Follow Dark Reading:
 November 18, 2016
LATEST SECURITY NEWS & COMMENTARY
Cloud-driven IT Decentralization Increases Security Risk
IT management has become increasingly decentralized, which many businesses think is causing more harm than good - especially for security, a new study says.
Insider Threat: The Domestic Cyber Terrorist
It is dangerously naive for business and government leaders to dismiss the risk of radicalized privileged users inside our critical industries.
As Deadline Looms, 35 Percent Of Web Sites Still Rely On SHA-1
Over 60 million web sites are relying on a hashing algorithm that will be blocked by major browsers starting Jan 1.
NIST Releases Version of Cybersecurity Framework for Small Businesses
Researchers offer a step-by-step approach for covering the basics of cybersecurity.
Adobe To Pay $1 Million Compensation In Data Breach Case
Personal data of more than 500,000 consumers from 15 states were stolen in the 2013 breach of Adobe server.
'Snoopers' Charter' Set To Become Law In UK
Surveillance bill goes through British Parliament and awaits only the Royal assent to become law before the year ends.
MORE NEWS & COMMENTARY
HOT TOPICS
How To 'PoisonTap' A Locked Computer Using A $5 Raspberry Pi
White hat hacker Samy Kamkar has come up with a way of to hijack Internet traffics from a password-protected computer.

Windows 10 Updates Target Ransomware Threats
Microsoft strengthens Windows 10 security with measures to prevent, detect, and respond to ransomware attacks. But they are only useful for businesses using all the right tools.

The 7 Most Significant Government Data Breaches
Mega compromises at federal and state agencies over the past three years has compromised everything from personal data on millions to national security secrets.

MORE
EDITORS' CHOICE

8 Public Sources Holding 'Private' Information
Personal information used for nefarious purposes can be found all over the web - from genealogy sites to public records and social media.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Containerized Apps - Changing Security

    With continuous deployment of micro-services and Docker containers becoming mainstream, it's imperative that security initiatives include security scanning and monitoring. Increasingly, known open source vulnerabilities have been the "way in" for attackers. This is a major concern for organizations worldwide ...

  • Spearphishing & Targeted Social Engineering Attacks On Your Users

    In this eye-opening webinar, top experts on phishing and social engineering will discuss the motives and methods that attackers use to execute these targeted "spearphishing" attacks. You'll get insight on how the attackers choose their social engineering targets, the methods ...

MORE WEBINARS

Partner Perspectives

Active Defense Framework Can Help Businesses Defend Against Cyberattacks
New report provides a framework that lets private sector entities defend themselves while at the same time protect individual liberties and privacy, and mitigate the risk of collateral damage.

8 Ways Businesses Can Better Secure Their Remote Workers
Remote workers may present challenges for IT staff, but a combination of cybersecurity best practices, strong policy, and a dedicated user awareness campaign could keep company data safe.

Every Minute Of Security Planning Will Save You 10 Minutes In Execution
Leveraging automation, orchestration, and interoperability in your cybersecurity plans now will save you significant time later.

FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.