[TechWeb](?elq_mid=84396&elq_cid=22844169&_mc=NL_DR_EDT_DR_daily_20180419&cid=NL_DR_EDT_DR_daily_20180419&elqTrackId=4dadb1c0bd974768813b67a559ceedc8&elq=821d0679b55943439c6c679c636dfe3c&elqaid=84396&elqat=1&elqCampaignId=30467)
Follow Dark Reading:
[RSS](
April 19, 2018
Top!Top?elq_mid=84396&elq_cid=22844169
LATEST SECURITY NEWS & COMMENTARY
[Data Visibility, Control Top Cloud Concerns at RSA](
As the traditional perimeter dissolves and sensitive data moves to the cloud, security experts at RSA talk about how they're going to protect it.
[Cyber War Game Shows How Federal Agencies Disagree on Incident Response](
Former officials at DHS, DOJ, and DOD diverge on issues of attribution and defining what constitutes an act of cyber war.
[DHS Helps Shop Android IPS Prototype](
A MITRE-developed intrusion prevention system technology got showcased here this week at the RSA Conference.
[The Role of KPIs in Incident Response](
Using KPIs can have a positive impact on the tactical and strategic functions of a security operations program.
[70% of Energy Firms Worry About Physical Damage from Cyberattacks](
High-profile ICS attacks Triton/Trisis, Industroyer/CrashOverride, and Stuxnet have driven energy firms to invest more in cybersecurity, survey shows. [MORE NEWS & COMMENTARY](
HOT TOPICS
[7 Non-Financial Data Types to Secure](
Credit card and social security numbers aren't the only sensitive information that requires protection.
[Stats on the Cybersecurity Skills Shortage: How Bad Is It, Really?](
Is it just a problem of too few security professionals, or are there other reasons enterprises struggle to build infosec teams?
[The Role of KPIs in Incident Response](
Using KPIs can have a positive impact on the tactical and strategic functions of a security operations program. [MORE](
EDITORS' CHOICE
[8 Ways Hackers Monetize Stolen Data](
Hackers are craftier than ever, pilfering PII piecemeal so bad actors can combine data to set up schemes to defraud medical practices, steal military secrets and hijack R&D product information.
[Latest News from RSAC 2018](
Check out Dark Reading's exclusive coverage of the news and security themes that are dominating RSA Conference 2018 this week in San Francisco.
Tech Resources
- [ISA Delivers Major, Ongoing ROI](-ongoing-roi/396033?elq_mid=84396&elq_cid=22844169&_mc=NL_DR_EDT_DR_daily_20180419&cid=NL_DR_EDT_DR_daily_20180419&elqTrackId=333cd6107b0445a2ab748452409bb0c2&elq=821d0679b55943439c6c679c636dfe3c&elqaid=84396&elqat=1&elqCampaignId=30467)
- [The Equifax Breach & How Software Composition Analysis Cloud Have Prevented It](
- [The Main AppSec Tech to Adopt in 2018](
- [Security Analytics Use Cases For Threat Hunting](
- [[Security] 2018 IT Budget Priorities](
- [2018 Malware Trends Forecast](
- [Deception Matters: Slowing Down the Adversary](
[ACCESS TECH LIBRARY NOW](
- [Bulletproof Your Digital Footprint From Emerging Threats](
Discover how to protect your brand against cyber impostors across all things digital.
- [IoT: 6 Core Components | Use Cases| Security](
Join us as we outline the six core components of IoT, discuss real-world IoT use cases and dive into how to secure each IoT component, how to prepare for an IoT-rich future, and what this means for your infrastructure.
[MORE WEBINARS](
Partner Perspectives
[How to Leverage Artificial Intelligence for Cybersecurity](
AI and predictive analytics should be used to augment a company's security team, not replace it. Here's why.
[How Attackers Can Exploit rTorrent with Monero Cryptocurrency Miner](
As cryptomining campaigns become more profitable, cybercriminals are becoming more creative about finding new ways to extend their operations.
[Avoiding the Ransomware Mistakes that Crippled Atlanta](
What made Atlanta an easy target was its outdated use of technology: old computers running on non-supported platforms, which are also a characteristic of many municipalities and most major cities.
Middle!Middle?elq_mid=84396&elq_cid=22844169
FEATURED REPORTS
- [[Forrester's Report] The State of Application Security: 2018 & Beyond](s-report-the-state-of-application-security-2018-and-beyond/394673?elq_mid=84396&elq_cid=22844169&_mc=NL_DR_EDT_DR_daily_20180419&cid=NL_DR_EDT_DR_daily_20180419&elqTrackId=a52f8dd482c741b58dd52c2c9881ff30&elq=821d0679b55943439c6c679c636dfe3c&elqaid=84396&elqat=1&elqCampaignId=30467)
- [How Enterprises Are Attacking the IT Security Problem](strategic-security-report]-how-enterprises-are-attacking-the-cybersecurity-challenge/390403?elq_mid=84396&elq_cid=22844169&_mc=NL_DR_EDT_DR_daily_20180419&cid=NL_DR_EDT_DR_daily_20180419&elqTrackId=5854f8e8a989485c8b0a96a885d5d5bc&elq=821d0679b55943439c6c679c636dfe3c&elqaid=84396&elqat=1&elqCampaignId=30467)
Enterprises are spending more of their IT budgets on cybersecurity technology. How do your organization's security plans and strategies compare to what others are doing? Here's an in-depth look.
[MORE REPORTS](
CURRENT ISSUE
[How to Cope with the IT Security Skills Shortage](
[DOWNLOAD THIS ISSUE]( [SUBSCRIBE NOW](
[BACK ISSUES]( | [MUST READS]( | [TECH DIGEST](
PRODUCTS & RELEASES
[CompTIA Offers Free Cybersecurity Mini Boot Camps at Upcoming AFCEA Defensive Cyber Operations Symposium](
[RedLock Enhances Visibility, Compliance Assurance, and Threat Detection with Azure](
[SAP Security Tool Now Enables Automated QA & Security Checks for SAPUI5](
[MORE PRODUCTS & RELEASES](
Dark Reading Daily
-- Published By [InformationWeek](?elq_mid=84396&elq_cid=22844169&_mc=NL_DR_EDT_DR_daily_20180419&cid=NL_DR_EDT_DR_daily_20180419&elqTrackId=44169642270b4d17b7154074531be54d&elq=821d0679b55943439c6c679c636dfe3c&elqaid=84396&elqat=1&elqCampaignId=30467)
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, [cick here.](
To opt-out of any future Dark Reading Daily Newsletter emails, please respond [here.](
Thoughts about this newsletter? [Give us feedback.](mailto:email@techwebnewsletters.com)
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our [Privacy Statement.](
[© 2018]( | [UBM Tech]( | [Privacy Statement]( | [Terms Of Service]( | [Contact Us](mailto:iwkbtnnewsletters@ubm.com)