Follow Dark Reading:
 December 28, 2016
LATEST SECURITY NEWS & COMMENTARY
Fileless Malware Takes 2016 By Storm
In-memory attacks are all the rage, creating a growing class of "non-malware."
8 Boldest Security Predictions For 2017
Scary, funny and maybe even a little outlandish, these industry predictions come from prognosticators who didn't mince words.
Greatest Hits Of 2016: Readers' Picks For The Years' Best Commentary
Here's what topped the Dark Reading page-view charts from the security industry's brightest minds, coolest rock stars, and up-and-coming leaders.
Lithuania Charges Russia With Hacking Government Network
Spyware found in computers was allegedly transferring documents and passwords to Russian spy agency address.
Year 2016 Sees Record Deployment Of HTTPS By Firefox, Chrome
More than half of Web pages loaded by the browsers guarantee protection to visitors.
MORE NEWS & COMMENTARY
HOT TOPICS
More Than 50% Of Biggest Holiday Retailers May Not Be PCI-Compliant
SecurityScorecard warns while the industry has made progress, many are still not covering the basics of security.

Major Cyberattacks On Healthcare Grew 63% In 2016
US hospitals lack new technologies and best practices to defend against threats, new report says.

MORE
Explained: Domain-Generating Algorithms
Cybercriminals use domain-generating algorithms to prevent their servers from being blacklisted or taken down.
Malware Used In DNC Breach Found Tracking Ukraine Military
Russian 'Fancy Bear' now tied to Ukraine artillery Android app hack with the same malware used in breach of the Democratic National Committee.
How To Find, Hire The Next-Gen CISO
Joyce Brocaglia of Alta Associates and the Executive Women's Forum talks about how to identify the perfect leader for your cybersecurity team, even if "security" isn't on their resume.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Strengthen Your Security With Threat Analysis

    In the past, security response teams and security operations centers (SOCs) have focused most of their effort on reacting to new attacks and compromises. But as threat intelligence becomes more sophisticated and "threat hunting" becomes a more common tool in ...

  • The Impact of a Data Breach

    To understand the cyber risk your organization faces, you need to understand the likelihood of a breach - and its potential cost. In this session, a top expert discusses the many - and sometimes hidden - costs of a data ...

MORE WEBINARS

Partner Perspectives

A Cybersecurity Christmas Story
Automation and orchestration will be essential components of security in 2017.

Explained: Domain-Generating Algorithms
Cybercriminals use domain-generating algorithms to prevent their servers from being blacklisted or taken down.

Investments In Security Operations Centers Are Paying Off, Study Finds
SOCs help organizations reduce security incidents and improve operational maturity.

FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
BIO-key Debuts Wearable Fingerprint Reader for New Devices At CES
BIO-key to show wearable fingerprint reader for Windows, Micro USB Fingerprint Reader for Android and Biometric Padlocks
SECDO Completes $10M Funding to Revolutionize Security Incident Response
Investment was led by the Rafael Development Corporation (RDC) and Check Point Co-founder & Chairman Marius Nacht
MORE PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.