Follow Dark Reading:
 January 30, 2017
LATEST SECURITY NEWS & COMMENTARY
Are Security Concerns Over Trump's Android, Twitter Use Overblown?
Security experts say it's hard to know for sure without further details.
Rethinking Vulnerability Disclosures In Industrial Control Systems
Why the security industry's traditional obsession and hype around vulnerabilities cannot be transferred to the ICS environment.
Appeals Court Upholds Microsoft Victory In Overseas Data Case
Dissenting judges seek revision of earlier ruling, saying it does not serve any privacy interest.
Car Cybersecurity Center Of New Bipartisan Bill
House of Representatives' SPY Car Study Act aimed at setting cybersecurity standards for new vehicles.
MORE NEWS & COMMENTARY
HOT TOPICS
How I Would Hack Your Network (If I Woke Up Evil)
How would an attacker target your company? Here's a first-person account of what might happen.

Kaspersky Lab Incident Investigations Head Arrested In Russia For 'Treason'
Security firm says the case doesn't affect its computer incidents investigation operations.

SOC Maturity By The Numbers
Most large organizations today have security operations centers in play, but only 15% rate theirs as mature.

MORE
EDITORS' CHOICE

7 Tips For Getting Your Security Budget Approved
How to have a productive conversation with business leaders and get your security budget approved.
Tech Resources
ACCESS TECH LIBRARY NOW

  • [Cybersecurity] Dark Reading Virtual Event

    How much should your organization spend on information security? What's the potential cost of a major hack or data breach? What's the risk that your enterprise will be hit by a cyberattack? How can you measure the benefits of your ...

  • [Analytics] Make the Most of Your Data's Potential in 2017

    Are you tapping into all of your data's potential? According to a comprehensive report from McKinsey Global Institute (MGI), though many organizations have increased the value they get from their analytics programs, there's still plenty that remains untapped. And the ...

MORE WEBINARS

Partner Perspectives

Meet 'Fruitfly:' Mac Malware Targeting Biomedical Research Centers
This newly discovered code contains indications that it has been circulating undetected for at least a couple years.

Machine Learning In Cybersecurity Warrants A Silver Shotgun Shell Approach
When protecting physical or virtual endpoints, it's vital to have more than one layer of defense against malware.

What to Consider When Moving To Hyperconverged Infrastructure
Scalability, data availability, and agility are three reasons why enterprises are making the move to HCI.

FEATURED REPORTS
  • The Top Cybersecurity Risks & How Enterprises Are Responding

    The information security landscape is a constantly shifting risk environment. Today's IT security department must manage both internal and external threats' ranging from malware to mobile device vulnerabilities, to cloud security and ransomware. Download the Dark Reading 2016 Strategic Security Survey ...

  • How Enterprises Are Attacking the IT Security Enterprise Challenge

    Information Security professionals have been making hard choices on the fly for some time, but the unrelenting nature of attacks and threats to users have raised the stakes. To learn more about what organizations are doing to tackle these threats ...

MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.