Follow Dark Reading:
 October 20, 2016
LATEST SECURITY NEWS & COMMENTARY
CIO-CISO Relationship Continues To Evolve
The CISO has traditionally reported to the CIO, but this is changing as security becomes more important. How will this change their relationship, and how can they better work together?
Malvertising Trends: Don't Talk Ad Standards Without Ad Security
How malvertising marries the strengths and weaknesses of the complex digital advertising ecosystem perfectly - and what online publishers and security leaders need to do about it.
Alleged Hacker Behind 2012 LinkedIn Breach Nabbed In Prague
Czech judge to decide on US extradition request.
Muddy Waters Releases New Info About St. Jude Medical Device Flaws
Muddy Waters Capital, the short seller that teamed with security researchers at MedSec, posted the videos on a new site it launched: profitsoverpatients.com.
Smart Cities Have No Cybersecurity, Say 98% Of Government IT Pros
Tripwire research indicates smart grids and transportation among the services most exposed to cyberattack risks.
St. Jude Medical Plans Cybersecurity Advisory Panel
The medical device maker says committee will work with tech experts and external researchers on issues affecting patient care and safety.
MORE NEWS & COMMENTARY
HOT TOPICS
How To Become A Cybersecurity Entrepreneur In A Crowded Market
If you want to build the next great cybersecurity startup, use your expertise, then follow these three simple suggestions.

Identity Theft Hits Low- To Moderate-Income Victims Hardest
In addition to government assistance, ID theft victims frequently seek financial support from friends, family, and faith-based organizations, according to a study by the Identity Theft Resource Center.

Thousands Of Secure Websites Dubbed Insecure Due To Cert Error
A certificate revocation exercise gone awry At GlobalSign is browsers to mistakenly treat many sites as insecure. For some users, the problem could take up to four days to resolve.

MORE
EDITORS' CHOICE

7 Regional Hotbeds For Cybersecurity Innovation
These regions are driving cybersecurity innovation across the US with an abundance of tech talent, educational institutions, accelerators, incubators, and startup activity.
Tech Resources
ACCESS TECH LIBRARY NOW

  • [IoT] How We Can Build Smarter Cities

    Cities are central to our lives. More than half of the global population now lives in and around cities and the percentage - the congestion - will only continue to grow. Governments have to rethink how they do business in ...

  • Live Demo: Office 365 Provisioning Deep Dive

    Since the release of Office 365 five years ago, many of the "easy" Office 365 migrations have been completed. Customers migrating to Office 365 now have much more complex requirements, such as having to work around unique user access and governance challenges that ...

MORE WEBINARS

Partner Perspectives

Access, Trust, And The Rise Of Electronic Personal Assistants
App and device makers are working hard to deliver user control over privacy.

Cybersecurity Economics In Government -- Is Funding The Real Problem?
Government leadership and those chartered with creating budgets could benefit from applying sound value-management practices when considering the cybersecurity budget process.

Cyber-Anything-As-A-Service: Should The Government Just Outsource Everything?
Agencies should be able to select and provision from a variety of cybersecurity services and capabilities to improve their overall effectiveness and efficiency.

FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.