Follow Dark Reading:
 June 27, 2017
LATEST SECURITY NEWS & COMMENTARY
FBI Highlights BEC, Tech Support Scams, Ransomware Concerns
The 2016 Internet Crime Report found tech support fraud, business email compromise, and ransomware were major fraud categories last year.
Look, But Don't Touch: One Key to Better ICS Security
Better visibility is essential to improving the cybersecurity of industrial control systems and critical infrastructure, but the OT-IT cultural divide must be united.
Anthem Agrees to $115 Million Settlement for 2015 Breach
If approved, it will dwarf settlements paid by Target, Home Depot, and Ashley Madison.
Recovering from Bad Decisions in the Cloud
The cloud makes it much easier to make changes to security controls than in traditional networks.
MORE NEWS & COMMENTARY
HOT TOPICS
8 Hot Hacking Tools to Come out of Black Hat USA
High-impact tools for white hats that will be revealed and released next month at Black Hat USA in Las Vegas.

WannaCry Forces Honda to Take Production Plant Offline
Work on over 1,000 vehicles affected at automaker's Sayama plant in Japan while systems were restored.

KPMG: Cybersecurity Has Reached a 'Tipping Point' from Tech to CEO Business Issue
Still, a majority of US-based chief execs say they will be maintaining and not investing in security technology over the next three years, a recent study shows.

MORE
EDITORS' CHOICE

Threat Intelligence Sharing: The New Normal?
The spirit of cooperation seems to be taking hold as demonstrated by the growing number of thriving services and organizations whose sole purpose is to analyze specific threats against specific communities.
Tech Resources
ACCESS TECH LIBRARY NOW

  • How Cloud Can Streamline Business Workflow

    In order to optimize your utilization of cloud computing, you need to be able to deliver reliable and scalable high performing application over your corporate network. Your business counterparts will expect you to provide network performance that can handle all ...

  • Securing Your Endpoints from Ransomware & Other Trending Attacks

    Attackers have shifted their tactics. They've discovered new ways to re-engineer tactics to make them easier to execute, more evasive, and more likely to deceive targeted users. Combined with targeting platforms that organizations falsely consider more secure, these sophisticated attacks, ...

MORE WEBINARS

Partner Perspectives

Talking Cyber-Risk with Executives
Explaining risk can be difficult since CISOs and execs don't speak the same language. The key is to tailor your message for the audience.

Cloud Security & the Power of Shared Responsibility
When you and your CSP jointly embrace the shared security responsibility model you can achieve greater success than you or your provider can achieve alone.

Cyber Insurance: Read the Fine Print!
Applying for insurance is a grueling process involving detailed questionnaires and lengthy technical interviews that can still leave you without an adequate safety net.

FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.