Follow Dark Reading:
 September 14, 2017
LATEST SECURITY NEWS & COMMENTARY
Experts Weigh Pros, Cons of FaceID Authentication in iPhone X
Security pros discuss Apple's decision to swap fingerprint scanning for facial recognition technology in the latest iPhone.
'Bashware' Undermines Windows 10 Security Via Linux Subsystem
New WSL feature in Windows 10 gives attackers a way to run malware without being detected by any current endpoint security tools, Check Point says.
Why InfoSec Hiring Managers Miss the Oasis in the Desert
Despite a sharp shortage of IT security professionals, a pool of potential talent is swimming below the surface.
Trump Orders Removal of Kaspersky Products from Federal Systems
The president cites concern that the Russia-based company could be influenced by the Kremlin.
5 Problems That Keep CISOs Awake at Night
The last few years have shown a big difference in the way cyber-risks are acknowledged, but progress still needs to be made.
Businesses Fail to Properly Secure, Assess SSH: ISACA
Frequently used but underappreciated, Secure Shell is rarely secured, assessed, documented, or managed in a systematic way, researchers report.
20 Questions to Help Achieve Security Program Goals
There are always projects, maturity improvements, and risk mitigation endeavors on the horizon. Here's how to keep them from drifting into the sunset.
China to Create Data Repository to Log Cyber Attacks
Telcos, government agencies, Internet companies, and domain-name organizations to file cybersecurity information.
MORE NEWS & COMMENTARY
HOT TOPICS
7 Takeaways From The Equifax Data Breach
The exposure of PII belonging to 143 million US consumers raises questions about the continued use of SSNs as identifiers, breach liability and app sec spending.

Why Relaxing Our Password Policies Might Actually Bolster User Safety
Recent guidance from NIST may seem counterintuitive.

If Blockchain Is the Answer, What Is the Security Question?
Like any technology, blockchain has its strengths and weaknesses. But debunking three common myths can help you cut through the hype.

MORE
EDITORS' CHOICE

10 Ways to Prevent Your Mobile Devices From Becoming Bots
Enterprises may not notice a huge impact on their network's bandwidth, but other repercussions may loom in the background.
IN CASE YOU MISSED IT

(Sponsored Article) 'ROPEMAKER:' Behind the Scenes of an Exploit Disclosure
How 'social responsibility' and 'false security' played into the unmasking of a recently disclosed email vulnerability.
Tech Resources

Partner Perspectives

Detection, Prevention & the Single-Vendor Syndrome
Why security teams need to integrate 'Defense in Depth' principles into traditional solutions designed with integration and continuity in mind.

CIO or C-Suite: To Whom Should the CISO Report?
Five reasons why the chief information security officer needs to get out from under the control of IT.

Phishing for Your Information: How Phishers Bait Their Hooks
A treasure trove of PII from social networks and the public Internet is there for the taking.

FEATURED REPORTS
  • [Security] Budgets, Plans & Priorities

    Enterprises are spending an unprecedented amount of money on IT security -- where does it all go? In this survey, Dark Reading polled senior IT management on security budgets and spending plans, and their priorities for the coming year. Download ...

  • Surviving the IT Security Skills Shortage

    Cybersecurity professionals are in high demand -- and short supply. Find out what Dark Reading discovered during their 2017 Security Staffing Survey and get some strategies for getting through the drought. Download the report today!

MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.