Follow Dark Reading:
 March 25, 2017
LATEST SECURITY NEWS & COMMENTARY
Apple: Mac, iPhone Bugs That CIA Allegedly Exploited Were Fixed Years Ago
New WikiLeaks data dump describes "Sonic Screwdriver," other CIA exploits for Mac desktops and iPhones
Intro to Cyber Insurance: 7 Questions to Ask
Buying a cyber insurance policy can be complex and difficult. Make sure you're asking these questions as you navigate the process.
Sandia Testing New Intrusion Detection Tool That Mimics Human Brain
Neuromorphic Data Microscope can spot malicious patterns in network traffic 100 times faster than current tool, lab claims.
Google Slams Symantec for 'Failures' in SSL/TLS Certificate Process
Google Chrome engineers railed on Symantec for allegedly issuing thousands of security certificates that had not been properly validated.
Prioritizing Threats: Why Most Companies Get It Wrong
To stay safer, focus on multiple-threat attack chains rather than on individual threats.
America's JobLink Suffers Security Breach
A third-party hacker exploited a flaw in America's JobLink application code to access the information of job seekers from 10 states.
US Senate Overturns Obama Consumer Privacy Rule
The FCC regulation, passed in October, was rejected in a 50-to-48 vote and is now in the House of Representatives.
MORE NEWS & COMMENTARY
HOT TOPICS
Future of the SIEM
Current SIEM systems have flaws. Here's how the SIEM's role will change as mobile, cloud, and IoT continue to grow.

New Wave of Security Acquisitions Signals Start of Consolidation Trend
A dozen recent high-profile deals reflect cybersecurity vendors' hopes of expanding their offerings with next-generation technology, ideas, and talent.

MORE
EDITORS' CHOICE

7 Steps to Transforming Yourself into a DevSecOps Rockstar
Security practitioners at one education software firm offer lessons learned from merging DevOps with security.
Tech Resources
ACCESS TECH LIBRARY NOW

  • NGES (Next Gen Endpoint Security): Tips & Key Considerations for Evaluating Solutions

    Next generation endpoint security (NGES) is one of the hottest topics in today's cybersecurity market, and for good reason. Traditional preventative measures alone offer insufficient endpoint protection - causing an influx of vendors offering NGES. While the market is relatively ...

  • IT Careers 3.0: What You Need to Get Ahead

    In the early years of tech, hard skills were all you needed. Over the last decade, the emphasis shifted to include soft skills such as communication, writing, time management, and collaboration. Today's employers want all of that, plus a working ...

MORE WEBINARS

Partner Perspectives

Malware Explained: Packer, Crypter & Protector
These three techniques can protect malware from analysis. Here's how they work.

7 Things You Need to Know about Bayesian Spam Filtering
Knowing how spam filters work can clarify how some messages get through, and how your own emails can avoid being caught.

4 Ways to Recover from a Cyberattack
Be prepared and act quickly are two key steps that will help you bounce back quickly from a cyberattack.

FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.