Follow Dark Reading:
 March 19, 2019
LATEST SECURITY NEWS & COMMENTARY
New IoT Security Bill: Third Time's the Charm?
The latest bill to set security standards for connected devices sold to the US government has fewer requirements, instead leaving recommendations to the National Institute of Standards and Technology.
Are You Prepared for a Zombie (Domain) Apocalypse?
When a domain registration expires, they can be claimed by new owners. And sometimes, those new owners have malicious intent.
Dragos Buys ICS Firm with US Dept. of Energy Roots
NexDefense ICS security tool will be offered for free by Dragos.
New Europol Protocol Addresses Cross-Border Cyberattacks
The protocol is intended to support EU law enforcement in providing rapid assessment and response for cyberattacks across borders.
5 Essentials for Securing and Managing Windows 10
It's possible to intelligently deploy and utilize Windows 10's many security enhancements while avoiding common and costly migration pitfalls.
MORE NEWS & COMMENTARY
HOT TOPICS
Citrix Breach Underscores Password Perils
Attackers used a short list of passwords to knock on every digital door to find vulnerable systems in the vendor's network.

Proof-of-Concept Tracking System Finds RATs Worldwide
Using a combination of Shodan scans and data from partners, Recorded Future finds nearly 500 malware controllers for 14 different families of remote-access Trojans, as well as the corporate networks they have infected.

It Takes an Average of 3 to 6 Months to Fill a Cybersecurity Job
Meanwhile, organizations are looking at unconventional ways to staff up and train their workforce as technical expertise gets even harder to find.

MORE
EDITORS' CHOICE

7 Low-Cost Security Tools
Security hardware doesn't have to be expensive or complex to do the job. Here are seven examples of low-cost hardware that could fill a need in your security operations.
IoT Anomaly Detection 101: Data Science to Predict the Unexpected
Yes! You can predict the chance of a mechanical failure or security breach before it happens. Part one of a two-part series.
Tech Resources
ACCESS TECH LIBRARY NOW

  • How to Use AI & Machine Learning to Improve Security

    A top expert offers useful definitions of terms and discusses practical applications of the AI and ML technology that might speed your incident reaction time and improve your use of IT security staff resources.

  • Understanding and Preventing Social Engineering Attacks

    How can enterprises prevent "social engineering" attacks? Can users be trained to recognize such exploits and avoid them? Join Dark Reading as we invite top experts to discuss the most effective methods of defending against social engineering attacks.

MORE WEBINARS

Partner Perspectives

Get Smart About Network Segmentation & Traffic Routing
Through a combination of intelligent segmentation and traffic routing to tools, you can gain much better visibility into your network. Here's how.

Boosting Security Effectiveness with 'Adjuvants'
How integrating corporate resources like the IT help desk, system administration, quality assurance and HR can breathe new life into your security program.

FEATURED REPORTS
  • Dark Reading Report Roundup

    We've compiled all our latest reports in one place. Check them out today!

  • How Enterprises Are Attacking the Cybersecurity Problem

    Online attackers are constantly developing new, innovative ways to break into the enterprise. This Dark Reading Tech Digest gives an in-depth look at five emerging attack trends and exploits your security team should look out for, along with helpful recommendations ...

MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.