deploy and utilize Windows 10's many security enhancements while avoiding common and costly migration pitfalls.
Security Spills: 9 Problems Causing the Most Stress
Security practitioners reveal what's causing them the most frustration in their roles.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Understanding and Preventing Social Engineering Attacks

    How can enterprises prevent "social engineering" attacks? Can users be trained to recognize such exploits and avoid them? Join Dark Reading as we invite top experts to discuss the most effective methods of defending against social engineering attacks.

  • Hadoop is Cool - Again!

    In this webinar, you will learn about 3 Hadoop trends that can impact the way you do data analytics.

MORE WEBINARS

Partner Perspectives

Get Smart About Network Segmentation & Traffic Routing
Through a combination of intelligent segmentation and traffic routing to tools, you can gain much better visibility into your network. Here's how.

Boosting Security Effectiveness with 'Adjuvants'
How integrating corporate resources like the IT help desk, system administration, quality assurance and HR can breathe new life into your security program.

FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
FireMon Announces Lumeta CloudVisibility for Cloud, Network Visibility and Security in Hybrid Enterprises
Survey: 160% Increase in Destructive Attacks Targeting Financial Institutions
Report reveals the cyber threats keeping financial CISOs awake at night, including Emotet, Steganography & Hidden Cobra.
Tripwire Debuts Pen Testing and Industrial Cybersecurity Assessment Services
New service offerings reinforce critical security controls, assess security weaknesses of enterprises and industrial organizations
MORE PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.