Other Important News
DarkReading
'Ransomware' Added to Oxford English Dictionary DNS Hijacking: The Silent Threat That's Putting ...
3 Ways Hackers Steal Your Company's Mobile Data Hack Costs Coincheck Cryptocurrency Exchange $530 ...
5 Questions to Ask about Machine Learning IoT Botnets by the Numbers
700,000 Bad Apps Deleted from Google Play in 2017 Lazarus Group, Fancy Bear Most Active Threat Groups ...
Adobe to Patch Flash Zero-Day Discovered in South ... Microsoft Issues Emergency Patch to Disable Intel's ...
An Action Plan to Fill the Information Security ... Phishing Campaign Underscores Threat from Low ...
APIs Pose 'Mushrooming' Security Risk Poor Visibility, Weak Passwords Compromise Active ...
Breach-Proofing Your Data in a GDPR World Russian National Arrested for Kelihos Botnet Sent to US
Crypto-Mining Attacks Emerge as the New Big Threat ... Strava Fitness App Shares Secret Army Base Locations
Cyberattack Impersonates FBI Internet Crime ... Thieves Target ATMs In First US 'Jackpotting' Attacks
Data Encryption: 4 Common Pitfalls Thinking about a Career Move in Cybersecurity?
CSOONLINE
3 ways to make the most of GDPR Is the 'right to explanation' in Europe’s GDPR a game-changer for security
analytics?
Microsoft releases Windows patch to disable Intel's buggy Spectre fix
4 things CISOs should stress to the board of directors about cloud security New cryptocurrencies offer better anonymity, new security challenges
Basics for soaring above security challenges Poll: Dissolving network boundary requires a new approach to security.
Bridging the smart cities security divide Strategic security
Buggy Malwarebytes protection update wreaks havoc for users Enterprise plans for security automation and orchestration The biggest threat to building organizational cyber awareness
Top Cybersecurity Threats Active in the Education Sector Today – and Why
You Should Care
Understanding Gartner, and its limitations
GDPR keeping you up? There’s another monster hiding under the bed… Using better data to fight credit card fraud
Healthcare cybersecurity spending to exceed $65B over the next 5 years Whose data is it anyway?
10 old-school security principles that (still) rule
Dynamic authorization: a solution to navigating GDPR
7