Follow Dark Reading:
 September 30, 2017
LATEST SECURITY NEWS & COMMENTARY
Best and Worst Security Functions to Outsource
Which security functions are best handled by third parties, and which should be kept in-house? Experts weigh in.
Analyzing Cybersecurity's Fractured Educational Ecosystem
We have surprisingly little data on how to evaluate infosec job candidates academic qualifications. That needs to change.
CISOs Offer Soup-to-Nuts C-Suite Strategy
Chief information security officers from Dell, RCB Bank and other organizations share what it takes to become a security exec, sit in the C-Suite, and keep the job.
Apple Mac Models Vulnerable to Targeted Attacks
Several updated Mac models don't receive EFI security fixes, putting machines at risk for targeted cyberattacks.
Apple Shares More Data with US in First Half of 2017
Device-based data requests from government agencies dropped in the first half over last year, but Apple fulfilled a higher percentage of those requests, according to its transparency report.
Whole Foods Reports Credit Card Breach
The breach affects customers of certain Whole Foods taprooms and table-service restaurants.
MORE NEWS & COMMENTARY
HOT TOPICS
10 Security Product Flaw Scares
CCleaner compromise puts the crown on several years' worth of headlines about cybersecurity product weaknesses.

New Locky Ransomware Phishing Attacks Beat Machine Learning Tools
Late September attacks highlight the persistent nature of ransomware threats, Comodo says.

Breach at Deloitte Exposes Emails, Client Data
Intrusion may have resulted from company's failure to properly secure a key administrator account.

MORE
IN CASE YOU MISSED IT

7 SIEM Situations That Can Sack Security Teams
SIEMS are considered an important tool for incident response, yet a large swath of users find seven major problems when working with SIEMs.
Tech Resources

Partner Perspectives

TrickBot Rapidly Expands its Targets in August
TrickBot shifted its focus to U.S banks and credit card companies, soaring past the 1,000 target URL mark in a single configuration.

Where Do Security Vulnerabilities Come From?
There are three major causes: code quality, complexity, and trusted data inputs.

Artificial Intelligence: Getting the Results You Want
Finding a vendor that doesn't claim to do AI is hard these days. But getting the benefits you need and expect is even harder.

FEATURED REPORTS
  • [Security] Budgets, Plans & Priorities

    Enterprises are spending an unprecedented amount of money on IT security -- where does it all go? In this survey, Dark Reading polled senior IT management on security budgets and spending plans, and their priorities for the coming year. Download ...

  • Surviving the IT Security Skills Shortage

    Cybersecurity professionals are in high demand -- and short supply. Find out what Dark Reading discovered during their 2017 Security Staffing Survey and get some strategies for getting through the drought. Download the report today!

MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.