Follow Dark Reading:
 September 23, 2017
LATEST SECURITY NEWS & COMMENTARY
10 Security Product Flaw Scares
CCleaner compromise puts the crown on several years' worth of headlines about cybersecurity product weaknesses.
Americans Rank Criminal Hacking as Their Number One Threat
Global warming and artificial intelligence rate as less of a threat to human health, safety, and prosperity, than getting hacked, according to a survey released today.
Health IT & Cybersecurity: 5 Hiring Misconceptions to Avoid
Why healthcare organizations need a good strategy to find talent, or get left behind.
1.4 Million New Phishing Sites Launched Each Month
The number of phishing attacks reach a record rate in 2017, but the majority of the phishing sites remain active for just four- to eight hours.
MORE NEWS & COMMENTARY
HOT TOPICS
Equifax Exec Departures Raise Questions About Responsibility for Breach
Disclosed details suggest a failure by the technology team but senior executives and the board are not above responsibility as well, experts say.

1.9 Billion Data Records Exposed in First Half of 2017
Every second, 122 records are exposed in breaches around the globe, a new report shows. And that's doesn't even include the new Equifax breach data.

OPM Data Breach Lawsuit Tossed, Fed Plaintiffs will Appeal
A judge ruled federal employees cannot sue for damages from the 2015 Office of Personnel Management data breach.

MORE
EDITORS' CHOICE

10 Hot Cybersecurity Funding Rounds in Q3
The first two quarters of 2017 have been the most active ever in five years from a cybersecurity investment standpoint. Here's how the third quarter has shaped up.
Tech Resources
ACCESS TECH LIBRARY NOW

  • What You Need to Know about GDPR

    GDRP is an acronym that stands for General Data Protection Regulation and it's designed to give control of personal data back to individuals and take it out of the hands of the companies that collect it for commercial use. It ...

  • Threat Intelligence Overload?

    A wide range of threat intelligence feeds and services have cropped up keep IT organizations up to date on the latest security threats. But without mechanisms in place to actually use the information, these alerts provide little benefit.

MORE WEBINARS

Partner Perspectives

Where Do Security Vulnerabilities Come From?
There are three major causes: code quality, complexity, and trusted data inputs.

Artificial Intelligence: Getting the Results You Want
Finding a vendor that doesn't claim to do AI is hard these days. But getting the benefits you need and expect is even harder.

The Hunt for IoT: The Rise of Thingbots
Across all of our research, every indication is that today's "thingbots" - botnets built exclusively from Internet of Things devices - will become the infrastructure for a future Darknet.

FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.