[TechWeb](
Follow Dark Reading:
[RSS](
November 29, 2018
Top!Top?elq_mid=88022&elq_cid=22844169
LATEST SECURITY NEWS & COMMENTARY
[Incorrect Assessments of Data Value Putting Organizations at Risk](
Information security groups often underestimate or overestimate the true value of data assets, making it harder to prioritize controls.
[Federal Indictments in SamSam Ransomware Campaign](
Two Iranian nationals have been indicted on multiple counts by a federal grand jury in connection with the SamSam ransomware attacks that struck government, critical infrastructure, and healthcare organizations.
[Google, White Ops, Industry Players Dismantle 3ve Ad Fraud Operation](
3ve, an ad fraud operation amassing 1.7M infected machines, was taken down in an operation driven by law enforcement, Google, White Ops, and several security companies.
[Amazon Rolls Out AWS Security Hub](
New security platform aggregates information from Amazon Web Services cloud accounts and third-party tools.
[Atrium Health Breach Exposes 2.65 Million Patient Records](
Supplier that handles billing and online payments for health-care provider became aware of incident Oct. 1.
[Data Breach Threats Bigger Than Ever](
A quarter of IT and security leaders expect a major data breach in the next year.
[Middle East, North Africa Cybercrime Ups Its Game](
Ransomware, DDoS extortion, and encrypted communications abound as cybercriminals in the region refine their tradecraft. [MORE NEWS & COMMENTARY](
HOT TOPICS
[Buckle Up: A Closer Look at Airline Security Breaches](
Cyberattacks on airports and airlines are often unrelated to passenger safety - but that's no reason to dismiss them, experts say.
[New Hacker Group Behind 'DNSpionage' Attacks in Middle East](
Motives are not fully clear, though data exfiltration is one possibility, Cisco Talos says.
[Transforming into a CISO Security Leader](
Are you thinking of changing your career route from techie to CISO? Are you making the right choice? Only you know for sure. [MORE](
EDITORS' CHOICE
[7 Real-Life Dangers That Threaten Cybersecurity](
Cybersecurity means more than bits and bytes; threats are out there IRL, and IT pros need to be prepared.
[The "Typical" Security Engineer: Hiring Myths & Stereotypes](
In an environment where talent is scarce, it's critical that hiring managers remove artificial barriers to those whose mental operating systems are different.
Tech Resources
- [10 Best Practices That Could Reshape Your IT Security Department](
- [2018 Cyberthreat Defense Report](
- [Securing your Code for GDPR Compliance](
- [Cyber Threats Are Surging Globally](
- [Know Your Unknowns With a Master IP Address List Audit](
- [Outsmart Malware](
- [[Cyber Threat Brief] Turkish Hacktivists Respond to US Sanctions](
[ACCESS TECH LIBRARY NOW](
- [Using Security Champions to Build a DevSecOps Culture Within Your Organization](
Building security into application teams' culture is necessary for DevSecOps to be successful. Outside the software security group, Security Champions are the leaders of this cultural change.
- [Lambda Architecture with In-Memory Technology](
To meet existing and future needs, organizations need a new kind of data warehouse that can handle both kinds of data processing: batch workloads for traditional reporting, as well as real-time or near-real-time streaming data. For this, they need a ...
[MORE WEBINARS](
Partner Perspectives
[An Industry In Transition: Key Tech Trends In 2018](
[Get Smart About Network Segmentation & Traffic Routing](
Through a combination of intelligent segmentation and traffic routing to tools, you can gain much better visibility into your network. Here's how.
[Boosting Security Effectiveness with 'Adjuvants'](
How integrating corporate resources like the IT help desk, system administration, quality assurance and HR can breathe new life into your security program.
Middle!Middle?elq_mid=88022&elq_cid=22844169
FEATURED REPORTS
- [How Enterprises Are Using IT Threat Intelligence](
- [How Enterprises Are Attacking the Cybersecurity Problem](
[MORE REPORTS](
CURRENT ISSUE
[10 Emerging Threats Every Enterprise Should Know About](
[DOWNLOAD THIS ISSUE]( [SUBSCRIBE NOW](
[BACK ISSUES]( | [MUST READS]( | [TECH DIGEST](
PRODUCTS & RELEASES
[Steve Lipner Appointed Chair of NIST Information Security and Privacy Advisory Board](
[More Than Half of Companies See Rise in Mobile Security Threats: Bitglass 2018 BYOD Report](
[Dragos Announces $37M in Series B Funding for Industrial Control Systems (ICS) Cybersecurity Threat Detection and Response](
[King & Union and Farsight Security Announce Strategic Partnership](
[MORE PRODUCTS & RELEASES](
Dark Reading Daily
-- Published By [InformationWeek](
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, [click here.](
To opt-out of any future Dark Reading Daily Newsletter emails, please respond [here.](
Thoughts about this newsletter? [Give us feedback.](/cdn-cgi/l/email-protection?elq_mid=88022&elq_cid=22844169#bcd9d1ddd5d0fcc8d9dfd4cbd9ded2d9cbcfd0d9c8c8d9cecf92dfd3d1)
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our [Privacy Statement.](
[© 2018]( | [UBM Tech]( | [Privacy Statement]( | [Terms Of Service]( | [Contact Us](/cdn-cgi/l/email-protection?elq_mid=88022&elq_cid=22844169#c6afb1ada4b2a8a8a3b1b5aaa3b2b2a3b4b586b3a4abe8a5a9ab)