Follow Dark Reading:
 March 16, 2016
LATEST SECURITY NEWS & COMMENTARY
Anonymous To Launch Cyberattacks Against Trump Campaign Starting April 1
Planned attacks a response to candidate's controversial campaign rhetoric, hacking collective says.
Threat Intelligence's Big Data Problem
Security teams are drowning in often useless threat intel data, but signs of maturity are emerging in what IT-Harvest predicts will be a $1.5 billion market by 2018.
CISO Playbook: Suit-up & Play Offense
In the game of IT security there are thousands of tools available, but the very best strategy to prepare for an opponent is to know your own weaknesses.
Ransomware: Putting Companies Between A Rock And A Hard Place
Paying a ransom encourages more attacks, but sometimes not paying could end up being a lot costlier

Cartoon: Getting To Know You

John Klossner's take on privacy and PII.


MORE NEWS & COMMENTARY
HOT TOPICS
FBI's Most Wanted Cybercriminals
The Federal Bureau of Investigation has got millions of dollars worth of rewards waiting for those who can help them nab these accused cyber thieves, spies and fraudsters.

5 Hot Security Job Skills
Cybersecurity job openings are looking for people with a blend of technical, security, and industry-specific talents -- and it helps to know Python, Hadoop, MongoDB, and other big-data analysis tools, too.

Two Biggest Reasons Ransomware Keeps Winning
New report also makes predictions on what hijinks ransomware might get up to next.

MORE
DARK READING RADIO TODAY AT 1 EDT

Dark Reading Radio: When Will Passwords Finally Die?
Join us this Wednesday, March 16, at 1pm EDT/10am PDT, for the next episode of Dark Reading Radio.
Tech Resources
ACCESS TECH LIBRARY NOW

  • [UX] How to Deliver the Best App Experience to Users

    Attend this webinar to learn how to gain a competitive advantage by delivering the very best user experience with improvements based on actual application performance, including mobile, mainframe, on-premises infrastructure, the cloud, and user feedback.

  • [Security] Identity & Behavioral Biometrics

    Despite millions spent each year on security, breaches still persist thanks to the compromised user credentials. How can you make the most of your existing security investments, while ensuring those who access your network are who they say they are?

MORE WEBINARS

Partner Perspectives

Who Took The Cookies From The Cookie Jar?
The indictment of five Iranian hackers three years after the fact raises the question: Is naming them a worthwhile part of the threat defense lifecycle, or is it a meaningless distraction?

Data In The Cloud: What Everyone Should Know
When vetting a cloud or SaaS provider, it is imperative that you find out how they handle data security and privacy. Here are some key questions to ask.

Knowledge Gap Series: The Myths Of Analytics
It may not be rocket science, but it is data science.

FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.