Follow Dark Reading:
 December 30, 2016
LATEST SECURITY NEWS & COMMENTARY
10 Things InfoSec Pros Can Celebrate About 2016
There were a few items that passed for good news this year.
White House Announces Retaliatory Measures For Russian Election-Related Hacking
35 Russian intelligence operatives ejected from the US, and two of the "Cyber Most Wanted" are frozen out by Treasury Department.
Another Massive DDoS Closes Out 2016, But Mirai Not To Blame
Using a new malware variant called Leet, the 650 Gbps DDoS attack matched Mirai's floods of traffic.
Threat Actors Bring Ransomware To Industrial Sector With New Version of KillDisk
Disk-erasing malware has been tweaked to encrypt data instead and to ask for a Bitcoin payment.
21 Biggest Cybercriminal Busts Of 2016
This year has been a tornado of major cyberattacks and hacker arrests. Here, we look back on the 21 most interesting 'cyberbusts' of 2016.
Greatest Hits Of 2016: Readers' Picks For The Years' Best Commentary
Here's what topped the Dark Reading page-view charts from the security industry's brightest minds, coolest rock stars, and up-and-coming leaders.
How Artificial Intelligence Will Solve The Security Skills Shortage
Unlike industries that fear the intrusion of AI, the infosec world is embracing this revolutionary technology, and the seismic changes it will bring to threat detection and mitigation.
8 Boldest Security Predictions For 2017
Scary, funny and maybe even a little outlandish, these industry predictions come from prognosticators who didn't mince words.
MORE NEWS & COMMENTARY
HOT TOPICS
More Than 50% Of Biggest Holiday Retailers May Not Be PCI-Compliant
SecurityScorecard warns while the industry has made progress, many are still not covering the basics of security.

Major Cyberattacks On Healthcare Grew 63% In 2016
US hospitals lack new technologies and best practices to defend against threats, new report says.

MORE
EDITORS' CHOICE

The Bug Bounty Model: 21 Years & Counting
A look back on the beginnings of crowdsourced vulnerability assessment and how its robust history is paving the way for the future.
Malware Used In DNC Breach Found Tracking Ukraine Military
Russian 'Fancy Bear' now tied to Ukraine artillery Android app hack with the same malware used in breach of the Democratic National Committee.
Fileless Malware Takes 2016 By Storm
In-memory attacks are all the rage, creating a growing class of "non-malware."
Tech Resources
ACCESS TECH LIBRARY NOW

  • [Security] How to Better Arm Your Network Defenses

    BYOD policies and the enablement of global workforces to insecurely connect to your network has opened "Pandora's cyber box" to malicious attacks you worked hard to keep out. This fundamental shift limits your visibility into the threats that are targeting ...

  • Strengthen Your Security With Threat Analysis

    In the past, security response teams and security operations centers (SOCs) have focused most of their effort on reacting to new attacks and compromises. But as threat intelligence becomes more sophisticated and "threat hunting" becomes a more common tool in ...

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
COALFIRE ANNOUNCES ACQUISITION OF CYBER SECURITY LEADER, VERIS GROUP
Combination Positions Coalfire with New Cyber Risk, Compliance, and Technical Testing Capabilities
BIO-key Debuts Wearable Fingerprint Reader for New Devices At CES
BIO-key to show wearable fingerprint reader for Windows, Micro USB Fingerprint Reader for Android and Biometric Padlocks
MORE PRODUCTS & RELEASES
Dark Reading Weekly
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Weekly Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.