Follow Dark Reading:
 February 06, 2017
LATEST SECURITY NEWS & COMMENTARY
Fight Back Against Ransomware
The No More Ransom project helps those affected by ransomware and works to prevent the problem's spread.
InterContinental Confirms Security Breach At 12 US Hotels
Investigation reveals payment cards of customers were compromised between August and December.
Windows SMB Zero-Day Exploit On The Loose
Vulnerability allows remote attackers to trigger denial-of-service conditions on several Windows client versions.
Talking Cybersecurity From A Risk Management Point of View
CenturyLink CSO David Mahon reflects on the evolution of the chief information security officer and why today's CISOs are increasingly adopting a risk-based approach to security.
How to Handle Threats When Short-Staffed
Skybox's Michelle Cobb, VP of Worldwide Marketing, explains how automation and advanced analytics can give security teams the data they need when their teams are stretched
MORE NEWS & COMMENTARY
HOT TOPICS
10 Essential Elements For Your Incident-Response Plan
The middle of a DDoS attack or ransomware infection is hardly the time to start talking about divisions of labor, or who should do what when.

Businesses Fear Brand Damage More Than Security Breaches
Organizations struggling with risk management are more concerned about brand damage than cyberattacks, new Ponemon study shows.

A New Mantra For Cybersecurity: 'Simulate, Simulate, Simulate!'
What security teams can learn from the Apollo 13 space program, a global pandemic, and major infrastructure disruptions to identify their best responses to attacks.

MORE
SECURITY SPENDING SURVEY

Share Your Thoughts On IT Security

Take our confidential survey about IT security and enter a contest to win an iPad Air 2. Results will be published on Dark Reading and Information Week.


Tech Resources
ACCESS TECH LIBRARY NOW

MORE WEBINARS

Partner Perspectives

Outsider Attacks Give Nightmares To CIOs, CEOs, CISOs
Three main threats companies aren't prepared to handle include outside attacks, data vulnerability and insider sabotage.

Meet 'Fruitfly:' Mac Malware Targeting Biomedical Research Centers
This newly discovered code contains indications that it has been circulating undetected for at least a couple years.

Machine Learning In Cybersecurity Warrants A Silver Shotgun Shell Approach
When protecting physical or virtual endpoints, it's vital to have more than one layer of defense against malware.

FEATURED REPORTS
  • [Secure Application Development] New Best Practices

    The transition from DevOps to SecDevOps is combining with the move toward cloud computing to create new challenges - and new opportunities - for the information security team. Download this report, to learn about the new best practices for secure ...

  • How Enterprises Are Attacking the IT Security Enterprise Challenge

    Information Security professionals have been making hard choices on the fly for some time, but the unrelenting nature of attacks and threats to users have raised the stakes. To learn more about what organizations are doing to tackle these threats ...

MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.