[TechWeb](
Follow Dark Reading:
[RSS](
March 29, 2019
Top!Top?elq_mid=90218&elq_cid=22844169
LATEST SECURITY NEWS & COMMENTARY
[Microsoft Takes Down 99 Hacker-Controlled Websites](
A judge granted Microsoft the injunction allowing them to disrupt a network of sites operated by an Iranian-linked group of hackers.
[40% of Organizations Not Doing Enough to Protect Office 365 Data](
By not using third-party data backup tools, companies are leaving themselves open to attack, a new report finds.
[Tidying Expert Marie Kondo: Cybersecurity Guru?](
The "KonMari" method of decluttering can be a huge step toward greater security, according to a growing number of executives.
[New Android Trojan Targets 100+ Banking Apps](
'Gustuff' also designed to steal from cryptocurrency wallets, payment services, e-commerce apps.
[Microsoft Tackles IoT Security with New Azure Updates](
The Azure Security Center for IoT provides teams with an overview of IoT devices and helps monitor their security properties.
[Everything I Needed to Know About Third-Party Risk Management, I Learned from Meet the Parents](
How much do you trust your vendors? You don't have to hook them up to a polygraph machine because there are better ways to establish trust.
[Quantum Computing and Code-Breaking](
Prepare today for the quantum threats of tomorrow.
[Enterprise Data Encryption Hits All-time High](
A new report by the Ponemon Institute shows 45% of organizations have a comprehensive encryption policy in place.
[Man Pleads Guilty to Hacking Apple Accounts of NFL & NBA Players, Rappers](
Dozens of pro athletes and musicians fell for a phishing scam that pilfered their Apple accounts and credit cards. [MORE NEWS & COMMENTARY](
HOT TOPICS
[New Shodan Tool Warns Organizations of Their Internet-Exposed Devices](
Shodan Monitor is free to members of the popular Internet search engine.
[Ex-NSA Director Rogers: Insider Threat Prevention a 'Contract'](
Ret. Admiral Michael Rogers - who served as head of the NSA and the US Cyber Command from 2014 to 2018 - on how to handle the risk of insiders exposing an organization's sensitive data.
[Russia Regularly Spoofs Regional GPS](
The nation is a pioneer in spoofing and blocking satellite navigation signals, causing more than 9,800 incidents in the past three years, according to an analysis of navigational data. [MORE](
EDITORS' CHOICE
[10 Movies All Security Pros Should Watch](
Don't expect to read about any of the classics, like 'War Games' or 'Sneakers,' which have appeared on so many lists before. Rather, we've broadened our horizons with this great mix of documentaries, hacker movies, and flicks based on short stories.
[Inside Cyber Battlefields, the Newest Domain of War](
In his Black Hat Asia keynote, Mikko Hypponen explored implications of "the next arms race" and why cyber will present challenges never before seen in warfare.
Tech Resources
- [7 SIEM Trends to Watch in 2019](
- [EcoStruxure(TM) IT: Visibility Across Hybrid Ecosystem](
- [Organizing the Hunt for Cyber Threats with MITRE ATT&CK](
- [What's the Answer to the Vulnerability Overload Problem? Key Findings from ESG's Cyber Risk Management Survey](
- [Innovation vs. Security & Privacy](
- [451 Research: Network Traffic Analysis Opens the Eyes of the SOC](
- [The Advent of Advanced Network Traffic Analysis & Why it Matters](
[ACCESS TECH LIBRARY NOW](
- [Secure Email: Developing the Right Strategy](
In this webinar, top experts discuss strategies for limiting access to critical email systems, when to encrypt email attachments and transmissions, and how to build a day-to-day process for protecting email against common cyber attacks.
- [How to Use AI & Machine Learning to Improve Security](
A top expert offers useful definitions of terms and discusses practical applications of the AI and ML technology that might speed your incident reaction time and improve your use of IT security staff resources.
[MORE WEBINARS](
Partner Perspectives
[An Industry In Transition: Key Tech Trends In 2018](
[Get Smart About Network Segmentation & Traffic Routing](
Through a combination of intelligent segmentation and traffic routing to tools, you can gain much better visibility into your network. Here's how.
[Boosting Security Effectiveness with 'Adjuvants'](
How integrating corporate resources like the IT help desk, system administration, quality assurance and HR can breathe new life into your security program.
Middle!Middle?elq_mid=90218&elq_cid=22844169
FEATURED REPORTS
- [How Enterprises Are Developing Secure Applications](
IT security and application development are disparate processes that are increasingly coming together. Here's a look at how that's happening.
- [How Enterprises Are Attacking the Cybersecurity Problem](
Online attackers are constantly developing new, innovative ways to break into the enterprise. This Dark Reading Tech Digest gives an in-depth look at five emerging attack trends and exploits your security team should look out for, along with helpful recommendations ...
[MORE REPORTS](
CURRENT ISSUE
[5 Emerging Cyber Threats to Watch for in 2019](
[DOWNLOAD THIS ISSUE]( [SUBSCRIBE NOW](
[BACK ISSUES]( | [MUST READS]( | [TECH DIGEST](
PRODUCTS & RELEASES
[Former Government Contractor Pleads Guilty To Federal Charge Of Willful Retention Of National Defense Information](
[Cygilant Appoints Top Technology Executive Rob Scott as CEO](
[FirstPoint Announces $2.5M in Seed Funding](
[Carbonite Closes Acquisition of Webroot](
[MORE PRODUCTS & RELEASES](
Dark Reading Daily
-- Published By [InformationWeek](
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, [click here.](
To opt-out of any future Dark Reading Daily Newsletter emails, please respond [here.](
Thoughts about this newsletter? [Give us feedback.](mailto:email@techwebnewsletters.com)
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our [Privacy Statement.](
[© 2019]( | [UBM Tech]( | [Privacy Statement]( | [Terms Of Service]( | [Contact Us](mailto:iwkbtnnewsletters@ubm.com)