Follow Dark Reading:
 November 16, 2016
LATEST SECURITY NEWS & COMMENTARY
Dark Reading Radio: 'Bug Bounties & The Zero-Day Trade'
Join us, HackerOne's Alex Rice, and Veracode's Chris Wysopal for the next episode of Dark Reading Radio, today, Wednesday Nov. 16, at 1pmET.
Firmware Secretly Sent Text, Call Data On Android Users To China
Several Android models sold in the US likely impacted, says Kryptowire
More Than Half Of Android Devices Run Outdated Browsers
Researchers discovered 59% of Android devices run out-of-date Chrome browsers, increasing enterprise exposure to hackers.
Back To Basics: Maximizing Cybersecurity Capabilities
A number of prevention techniques that have existed for years remain fundamental components of any modern security program.
Symantec Study Shows Consumers Suffer From Security Overload
New survey finds that consumers are overwhelmed by the need to protect their devices from cybercriminals.
TAG Unveils Anti-Malware Certification For Online Ad Industry
As the ad industry continues its fight against malware, the Trustworthy Accountability Group launches a threat-sharing hub to provide intelligence on attacks.
MORE NEWS & COMMENTARY
HOT TOPICS
Learning To Trust Cloud Security
Cloud-centric computing is inevitable, so you need to face your concerns and be realistic about risks.

Security Metrics Checklist
Which metrics are the best indicators of a strong cybersecurity team? Experts say security pros should be recording and reporting these data points to demonstrate their success.

MORE
EDITORS' CHOICE

The 7 Most Significant Government Data Breaches
Mega compromises at federal and state agencies over the past three years has compromised everything from personal data on millions to national security secrets.
ICYMI

Re-Thinking Your Enterprise Security Strategy

The archives of all the virtual event keynotes and panels from Tuesday are now available for on-demand viewing.


Tech Resources
ACCESS TECH LIBRARY NOW

  • Containerized Apps - Changing Security

    With continuous deployment of micro-services and Docker containers becoming mainstream, it's imperative that security initiatives include security scanning and monitoring. Increasingly, known open source vulnerabilities have been the "way in" for attackers. This is a major concern for organizations worldwide ...

  • [Office 365] Simplifying Security & Management

    If your organization is moving to Office 365, you're facing the challenge of dealing with identity management and end users accessing Office applications and corporate data from potentially insecure devices. These challenges can be managed, register for this webinar and find ...

MORE WEBINARS

Partner Perspectives

8 Ways Businesses Can Better Secure Their Remote Workers
Remote workers may present challenges for IT staff, but a combination of cybersecurity best practices, strong policy, and a dedicated user awareness campaign could keep company data safe.

Every Minute Of Security Planning Will Save You 10 Minutes In Execution
Leveraging automation, orchestration, and interoperability in your cybersecurity plans now will save you significant time later.

Ransomware Doesn't Have To Mean Game Over
3 methods can help you recover from a ransomware attack relatively unscathed.

FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.