Follow Dark Reading:
 March 07, 2019
LATEST SECURITY NEWS & COMMENTARY
Meet the New 'Public-Interest Cybersecurity Technologist'
A grassroots movement is emerging to train high-risk groups and underrepresented communities in cybersecurity protection and skills - all for the public good.
To Improve Security, We Must Focus on Its People
New technology can help cybersecurity bridge the talent gap, but tech won't do much without people to operate it.
Consumers Care About Privacy, but Not Enough to Act on It
People claim to value data privacy and don't trust businesses to protect them - but most fail to protect themselves.
Word Bug Allows Attackers to Sneak Exploits Past Anti-Malware Defenses
Problem lies in the manner in which Word handles integer overflow errors in OLE file format, Mimecast says.
Fighting Alert Fatigue with Actionable Intelligence
By fine-tuning security system algorithms, analysts can make alerts intelligent and useful, not merely generators of noise.
It's Time to Rethink Your Vendor Questionnaire
To get the most from a vendor management program you must trust, then verify. These six best practices are a good place to begin.
Fighting Alert Fatigue with Actionable Intelligence
By fine-tuning security system algorithms, analysts can make alerts intelligent and useful, not merely generators of noise.
MORE NEWS & COMMENTARY
HOT TOPICS
Security Experts, Not Users, Are the Weakest Link
CISOs: Stop abdicating responsibility for problems with users - it's part of your job.

Microsoft Debuts Azure Sentinel SIEM, Threat Experts Service
New services, which are both available in preview, arrive at a time when two major trends are converging on security.

Security Pros Agree: Cloud Adoption Outpaces Security
Oftentimes, responsibility for securing the cloud falls to IT instead of the security organization, researchers report.

MORE
EDITORS' CHOICE

6 Questions to Ask While Buying a Connected Car
Here are six questions to keep in mind when you walk into the showroom to buy a networked car.
Here's What Happened When a SOC Embraced Automation
Despite initial apprehension, security pros immediately began to notice some benefits.
Tech Resources

Partner Perspectives

Get Smart About Network Segmentation & Traffic Routing
Through a combination of intelligent segmentation and traffic routing to tools, you can gain much better visibility into your network. Here's how.

Boosting Security Effectiveness with 'Adjuvants'
How integrating corporate resources like the IT help desk, system administration, quality assurance and HR can breathe new life into your security program.

FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.