[TechWeb](?elq_mid=84399&elq_cid=22844169&_mc=NL_DR_EDT_DR_weekly_20180419&cid=NL_DR_EDT_DR_weekly_20180419&elqTrackId=6f58e9425bc447dd9baf5062f3cdbb8b&elq=251e511fa96d4df0b28c52bc318bbc3b&elqaid=84399&elqat=1&elqCampaignId=30470)
Follow Dark Reading:
[RSS](
April 19, 2018
Top!Top?elq_mid=84399&elq_cid=22844169
LATEST SECURITY NEWS & COMMENTARY
[2018 RSA Conference: Execs Push Cooperation, Culture & Civilian Safety](
Executives from Microsoft, McAfee, and RSA discuss X and a new collaboration on Y.
[Trump Administration Cyber Czar Rob Joyce to Return to the NSA](
First year of Trump White House's cybersecurity policy mostly followed in the footsteps of the Obama administration.
[Data Visibility, Control Top Cloud Concerns at RSA](
As the traditional perimeter dissolves and sensitive data moves to the cloud, security experts at RSA talk about how they're going to protect it.
[Cyber War Game Shows How Federal Agencies Disagree on Incident Response](
Former officials at DHS, DOJ, and DOD diverge on issues of attribution and defining what constitutes an act of cyber war.
[Majority of Men Think Women Have Equal Opportunity to Advance in Cybersecurity Career](
Not so fast, say women.
[Latest News from RSAC 2018](
Check out Dark Reading's exclusive coverage of the news and security themes that are dominating RSA Conference 2018 this week in San Francisco. [MORE NEWS & COMMENTARY](
Middle!Middle?elq_mid=84399&elq_cid=22844169
HOT TOPICS
[7 Non-Financial Data Types to Secure](
Credit card and social security numbers aren't the only sensitive information that requires protection.
[Stats on the Cybersecurity Skills Shortage: How Bad Is It, Really?](
Is it just a problem of too few security professionals, or are there other reasons enterprises struggle to build infosec teams?
[The Role of KPIs in Incident Response](
Using KPIs can have a positive impact on the tactical and strategic functions of a security operations program. [MORE](
EDITORS' CHOICE
[8 Ways Hackers Monetize Stolen Data](
Hackers are craftier than ever, pilfering PII piecemeal so bad actors can combine data to set up schemes to defraud medical practices, steal military secrets and hijack R&D product information.
[INsecurity Conference Seeks Security Pros to Speak on Best Practices](
Dark Reading's second annual data defense conference will be held Oct. 23-25 in Chicago; call for speakers is issued.
Tech Resources
- [ISA Delivers Major, Ongoing ROI](-ongoing-roi/396033?elq_mid=84399&elq_cid=22844169&_mc=NL_DR_EDT_DR_weekly_20180419&cid=NL_DR_EDT_DR_weekly_20180419&elqTrackId=544019ff8fb94229832034a7989f4d43&elq=251e511fa96d4df0b28c52bc318bbc3b&elqaid=84399&elqat=1&elqCampaignId=30470)
- [The Equifax Breach & How Software Composition Analysis Cloud Have Prevented It](
- [The Main AppSec Tech to Adopt in 2018](
- [The Hunt for IoT - The Growth & Evolution of Thingbots Ensures Chaos](
- [Threat Landscape: Republic of South Africa](
- [Instill Long-Term Behavioral Change with Terranova's 3D Model](E2%80%99s-3d-model/396003?elq_mid=84399&elq_cid=22844169&_mc=NL_DR_EDT_DR_weekly_20180419&cid=NL_DR_EDT_DR_weekly_20180419&elqTrackId=a98ca956b4564b3eb2dbbf9070558d4f&elq=251e511fa96d4df0b28c52bc318bbc3b&elqaid=84399&elqat=1&elqCampaignId=30470)
- [3 Use Cases for Deception Technology in Financial Services](
[ACCESS TECH LIBRARY NOW](
- [Bulletproof Your Digital Footprint From Emerging Threats](
Discover how to protect your brand against cyber impostors across all things digital.
- [IoT: 6 Core Components | Use Cases| Security](
Join us as we outline the six core components of IoT, discuss real-world IoT use cases and dive into how to secure each IoT component, how to prepare for an IoT-rich future, and what this means for your infrastructure.
[MORE WEBINARS](
FEATURED REPORTS
- [[Forrester's Report] The State of Application Security: 2018 & Beyond](s-report-the-state-of-application-security-2018-and-beyond/394673?elq_mid=84399&elq_cid=22844169&_mc=NL_DR_EDT_DR_weekly_20180419&cid=NL_DR_EDT_DR_weekly_20180419&elqTrackId=84a25788543941828f9c58719d72525e&elq=251e511fa96d4df0b28c52bc318bbc3b&elqaid=84399&elqat=1&elqCampaignId=30470)
- [2018 State of the Cloud Report](
Cloud adoption is growing, but how are organizations taking advantage of it? Interop ITX and InformationWeek surveyed technology decision-makers to find out, read this report to discover what they had to say!
[MORE REPORTS](
CURRENT ISSUE
[How to Cope with the IT Security Skills Shortage](
[DOWNLOAD THIS ISSUE]( [SUBSCRIBE NOW](
[BACK ISSUES]( | [MUST READS]( | [TECH DIGEST](
PRODUCTS & RELEASES
[CompTIA Offers Free Cybersecurity Mini Boot Camps at Upcoming AFCEA Defensive Cyber Operations Symposium](
[CISO Conundrum: Multiple Solutions Harden Posture but Create Alert Fatigue](
[BluVector, Endace Announce Partnership at RSA to Provide Attack Detection, Analytics and Response Solution](
[Cisco Doubles Down on Security Investment to Protect Endpoint and Email](
[Cylance Showcases AI Powered Endpoint Detection and Response Solution at RSA 2018 Conference](
[MORE PRODUCTS & RELEASES](
Dark Reading Weekly
-- Published By [InformationWeek](?elq_mid=84399&elq_cid=22844169&_mc=NL_DR_EDT_DR_weekly_20180419&cid=NL_DR_EDT_DR_weekly_20180419&elqTrackId=3be4cd716542482bb4de8cd3ef862a5c&elq=251e511fa96d4df0b28c52bc318bbc3b&elqaid=84399&elqat=1&elqCampaignId=30470)
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, [cick here.](
To opt-out of any future Dark Reading Weekly Newsletter emails, please respond [here.](
Thoughts about this newsletter? [Give us feedback.](mailto:email@techwebnewsletters.com)
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our [Privacy Statement.](
[© 2018]( | [UBM Tech]( | [Privacy Statement]( | [Terms Of Service]( | [Contact Us](mailto:iwkbtnnewsletters@ubm.com)