Follow Dark Reading:
 December 19, 2016
LATEST SECURITY NEWS & COMMENTARY
Financial Data Worth Millions Unwittingly Exposed In Ameriprise Accounts
Leak of bank account and financial planning details emanated from a financial advisor's unsecured Internet-connected backup drive at home.
US Charges 3 Romanians With Cyber Fraud Involving $4 Million
Defendants extradited to US for alleged conspiracy that infected 60,000 computers and sent 11 million malicious emails.
Microsoft To Block Flash In Edge Browser For Security, Speed
Microsoft will block Adobe Flash by default in its Edge browser, following similar announcements from Google, Apple, and Mozilla.
Has The Security Industry Failed Its Customers?
Short answer: Not really. But the odds of staying safe from a cyberattack go way up when you follow these six tips for security hygiene.
MORE NEWS & COMMENTARY
HOT TOPICS
Real-World Fallout From The Cybersecurity Skills Gap
Two new studies connect the dots between an organization's lack of staffing and skills to its ability to fend off cyberattacks.

The Coolest Hacks Of 2016
No 400-pound hacker here: Lightbulb and 'do-gooder' worms, machines replacing humans to hack other machines, and high-speed car hacking were among the most innovative white-hat hacks this year.

Microsoft Execs: Identity, Threat Intelligence Driving Company's Security Strategy
One year after Microsoft announced its $1B investment into a holistic cybersecurity strategy, executives discuss how their plans unfolded and what's on the agenda for 2017.

MORE
EDITORS' CHOICE

8 Most Hackable Holiday Gifts, 2016 Edition
You better watch out! Otherwise, you may be giving the gift of malware or unauthorized access to networks and devices.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Can You Trust Your Data?

    In the aftermath of a US presidential election in which all major polls failed to predict the outcome -- the election of Donald J. Trump over Hillary Clinton -- plenty of people are wondering what happened. Can they trust data ...

  • [Security] Dramatically Improve Your Security Response Program with Automation

    Automation in Security. Most enterprises talk about it - but are they really doing it? And if so, where does good automation end? Tools that enable automatic blocking or isolate a compromised system can inadvertently take down critical business applications. ...

MORE WEBINARS

Partner Perspectives

Are Unconscious Biases Weakening Your Security Posture?
Proactively addressing your biases can help you build a resilient and adaptable security foundation.

It's Time For Organizations To Automate Security
Security automation makes more efficient use of scarce security resources, freeing them up for more proactive tasks.

Security In 2017: Ransomware Will Remain King
Businesses, consumers, and security professionals must face this reality and take the necessary steps to educate each other and protect their networks.

FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.