[TechWeb](?elq_mid=84527&elq_cid=22844169&_mc=NL_DR_EDT_DR_daily_20180428&cid=NL_DR_EDT_DR_daily_20180428&elqTrackId=e3dd730964bb47e786522a5d791b4edc&elq=5dff4bd2049544c3805bd552fff175ef&elqaid=84527&elqat=1&elqCampaignId=30549)
Follow Dark Reading:
[RSS](
April 28, 2018
Top!Top?elq_mid=84527&elq_cid=22844169
LATEST SECURITY NEWS & COMMENTARY
[12 Trends Shaping Identity Management](
As IAM companies try to stretch 'identity context' into all points of the cybersecurity market, identity is becoming 'its own solar system.'
['Zero Login:' The Rise of Invisible Identity](
Will new authentication technologies that recognize users on the basis of their behaviors finally mean the death of the despised password?
[Reno Man Created 8,000 Fake Online Accounts via Stolen Identities](
Kenneth Gilbert Gibson pleaded guilty to creating more than 8,000 fraudulent online accounts to launch a $3.5M fraud operation.
[North Korea Ramps Up 'Operation GhostSecret' Cyber Espionage Campaign](
Critical infrastructure, entertainment, finance, healthcare, telecoms, among recent targets of the Lazarus Group, aka Hidden Cobra. [MORE NEWS & COMMENTARY](
HOT TOPICS
[8 Ways Hackers Monetize Stolen Data](
Hackers are craftier than ever, pilfering PII piecemeal so bad actors can combine data to set up schemes to defraud medical practices, steal military secrets and hijack R&D product information.
[Threat Actors Turn to Blockchain Infrastructure to Host & Hide Malicious Activity](
.bit domains are increasingly being used to hide payloads, stolen data, and command and control servers, FireEye says.
[It's Time to Take GitHub Threats Seriously](
There's a good chance your company has projects on the source code management system, but the casual way many developers use GitHub creates security issues. [MORE](
EDITORS' CHOICE
[Cybersecurity Buzz Phrase Bingo](
The RSA Conference expo was chock full of vendors showing off their wares with language as colorful as the blinky lights on a SOC dashboard.
Tech Resources
- [[Slideshow] 7 Steps to a Smooth, Secure Cloud Transition](
- [[Slideshow] 7 Key Stats that Size Up the Cybercrime Deluge](
- [The Evolution of Access and the Emergence of Unified Access Management](
- [Forrester's Best Practices for Mitigating Insider Threats](E2%80%99s-best-practices-for-mitigating-insider-threats-/396423?elq_mid=84527&elq_cid=22844169&_mc=NL_DR_EDT_DR_daily_20180428&cid=NL_DR_EDT_DR_daily_20180428&elqTrackId=4ed41517baed44fd963a8235e2a85b6b&elq=5dff4bd2049544c3805bd552fff175ef&elqaid=84527&elqat=1&elqCampaignId=30549)
- [4 Reasons DLPs Aren't Cutting It](E2%80%99t-cutting-it-/396413?elq_mid=84527&elq_cid=22844169&_mc=NL_DR_EDT_DR_daily_20180428&cid=NL_DR_EDT_DR_daily_20180428&elqTrackId=62e0f5df982348ba8b713cb14eeb05f6&elq=5dff4bd2049544c3805bd552fff175ef&elqaid=84527&elqat=1&elqCampaignId=30549)
- [GDPR Without the Hype](
- [Security Concerns to the Aviation Industry](
[ACCESS TECH LIBRARY NOW](
- [Cyber Threats to ICS, Are You Ready?](
Top experts offer insight on the threat posed to industrial control systems (ICS) and other vertical-industry systems, and how you can expand your enterprise security strategies to protect them.
- [[Dark Reading Crash Course] Protecting Your Data In the Cloud](
Join us as a cloud security expert discusses how rather than be afraid of cloud computing, security experts can take better advantage of the cloud to improve security across the board.
[MORE WEBINARS](
Partner Perspectives
[Europe and Asia Take on More DDoS Attacks](
While North American targets have historically been on the receiving end of the majority of DDoS attacks since their inception, that trend changed in 2017.
[Cloud Misconceptions Are Pervasive Across Enterprises](
Shadow IT is rampant at many organizations that rely upon cloud-delivered tools and services to enable remote work, according to a new study. Here's what security teams need to do about it.
[IDS & IPS: Two Essential Security Measures](
To protect business networks, one line of security isn't enough.
Middle!Middle?elq_mid=84527&elq_cid=22844169
FEATURED REPORTS
- [The State of Cybersecurity: Defeating Cybercrime with Better Security Strategies](
- [[Strategic Security Report] Cloud Security's Changing Landscape](strategic-security-report]-cloud-security's-changing-landscape/393003?elq_mid=84527&elq_cid=22844169&_mc=NL_DR_EDT_DR_daily_20180428&cid=NL_DR_EDT_DR_daily_20180428&elqTrackId=9ddf5dd7dcd740cf9c4b329c4e310160&elq=5dff4bd2049544c3805bd552fff175ef&elqaid=84527&elqat=1&elqCampaignId=30549)
The rapid migration to cloud services and applications has created a critical need for new strategies and technologies to keep data secure. In this survey, IT security professionals offer insight on their plans for securing data in the cloud. The ...
[MORE REPORTS](
CURRENT ISSUE
[How to Cope with the IT Security Skills Shortage](
[DOWNLOAD THIS ISSUE]( [SUBSCRIBE NOW](
[BACK ISSUES]( | [MUST READS]( | [TECH DIGEST](
PRODUCTS & RELEASES
[Endpoints Still Vulnerable to Breaches Despite Antivirus Tech Advancements: Survey](
[PCI Security Standards Council Publishes Guidelines on Cloud Computing](
[Calligo & Corent Partner to Automate Cloud Migration, Data Privacy](
[MORE PRODUCTS & RELEASES](
Dark Reading Daily
-- Published By [InformationWeek](?elq_mid=84527&elq_cid=22844169&_mc=NL_DR_EDT_DR_daily_20180428&cid=NL_DR_EDT_DR_daily_20180428&elqTrackId=84c4cee7ca054c64888776ced5f994f7&elq=5dff4bd2049544c3805bd552fff175ef&elqaid=84527&elqat=1&elqCampaignId=30549)
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, [cick here.](
To opt-out of any future Dark Reading Daily Newsletter emails, please respond [here.](
Thoughts about this newsletter? [Give us feedback.](mailto:email@techwebnewsletters.com)
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our [Privacy Statement.](
[© 2018]( | [UBM Tech]( | [Privacy Statement]( | [Terms Of Service]( | [Contact Us](mailto:iwkbtnnewsletters@ubm.com)