Follow Dark Reading:
 March 23, 2016
LATEST SECURITY NEWS & COMMENTARY
FBI's Claim It Can Access iPhone Without Apple's Help Prompts Questions
In a surprise development, feds say they may have found another way to access the iPhone recovered from a San Bernardino terror suspect.
Here Are 4 Vulnerabilities Ransomware Attacks Are Exploiting Now
A zero-day exploit exposed in the Hacking Team breach is among the top weapons deployed in recent ransomware attacks, as well as lots of Flash.
Vuln Disclosure: Why Security Vendors & Researchers Don't Trust Each Other
The security industry doesn't need a one-size-fits all vulnerability disclosure policy. It needs a culture change. Getting everyone to the table is the first step.
QUICK HITS

Sextortion, Hacking, Gets Former State Dept. Employee 57 Months In Prison
Embassy worker targeted young women and started campaign with phishing, social engineering.
Cybersecurity Expert Assisting With Bangladesh Bank Heist Probe Goes Missing
A cybersecurity expert was reportedly abducted last week, according to his family, after commenting on an attempted cyberattack of $951 million from Bangladesh's central bank.
Thycotic Offers Free Privileged Account Security Software
Secret Server Free tool available now.
MORE NEWS & COMMENTARY
HOT TOPICS
Lessons From The Ukraine Electric Grid Hack
New SANS analysis on how the attackers broke in and took control of the industrial control systems at three regional power firms in the Ukraine and shut off the lights.

Tell DR: What Are Your Biggest Unanswered Security Questions?
Fill us in, Dark Reading community. What challenges and mysteries leave you scratching your heads and throwing up your hands?

No Place For Tor In The Secured Workplace
When it comes to corporate security, anonymity does not necessarily ensure protection of one's private information - nor that of your employer.

MORE
SPOTLIGHT ON CLOUD SECURITY

Cloud Security: Understanding New Risks, Rising To New Challenges
In a business world dominated by the cloud, security ops has to change the way we play the game in order to accomplish our strategic goals.
Tech Resources
ACCESS TECH LIBRARY NOW

MORE WEBINARS

Partner Perspectives

Who Took The Cookies From The Cookie Jar?
The indictment of five Iranian hackers three years after the fact raises the question: Is naming them a worthwhile part of the threat defense lifecycle, or is it a meaningless distraction?

Data In The Cloud: What Everyone Should Know
When vetting a cloud or SaaS provider, it is imperative that you find out how they handle data security and privacy. Here are some key questions to ask.

Knowledge Gap Series: The Myths Of Analytics
It may not be rocket science, but it is data science.

FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.