Follow Dark Reading:
 February 02, 2017
LATEST SECURITY NEWS & COMMENTARY
10 Essential Elements For Your Incident-Response Plan
The middle of a DDoS attack or ransomware infection is hardly the time to start talking about divisions of labor, or who should do what when.
Netflix Scam Spreads Ransomware
A program found on suspicious websites aims to trick Windows/PC users into creating fake Netflix logins so it can deliver ransomware.
Spam Now Makes Up Nearly Two-Thirds Of All Email
Spam spikes, and nearly three-fourths of all organizations worldwide have suffered adware-borne infections, according to Cisco's annual cybersecurity report.
Google Paid $3 Million To Bug Hunters In 2016
Search engine giant an example of the growing number of organizations benefiting from bug bounty programs.
A New Mantra For Cybersecurity: 'Simulate, Simulate, Simulate!'
What security teams can learn from the Apollo 13 space program, a global pandemic, and major infrastructure disruptions to identify their best responses to attacks.
How Cybercriminals Turn Employees Into Rogue Insiders
The Dark Web is a growing threat to organizations as hackers recruit insiders with access to corporate networks.
Netherlands Opts For Manual Vote-Count Amid Cyberattack Fears
Ballots will be counted by hand in the March 15 election after doubts surface over the safety and security of electronic system.
MORE NEWS & COMMENTARY
HOT TOPICS
How I Would Hack Your Network (If I Woke Up Evil)
How would an attacker target your company? Here's a first-person account of what might happen.

Why You're Doing Cybersecurity Risk Measurement Wrong
Measuring risk isn't as simple as some make it out to be, but there are best practices to help you embrace the complexity in a productive way. Here are five.

6 Free Ransomware Decryption Tools
The No More Ransom group has been working to get free decryptor tools into the hands of security professionals and the general public.

MORE
EDITOR'S CHOICE

This Week On Dark Reading
This week: how to get paid by cyber insurers and avoid paying ransoms.
Rethinking Vulnerability Disclosures In Industrial Control Systems
Why the security industry's traditional obsession and hype around vulnerabilities cannot be transferred to the ICS environment.
Tech Resources
ACCESS TECH LIBRARY NOW

  • [Cybersecurity] Dark Reading Virtual Event

    How much should your organization spend on information security? What's the potential cost of a major hack or data breach? What's the risk that your enterprise will be hit by a cyberattack? How can you measure the benefits of your ...

  • [Cloud Security Roadmap] Mitigating Risks & Building for Long-Term Success

    Let your inner control freak go. The "we control everything" security strategy does not apply to the cloud, especially not multicloud. According to Forrester Research, in 2015, 29 percent of global enterprise infrastructure decision-makers said they had already adopted or were in ...

MORE WEBINARS
FEATURED REPORTS
  • The Top Cybersecurity Risks & How Enterprises Are Responding

    The information security landscape is a constantly shifting risk environment. Today's IT security department must manage both internal and external threats' ranging from malware to mobile device vulnerabilities, to cloud security and ransomware. Download the Dark Reading 2016 Strategic Security Survey ...

  • How Enterprises Are Attacking the IT Security Enterprise Challenge

    Information Security professionals have been making hard choices on the fly for some time, but the unrelenting nature of attacks and threats to users have raised the stakes. To learn more about what organizations are doing to tackle these threats ...

MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Weekly
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Weekly Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.