Follow Dark Reading:
 April 25, 2017
LATEST SECURITY NEWS & COMMENTARY
A Closer Look at CIA-Linked Malware as Search for Rogue Insider Begins
Symantec researcher explains the goals behind CIA-linked hacking tools, as the government launches an investigation to discover who gave secret documents to WikiLeaks.
The Road Less Traveled: Building a Career in Cyberthreat Intelligence
It's hard to become a threat intelligence pro, but there are three primary ways of going about it.
Macron Targeted by Russian Cyber Spies
France's leading presidential candidate Emmanuel Macron's campaign reportedly is being targeted by hackers ties to Russia's military intelligence arm GRU.
IT Engineer Stole Source Code to Verify Acquisition
Zhengquan Zhang admitted to installing malware on his employer's servers, which he did to research a potential acquisition.
MORE NEWS & COMMENTARY
HOT TOPICS
6 Times Hollywood Got Security Right
Hollywood has struggled to portray cybersecurity in a realistic and engaging way. Here are films and TV shows where it succeeded.

CISOs, Board Members Have Widely Divergent Views on Cybersecurity
Boards often want a lot more business-relevant reporting than CISOs provide, Focal Point Data Risk study shows.

The Implications Behind Proposed Internet Privacy Rules
The FCC's overreach needed to be undone to protect the FTC's authority over privacy.

MORE
EDITORS' CHOICE

The Hidden Dangers of Component Vulnerabilities
Dangerous flaws in open source components and dependencies lurk within most applications today.
SECURITY LIVE AT INTEROP ITX

10 Questions To Get Practical Answers At Interop ITX
May 15-19 in Las Vegas: How to get solutions and advice from top speakers for the things that you really want to know.
Tech Resources
ACCESS TECH LIBRARY NOW

  • IT Leader's Guide to the Cybersecurity Landscape

    Thanks to a never-ending stream of major and well-publicized data breaches, security has become one of the most critical issues in IT. Attend this webinar to learn about chief threats that IT organizations face, how they can impact your systems ...

  • Sneak Peek: State of Analytics - Research Results Revealed

    How does your analytics initiative shape up? Are you keeping pace with your peers in other organizations? Do you have data scientists in lead roles? Are you driving innovation with data? Have you embarked on Internet of Things (IoT) projects? ...

MORE WEBINARS

Partner Perspectives

Cybercrime Tactics & Techniques: Q1 2017
A deep dive into the threats that got our attention during the first three months of the year - and what to expect going forward.

Securing your Privacy on Android
If you work at a company that allows you to use your mobile device to login to email, access company data, or connect to company Wi-Fi, you're more of a security risk than you think.

Top 5 Dumbest Cyber Threats That Still Pay Off
Some hackers are fairly predictable in their successful use of really dumb attacks.

FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.