[TechWeb](?elq_mid=84550&elq_cid=22844169&_mc=NL_DR_EDT_DR_daily_20180501&cid=NL_DR_EDT_DR_daily_20180501&elqTrackId=3fef401466924f2ca9b920c9816b41d6&elq=007ac6ad1720485b9238a84fa79f46f1&elqaid=84550&elqat=1&elqCampaignId=30566)
Follow Dark Reading:
[RSS](
May 01, 2018
Top!Top?elq_mid=84550&elq_cid=22844169
LATEST SECURITY NEWS & COMMENTARY
[10 Security Innovators to Watch](
Startups in the RSA Conference Innovation Sandbox competed for the title of "Most Innovative."
[WhatsApp Founder to Depart Facebook Amid Privacy, Encryption Dispute](
Jan Koum also plans to step down from Facebook's board of directors.
[Old Worm, New Tricks: FacexWorm Targets Crypto Platforms](
Malicious Chrome extension FacexWorm has reappeared with new capabilities, targeting cryptocurrency platforms and lifting user data.
[Speed at Which New Drupal Flaw Was Exploited Highlights Patching Challenges](
In the rush to patch, organizations can create fresh problems for themselves.
[What Meltdown and Spectre Mean for Mobile Device Security](
Here are four tips to keep your mobile users safe from similar attacks.
[Slack Releases Open Source SDL Tool](
After building an SDL tool for their own use, Slack has released it on Github under an open source license. [MORE NEWS & COMMENTARY](
HOT TOPICS
[8 Ways Hackers Monetize Stolen Data](
Hackers are craftier than ever, pilfering PII piecemeal so bad actors can combine data to set up schemes to defraud medical practices, steal military secrets and hijack R&D product information.
[It's Time to Take GitHub Threats Seriously](
There's a good chance your company has projects on the source code management system, but the casual way many developers use GitHub creates security issues.
[North Korea Ramps Up 'Operation GhostSecret' Cyber Espionage Campaign](
Critical infrastructure, entertainment, finance, healthcare, telecoms, among recent targets of the Lazarus Group, aka Hidden Cobra. [MORE](
EDITORS' CHOICE
[12 Trends Shaping Identity Management](
As IAM companies try to stretch 'identity context' into all points of the cybersecurity market, identity is becoming 'its own solar system.'
['Zero Login:' The Rise of Invisible Identity](
Will new authentication technologies that recognize users on the basis of their behaviors finally mean the death of the despised password?
Tech Resources
- [[Slideshow] 7 Steps to a Smooth, Secure Cloud Transition](
- [[Slideshow] 7 Key Stats that Size Up the Cybercrime Deluge](
- [Raritan's PX Intelligent Rack PDUs](E2%80%99s-px-intelligent-rack-pdus/396843?elq_mid=84550&elq_cid=22844169&_mc=NL_DR_EDT_DR_daily_20180501&cid=NL_DR_EDT_DR_daily_20180501&elqTrackId=b5d7f4140c1244d5a0603821b153a9f9&elq=007ac6ad1720485b9238a84fa79f46f1&elqaid=84550&elqat=1&elqCampaignId=30566)
- [DNS Redefined](
- [[Slideshow] 10 Mistakes End Users Make That Drive Security Managers Crazy](
- [The Evolution of Access and the Emergence of Unified Access Management](
- [Insider Threat Detection and Prevention](
[ACCESS TECH LIBRARY NOW](
- [Threat Intelligence: Where to Start & What to Ask](
In this session, you'll get a look at some of the different types and sources of threat intelligence data, and you'll get advice on how to choose the right ones - and how to use these varied information sources to ...
- [Cyber Threats to ICS, Are You Ready?](
Top experts offer insight on the threat posed to industrial control systems (ICS) and other vertical-industry systems, and how you can expand your enterprise security strategies to protect them.
[MORE WEBINARS](
Partner Perspectives
[3 Ways to Maximize Security and Minimize Business Challenges](
The best strategy for choosing security tools and architecting networks is to focus on staffing and resources, risk tolerance, and business change.
[Europe and Asia Take on More DDoS Attacks](
While North American targets have historically been on the receiving end of the majority of DDoS attacks since their inception, that trend changed in 2017.
[Cloud Misconceptions Are Pervasive Across Enterprises](
Shadow IT is rampant at many organizations that rely upon cloud-delivered tools and services to enable remote work, according to a new study. Here's what security teams need to do about it.
Middle!Middle?elq_mid=84550&elq_cid=22844169
FEATURED REPORTS
- [2018 State of the Cloud Report](
Cloud adoption is growing, but how are organizations taking advantage of it? Interop ITX and InformationWeek surveyed technology decision-makers to find out, read this report to discover what they had to say!
- [[Dark Reading Report] Navigating the Threat Intelligence Maze](strategic-security-report]-navigating-the-threat-intelligence-maze/393933?elq_mid=84550&elq_cid=22844169&_mc=NL_DR_EDT_DR_daily_20180501&cid=NL_DR_EDT_DR_daily_20180501&elqTrackId=2f3931f5b60b48dc997185444db31fa7&elq=007ac6ad1720485b9238a84fa79f46f1&elqaid=84550&elqat=1&elqCampaignId=30566)
[MORE REPORTS](
CURRENT ISSUE
[How to Cope with the IT Security Skills Shortage](
[DOWNLOAD THIS ISSUE]( [SUBSCRIBE NOW](
[BACK ISSUES]( | [MUST READS]( | [TECH DIGEST](
PRODUCTS & RELEASES
[Endpoints Still Vulnerable to Breaches Despite Antivirus Tech Advancements: Survey](
[PCI Security Standards Council Publishes Guidelines on Cloud Computing](
[Calligo & Corent Partner to Automate Cloud Migration, Data Privacy](
[MORE PRODUCTS & RELEASES](
Dark Reading Daily
-- Published By [InformationWeek](?elq_mid=84550&elq_cid=22844169&_mc=NL_DR_EDT_DR_daily_20180501&cid=NL_DR_EDT_DR_daily_20180501&elqTrackId=247b1487a6b64e6aa2d34e7e854d703a&elq=007ac6ad1720485b9238a84fa79f46f1&elqaid=84550&elqat=1&elqCampaignId=30566)
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, [cick here.](
To opt-out of any future Dark Reading Daily Newsletter emails, please respond [here.](
Thoughts about this newsletter? [Give us feedback.](mailto:email@techwebnewsletters.com)
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our [Privacy Statement.](
[© 2018]( | [UBM Tech]( | [Privacy Statement]( | [Terms Of Service]( | [Contact Us](mailto:iwkbtnnewsletters@ubm.com)