Follow Dark Reading:
 October 01, 2016
LATEST SECURITY NEWS & COMMENTARY
Cybercriminals' Superior Business Savvy Keeps Them Ahead
Rick Holland of Digital Shadows explains how the attackers' superior business agility, faster change management, specialized job force, lower barriers to entry and bulletproof hosting keeps them ahead of the good guys.
6 Ways To Prepare For The EU's GDPR
In less than 20 months, all US companies doing business in the EU will face new consumer privacy requirements. Here's how to prepare for them.
Today's Cybersecurity Management Requires A New Approach
The current managed security services provider model just doesn't work in our information-rich world. Time to shake things up.
Cybercrime-as-a-Service Offered To Militants, Terrorists, Says Europol
The Darknet could provide ample resources and services for terrorists to carry out attacks, claims report.
Romanian National Gets Three Years For Hack Scheme
Mircea-Ilie Ispasoiu was arrested for international hacking plot that involved wire fraud and aggravated identity theft.
MORE NEWS & COMMENTARY
HOT TOPICS
Hacking The Polls: Where US Voting Processes Fall Short
The patchwork of 50 decentralized state electoral systems threatens to disrupt our national election through ransomware attacks, hijacked voter registration rolls, and altered voting results.

The Real Reasons Why Users Stink At Passwords
Personality, denial, and authentication-overload are big factors, new study finds.

MORE
FEATURED VIDEO FROM DARK READING NEWS DESK AT BLACK HAT


Look The Other Way: DDoS Attacks As Diversions
Black Hat News Desk talks to Joe Loveless of Neustar.

EDITORS' CHOICE

10 Hottest Sessions At Black Hat Europe 2016
A sneak-peek at some of the more intriguing Briefings at the upcoming conference in London.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Identify & Remediate Vulnerabilities Hiding In Your Applications

    Fixing vulnerabilities isn't just a job for your in-house development team and the giants of Silicon Valley. It's a job for all the developers of the third-party software components embedded in countless applications and services - from open-source, to commercial ...

  • How Bad Breaches Happen to Good Companies

    In this comprehensive webcast, top security experts will join with Dark Reading editors to discuss how breaches begin - and what you can do to stop them. You'll get a look at new Dark Reading research that reveals the latest ...

MORE WEBINARS

Partner Perspectives

'Beep' Prepared: How Security Economics Can Help The Coyote Catch The Roadrunner
The practice of security economics demonstrates how gaps in the security architecture impair business results.

Sharing Cybersecurity Threat Intelligence Is The Only Way We Win
Security organizations must leverage each other's information in order to better predict, prevent, detect, and respond to threats their customers and organizations face.

Ransomware: Coming To A Hospital Near You?
10 ways to protect healthcare systems from ransomware and other malware infections.

FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.