Follow Dark Reading:
 March 14, 2019
LATEST SECURITY NEWS & COMMENTARY
It Takes an Average of 3 to 6 Months to Fill a Cybersecurity Job
Meanwhile, organizations are looking at unconventional ways to staff up and train their workforce as technical expertise gets even harder to find.
Phishing Attacks Evolve as Detection & Response Capabilities Improve
Social engineering scam continued to be preferred attack vector last year, but attackers were forced to adapt and change.
Microsoft Patch Tuesday: 64 Vulnerabilities Patched, 2 Under Attack
Seventeen vulnerabilities patches today are rated critical, four are publicly known, and two have been exploited in the wild.
There May Be a Ceiling on Vulnerability Remediation
Most organizations are doing all they can to keep up with the release of vulnerabilities, new research shows.
The 12 Worst Serverless Security Risks
A new guide from the Cloud Security Alliance offers mitigations, best practices, and a comparison between traditional applications and their serverless counterparts.
IT Security Administrators Aren't Invincible
IT security administrators and their teams are responsible for evaluating an organization's security tools and technologies, but are they armed with the proper tools, considerations, and budget to do so? Fourth in a six-part series.
MORE NEWS & COMMENTARY
HOT TOPICS
Citrix Breach Underscores Password Perils
Attackers used a short list of passwords to knock on every digital door to find vulnerable systems in the vendor's network.

3 Places Security Teams Are Wasting Time
Dark Reading caught up with RSA Security president Rohit Ghai at the RSA Conference to discuss critical areas where CISOs and their teams are spinning their wheels.

763M Email Addresses Exposed in Latest Database Misconfiguration Episode
MongoDB once again used by database admin who opens unencrypted database to the whole world.

MORE
EDITORS' CHOICE

Name that Toon: Advanced Persistent Threat

We provide the cartoon. You write the caption. Win an Amazon gift card!


5 Essentials for Securing and Managing Windows 10
It's possible to intelligently deploy and utilize Windows 10's many security enhancements while avoiding common and costly migration pitfalls.
6 Questions to Ask While Buying a Connected Car
Here are six questions to keep in mind when you walk into the showroom to buy a networked car.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Tools & Techniques to Disrupt Lateral Movement

    In this webinar you'll learn about the tools and techniques you can use to detect attackers' lateral movement within your computing environment and how to stop them before they launch their final payload.

  • Practical Cyber Defense for ICS

    In this Dark Reading webinar, top experts offer insight on the threat posed to Industrial control systems (ICS) systems, and how you can expand your security strategies to protect them.

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Weekly
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Weekly Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.