[TechWeb](?elq_mid=84370&elq_cid=22844169&_mc=NL_DR_EDT_DR_daily_20180418&cid=NL_DR_EDT_DR_daily_20180418&elqTrackId=ad287d551c344324aefc528800f3933e&elq=9563032dc4144178bb72877cc1d45c15&elqaid=84370&elqat=1&elqCampaignId=30456)
Follow Dark Reading:
[RSS](
April 18, 2018
Top!Top?elq_mid=84370&elq_cid=22844169
LATEST SECURITY NEWS & COMMENTARY
[Trump Administration Cyber Czar Rob Joyce to Return to the NSA](
First year of Trump White House's cybersecurity policy mostly followed in the footsteps of the Obama administration.
[2018 RSA Conference: Execs Push Cooperation, Culture & Civilian Safety](
Executives from Microsoft, McAfee, and RSA discuss X and a new collaboration on Y.
[Majority of Men Think Women Have Equal Opportunity to Advance in Cybersecurity Career](
Not so fast, say women.
[NIST Seeking Comments on New AppSec Practices Standards](
Working in conjunction with SAFECode, NIST is opening the floor to suggestions at RSA about secure software development life cycle guidelines.
[New Malware Adds RAT to a Persistent Loader](
A newly discovered variant of a long-known malware loader adds the ability to control the victim from afar.
[Why We Need Privacy Solutions That Scale Across Borders](
New privacy solutions are becoming scalable, smarter, and easier to address compliance across industries and geographies. [MORE NEWS & COMMENTARY](
HOT TOPICS
[7 Non-Financial Data Types to Secure](
Credit card and social security numbers aren't the only sensitive information that requires protection.
[Stats on the Cybersecurity Skills Shortage: How Bad Is It, Really?](
Is it just a problem of too few security professionals, or are there other reasons enterprises struggle to build infosec teams?
[New Email Campaign Employs Malicious URLs](
A new attack dropping the Quant Loader Trojan bypasses scanners and sandboxes. [MORE](
EDITORS' CHOICE
[8 Ways Hackers Monetize Stolen Data](
Hackers are craftier than ever, pilfering PII piecemeal so bad actors can combine data to set up schemes to defraud medical practices, steal military secrets and hijack R&D product information.
[Microsegmentation: Strong Security in Small Packages](
A deep dive into how organizations can effectively devise and implement microsegmentation in a software-defined networking data center.
Tech Resources
- [ISA Delivers Major, Ongoing ROI](-ongoing-roi/396033?elq_mid=84370&elq_cid=22844169&_mc=NL_DR_EDT_DR_daily_20180418&cid=NL_DR_EDT_DR_daily_20180418&elqTrackId=594ed5e605dd43769f5d195327e812ff&elq=9563032dc4144178bb72877cc1d45c15&elqaid=84370&elqat=1&elqCampaignId=30456)
- [The Equifax Breach & How Software Composition Analysis Cloud Have Prevented It](
- [The Main AppSec Tech to Adopt in 2018](
- [The Quick Guide To MDR](
- [Threat Landscape: Republic of South Africa](
- [Deception Comes of Age: Essential for Securing Dynamic Business Environments](
- [Secure Cloud Infrastructure & Apps with SOCaaS](
[ACCESS TECH LIBRARY NOW](
- [Bulletproof Your Digital Footprint From Emerging Threats](
Discover how to protect your brand against cyber impostors across all things digital.
- [IoT: 6 Core Components | Use Cases| Security](
Join us as we outline the six core components of IoT, discuss real-world IoT use cases and dive into how to secure each IoT component, how to prepare for an IoT-rich future, and what this means for your infrastructure.
[MORE WEBINARS](
Partner Perspectives
[How Attackers Can Exploit rTorrent with Monero Cryptocurrency Miner](
As cryptomining campaigns become more profitable, cybercriminals are becoming more creative about finding new ways to extend their operations.
[Avoiding the Ransomware Mistakes that Crippled Atlanta](
What made Atlanta an easy target was its outdated use of technology: old computers running on non-supported platforms, which are also a characteristic of many municipalities and most major cities.
[Cryptomining: Fast-Becoming the Web's Most Profitable Attack Method](
The ROI of 'cryptojacking' has never been higher, making bitcoin and other cryptocurrencies a more attractive target for cybercriminals. Here's why.
Middle!Middle?elq_mid=84370&elq_cid=22844169
FEATURED REPORTS
- [[Forrester's Report] The State of Application Security: 2018 & Beyond](s-report-the-state-of-application-security-2018-and-beyond/394673?elq_mid=84370&elq_cid=22844169&_mc=NL_DR_EDT_DR_daily_20180418&cid=NL_DR_EDT_DR_daily_20180418&elqTrackId=3a43f55181994068b3ff66bd0d39f720&elq=9563032dc4144178bb72877cc1d45c15&elqaid=84370&elqat=1&elqCampaignId=30456)
- [How Enterprises Are Attacking the IT Security Problem](strategic-security-report]-how-enterprises-are-attacking-the-cybersecurity-challenge/390403?elq_mid=84370&elq_cid=22844169&_mc=NL_DR_EDT_DR_daily_20180418&cid=NL_DR_EDT_DR_daily_20180418&elqTrackId=a727459d5fb74fb8ab9d80bbeb98ab8c&elq=9563032dc4144178bb72877cc1d45c15&elqaid=84370&elqat=1&elqCampaignId=30456)
Enterprises are spending more of their IT budgets on cybersecurity technology. How do your organization's security plans and strategies compare to what others are doing? Here's an in-depth look.
[MORE REPORTS](
CURRENT ISSUE
[How to Cope with the IT Security Skills Shortage](
[DOWNLOAD THIS ISSUE]( [SUBSCRIBE NOW](
[BACK ISSUES]( | [MUST READS]( | [TECH DIGEST](
PRODUCTS & RELEASES
[Red Balloon Security Announces Strategic Partnership with In-Q-Tel](
[AlienVault Unveils Free Threat-Scanning Service for Endpoint Devices through Open Threat Exchange](
[Cylance Showcases AI Powered Endpoint Detection and Response Solution at RSA 2018 Conference](
[RedLock Enhances Visibility, Compliance Assurance, and Threat Detection with Azure](
[MORE PRODUCTS & RELEASES](
Dark Reading Daily
-- Published By [InformationWeek](?elq_mid=84370&elq_cid=22844169&_mc=NL_DR_EDT_DR_daily_20180418&cid=NL_DR_EDT_DR_daily_20180418&elqTrackId=b5da32e1c770491687e6595dfd11d3ef&elq=9563032dc4144178bb72877cc1d45c15&elqaid=84370&elqat=1&elqCampaignId=30456)
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, [cick here.](
To opt-out of any future Dark Reading Daily Newsletter emails, please respond [here.](
Thoughts about this newsletter? [Give us feedback.](mailto:email@techwebnewsletters.com)
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our [Privacy Statement.](
[© 2018]( | [UBM Tech]( | [Privacy Statement]( | [Terms Of Service]( | [Contact Us](mailto:iwkbtnnewsletters@ubm.com)