Follow Dark Reading:
 October 06, 2016
LATEST SECURITY NEWS & COMMENTARY
FBI Arrests NSA Contractor For Alleged Code Theft
The FBI has arrested a contractor from the National Security Agency for the possible theft of secret codes created to break into foreign government networks.
Yahoo Reportedly Complied With US Intel Request To Search All Customer Emails
Yahoo used secretly designed software to scan incoming emails at the behest of a US intelligence agency, says Reuters report.
Half Of Cybersecurity Pros Solicited Weekly About A New Job
'Sellers' market' for IT security professionals, but more than two-thirds lack a clear career path in the field.
20 Questions To Explore With Security-as-a-Service Providers
This list will help you leverage the niche expertise of security-as-a-service providers, and assess which vendor can best meet your needs
OTA Issues Checklist For Securing IoT Devices
Online Trust Alliance marks National Cybersecurity Awareness Month with measures on how to enhance online safety.
MORE NEWS & COMMENTARY
HOT TOPICS
Today's Cybersecurity Management Requires A New Approach
The current managed security services provider model just doesn't work in our information-rich world. Time to shake things up.

IoT DDoS Attack Code Released
Mirai malware could signal the beginning of new trend in using Internet of Things devices as bots for DDoS attacks.

Decrypting The Dark Web: Patterns Inside Hacker Forum Activity
Data analysis to be presented at Black Hat Europe highlights trends in communication between bad actors who gather in underground forums across the Dark Web.

MORE
EDITORS' CHOICE

16 Innovative Cybersecurity Technologies Of 2016
This year's SINET 16 Innovators were chosen from 82 applicants representing nine countries.
US CYBERSECURITY REPORT CARD

Grading Obama: D- President Failed To Protect Us From The Bad Guys
A barely passing grade from a former special agent in charge of the NYC FBI cybercrimes division for failing to create deterrents and policies that encourage self defense.

Grading Obama: C+ Administration Missed Key Opportunities To Civilize Cyberspace

A middling grade because the President's cyber policy initiatives were reactive, laisse faire, and didn't buttress American economic opportunity.


Tech Resources
ACCESS TECH LIBRARY NOW

  • Identify & Remediate Third-Party Vulnerabilities Hiding In Your Applications

    Fixing vulnerabilities isn't just a job for your in-house development team and the giants of Silicon Valley. It's a job for all the developers of the third-party software components embedded in countless applications and services - from open-source, to commercial ...

  • Detecting and Mitigating Targeted and Sophisticated Attacks

    In the past, most cyber attacks simply exploited the most vulnerable systems. Today, however, there is an increasing number of sophisticated attacks that target specific companies, data, or even employees. These attacks are well-disguised and may escape conventional security defenses. ...

MORE WEBINARS

Partner Perspectives

Cybersecurity Economics In Government -- Is Funding The Real Problem?
Government leadership and those chartered with creating budgets could benefit from applying sound value-management practices when considering the cybersecurity budget process.

Cyber-Anything-As-A-Service: Should The Government Just Outsource Everything?
Agencies should be able to select and provision from a variety of cybersecurity services and capabilities to improve their overall effectiveness and efficiency.

'Beep' Prepared: How Security Economics Can Help The Coyote Catch The Roadrunner
The practice of security economics demonstrates how gaps in the security architecture impair business results.

FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.