Follow Dark Reading:
 April 05, 2016
LATEST SECURITY NEWS & COMMENTARY
Cyber Insurance Rates Drop With Decrease In Big Data Breaches
Insurers cut cyber insurance rates during the first quarter of 2016 as high-profile hacks subsided, Reuters reports.
CAs Needs To Force Rules Around Trust
Google Symantec flap reveals worrisome weakness in the CA system.
Panama Papers Leak Exposes Tax Evasion -- And Poor Data Security, Data Integrity Practices
Whether an insider leak or an outsider hack, an exposure of 11.5 million documents definitely falls under the infosec umbrella.
Hacker 'Guccifer' Extradited To US
Romanian man accused of breaching several high-profile online accounts including two former US presidents faces multiple hacking charges.
A Day In The Life Of A Security Analyst
'The network doesn't lie' and host detection systems are also key tools for the analyst.
MORE NEWS & COMMENTARY
HOT TOPICS
Ransomware Authors Break New Ground With Petya
Instead of encrypting files on disk, Petya goes for the jugular by encrypting the entire disk instead, says F-Secure.

Avoiding Legal Landmines in Data Breach Response
Building a legally defensible cybersecurity program means seeking out guidance from legal advisors before a serious incident forces you together.

Name That Toon: It's A Dog's Life

We provide the cartoon. You write the caption. Win an Amazon Gift Card.

MORE
EDITORS' CHOICE

Machine Learning In Security: Good & Bad News About Signatures
Why security teams that rely solely on signature-based detection are overwhelmed by a high number of alerts.
Machine Learning In Security: Seeing the Nth Dimension in Signatures
How adding "supervised" machine learning to the development of n-dimensional signature engines is moving the detection odds back to the defender.
Tech Resources
ACCESS TECH LIBRARY NOW

MORE WEBINARS

Partner Perspectives

Knowledge Gap Series: 3 Steps To Deal With The High Turnover In Your Security Department
Follow these suggestions to significantly decrease the probability that your organization is a future security headline.

When It Comes To Cyberthreat Intelligence, Sharing Is Caring
Shared cyberthreat intelligence will soon be a critical component of security operations, enabling organizations to better protect their digital assets and respond more quickly to emerging threats.

Iranian Hacker Indictment Reminds Us That Risks To Critical Infrastructure Are Real
Defending against the combination of human and technical exploits requires the collaboration of human and technical security defenses.

FEATURED REPORTS
  • Time to Reconsider Enterprise Email Strategy

    As we pull out of a difficult time in our nation's financial history, government agencies struggle to meet information technology demands. Agencies must focus on the cloud and a strong information governance program to avoid the sort of attention recently ...

  • 2014 IT Skills Crunch Survey 2014 IT Skills Crunch Survey

    Tech employers say good people are hard to find. Job hunters see a broken hiring process. Both sides need to shake their ­frustration and find new ways to connect.

MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.