Follow Dark Reading:
 September 26, 2017
LATEST SECURITY NEWS & COMMENTARY
Breach at Deloitte Exposes Emails, Client Data
Intrusion may have resulted from company's failure to properly secure a key administrator account.
After DHS Notice, 21 States Reveal They Were Targeted During Election
Election officials in swing states Florida, Ohio, and Pennsylvania among those who report Russian state-sponsored attackers targeted their systems.
Microsoft Builds Automation into Windows Defender ATP
Automation can help manage and respond to alert overflow, but will come with its own specific set of challenges.
PassGAN: Password Cracking Using Machine Learning
Researchers demo how deep neural networks can be trained to generate passwords better than the best password-cracking tools.
Privacy Shield Framework Gains Popularity in EU, US: Report
The IAPP-EY Privacy Governance Survey shows marked interest in the Privacy Shield framework to transfer personal data.
MORE NEWS & COMMENTARY
HOT TOPICS
1.9 Billion Data Records Exposed in First Half of 2017
Every second, 122 records are exposed in breaches around the globe, a new report shows. And that's doesn't even include the new Equifax breach data.

10 Hot Cybersecurity Funding Rounds in Q3
The first two quarters of 2017 have been the most active ever in five years from a cybersecurity investment standpoint. Here's how the third quarter has shaped up.

CCleaner Malware Targeted Tech Giants Cisco, Google, Microsoft
The backdoor discovered in Avast's CCleaner targeted top tech companies including Google, Microsoft, Samsung, Sony, VMware, and Cisco.

MORE
EDITOR CHOICE

10 Security Product Flaw Scares
CCleaner compromise puts the crown on several years' worth of headlines about cybersecurity product weaknesses.
Tech Resources
ACCESS TECH LIBRARY NOW

MORE WEBINARS

Partner Perspectives

Where Do Security Vulnerabilities Come From?
There are three major causes: code quality, complexity, and trusted data inputs.

Artificial Intelligence: Getting the Results You Want
Finding a vendor that doesn't claim to do AI is hard these days. But getting the benefits you need and expect is even harder.

The Hunt for IoT: The Rise of Thingbots
Across all of our research, every indication is that today's "thingbots" - botnets built exclusively from Internet of Things devices - will become the infrastructure for a future Darknet.

FEATURED REPORTS
  • [Security Breach Report] Overall Impact of & Steps to Prevent Breaches

    Despite the escalation of cybersecurity staffing and technology, enterprises continue to suffer data breaches and compromises at an alarming rate. How do these breaches occur? How are enterprises responding, and what is the impact of these compromises on the business? ...

  • [Security] Budgets, Plans & Priorities

    Enterprises are spending an unprecedented amount of money on IT security -- where does it all go? In this survey, Dark Reading polled senior IT management on security budgets and spending plans, and their priorities for the coming year. Download ...

MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.