Follow Dark Reading:
 November 11, 2017
LATEST SECURITY NEWS & COMMENTARY
6 Steps for Sharing Threat Intelligence
Industry experts offer specific reasons to share threat information, why it's important - and how to get started.
Google Updates Chrome to Prevent Unwanted Content, Redirects
Changes to Google Chrome aim to prevent users from being redirected to unexpected websites and unwanted content.
Customers Punish Breached Companies
Equifax's 25% reduction in share value and other industry-wide stats show that consumers aren't so apathetic about cybersecurity after all.
Why Common Sense Is Not so Common in Security: 20 Answers
Or, questions vendors need to ask themselves before they write a single word of marketing material.
Cybersecurity Staffing Shortage Tied to Cyberattacks, Data Breaches
Short-staffed cybersecurity teams contribute to data breaches and cyberattacks levied against their organizations, a survey finds.
MORE NEWS & COMMENTARY
HOT TOPICS
Burnout, Culture Drive Security Talent Out the Door
Security's efforts to bridge the talent gap mean little when workers don't want to stay in the industry.

Less Than One-Third of People Use Two-Factor Authentication
The number of 2FA users is still lower than expected, but most adopters started voluntarily, researchers found.

MORE
EDITORS' CHOICE

Inhospitable: Hospitality & Dining's Worst Breaches in 2017
Hotels and restaurants are in the criminal crosshairs this year.
Stealthy New PLC Hack Jumps the Air Gap
Researchers at Black Hat Europe next month will demonstrate a data-exfiltration attack on Siemens PLCs that uses combination of code manipulation and Radio Frequency (RF) emissions.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Cloud Security: Don't Go Blind While Playing in the Cloud

    Attend this webinar to understand the security transformation from an on-prem fortress mentality to federated cloud services functioning outside your traditional zone of control.

  • Evolution of the Data Scientist Role

    In the years since data scientist was declared the sexiest job, the role itself has evolved. As happens with any job, hiring managers have been adjusting their expectations for data science candidates, and executives are defining the role of the ...

MORE WEBINARS

Partner Perspectives

'Goldilocks' Legislation Aims to Clean up IoT Security
The proposed Internet of Things Cybersecurity Improvement Act of 2017 is not too hard, not too soft, and might be just right.

5 Reasons CISOs Should Keep an Open Mind about Cryptocurrency
With untold new markets for Bitcoin and other 'alt-coins,' it's going to be an exciting future -- and security leaders need to get ready for it.

5 Reasons Why the CISO is a Cryptocurrency Skeptic
If you think all you need is technology to defend against bad guys, you shouldn't be a CISO. But technology is all cryptocurrency is, starting with Bitcoin.

FEATURED REPORTS
  • The State of Ransomware

    Ransomware has become one of the most prevalent new cybersecurity threats faced by today's enterprises. This new report from Dark Reading includes feedback from IT and IT security professionals about their organization's ransomware experiences, defense plans, and malware challenges. Find ...

  • 2017 State of IT Report

    In today's technology-driven world, "innovation" has become a basic expectation. IT leaders are tasked with making technical magic, improving customer experience, and boosting the bottom line -- yet often without any increase to the IT budget. How are organizations striking ...

MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.