Follow Dark Reading:
 July 11, 2016
LATEST SECURITY NEWS & COMMENTARY
8 Ways Ethically Compromised Employees Compromise Security
From audit cheats to bringing data to a new job, unscrupulous employees put organizations at risk.
Cybercrime Now Surpasses Traditional Crime In UK
The US could be on an even worse trajectory, according to one security expert.
Hacking A Penetration Tester
How even a pen test conducted by a security pro can be hacked by a determined attacker looking for a way to its target.
MORE NEWS & COMMENTARY
HOT TOPICS
6 Ways To Keep Androids Safe
Security managers have their hands full protecting Android devices, but there are common sense steps they can take to beat back attackers.

How Not To Write A Pen Test RFP
The downside of a failed request for a penetration test proposal is a no-win situation for everyone. Here are five common mistakes to avoid.

NATO Ambassador: How The Ukraine Crisis Fits Cyber War Narrative
Kenneth Geers previews his Black Hat talk and discusses the strategic military maneuvers governments can make within cyberspace.



MORE
IN CASE YOU MISSED IT

An Inside Look At The New Apple Mac Malware 'Eleanor'
Researchers from Bitdefender find security hole that opens up a backdoor to the Mac OS X system.
Tech Resources

Partner Perspectives

Shifting The Economic Balance Of Cyberattacks
Our goal should be to simply make the cost of conducting a cyberattack so expensive that cybercriminals view attacking our organization as a bad return on investment.

Adaptive Security Demands A Shift In Mindset: Part 2 In A Series
By adopting new ways of thinking about security, improving the capabilities of existing systems, and integrating key innovations, enterprises will be well on their way to better security.

The Importance Of Taking A More Active Role To Protect Our Data
Big data has lots of potential to make our decisions more efficient and effective. But like any powerful substance, too much in the wrong hands can have disastrous consequences.

FEATURED REPORTS
  • Gartner Predictions for 2016: Mobile and Wireless

    In this new phase of mobility, wireless and mobile technologies expand our real world beyond simple smart devices, creating new digital worlds. IT leaders and vendors are challenged by new privacy and security threats from new technology sources.

  • Forrester Report: Cloud Powers The New Connected Economy

    This May 2016 Forrester report explores a landscape in which organizations in every industry are moving forward from cloud adoption to cloud creation and participation. Learn how you are a member of this networked economy & how the steps you take may ...

MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.