Follow Dark Reading:
 November 29, 2016
LATEST SECURITY NEWS & COMMENTARY
2016's 7 Worst DDoS Attacks So Far
Rise of booter and stresser services, mostly run on IoT botnets, is fueling DDoS excitement (but the pros aren't impressed).
San Francisco Transit Agency Earns Praise For Denying Ransom Request
Despite being forced to give out free rides all weekend, metropolitan transportation authority declines to pay the ransomware operators who locked down ticketing systems.
Q&A: SonicWall CEO Talks Rise Of Ransomware, IoT
Bill Conner discusses security risks at top of mind as the newly appointed leader of SonicWall, a company becoming independent for the second time.
Petition Forces Parliament To Reconsider Surveillance Bill
100,000 signatures require MPs to consider debating Snoopers' Charter again.
MORE NEWS & COMMENTARY
HOT TOPICS
Time For Security & Privacy To Come Out Of Their Silos
By working separately, these two teams aren't operating as efficiently as they could and are missing huge opportunities.

Security Automation: Striking The Right Balance
What a smart toaster oven taught me about the importance of learning how to do a task versus the efficiency of automating the work.

MORE
8 Books Security Pros Should Read
Hunting for a good resource on the security industry? Check out these classics from the experts to learn more about hacking, defense, cryptography and more.
Symantec To Buy LifeLock At $2.3 Billion
Deal set to be finalized by Q1 2017 and financed by cash and $750 million of new debt.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Will Data & Humans Become Friends in 2017?

    Is data reaching a saturation point, or still in its infancy? Has data buried human experience in our decision process? How will the millennial generation's love of data impact business as more millennials move into management roles? Can we expect ...

  • Containerized Apps - Changing Security

    With continuous deployment of micro-services and Docker containers becoming mainstream, it's imperative that security initiatives include security scanning and monitoring. Increasingly, known open source vulnerabilities have been the "way in" for attackers. This is a major concern for organizations worldwide ...

MORE WEBINARS

Partner Perspectives

5 Links Of The Attack Chain And How To Disrupt Them
By identifying steps in the attack chain, you can deploy appropriate defenses at each stage to prevent breaches from happening in the first place.

Active Defense Framework Can Help Businesses Defend Against Cyberattacks
New report provides a framework that lets private sector entities defend themselves while at the same time protect individual liberties and privacy, and mitigate the risk of collateral damage.

8 Ways Businesses Can Better Secure Their Remote Workers
Remote workers may present challenges for IT staff, but a combination of cybersecurity best practices, strong policy, and a dedicated user awareness campaign could keep company data safe.

FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.