Follow Dark Reading:
 November 30, 2017
LATEST SECURITY NEWS & COMMENTARY
First US Federal CISO Shares Security Lessons Learned
Greg Touhill's advice for security leaders includes knowing the value of information, hardening their workforce, and prioritizing security by design.
Big Apple Flaw Allows Root Access to Macs without Password
Vulnerability affects machines running High Sierra operating system.
Why Security Depends on Usability -- and How to Achieve Both
Any initiative that reduces usability will have consequences that make security less effective.
Samsung's Mobile Device Bug Bounty Program Gets a Boost
Samsung Electronics partners with Bugcrowd to deliver timely payments for its Mobile Security Rewards Program.
MORE NEWS & COMMENTARY
HOT TOPICS
8 Low or No-Cost Sources of Threat Intelligence
Here's a list of sites that for little or no cost give you plenty of ideas for where to find first-rate threat intelligence.

6 Real Black Friday Phishing Lures
As the mega-shopping day approaches, here's a look at six examples of phishing attacks - and ways to avoid taking the bait.

3 Pillars of Cyberthreat Intelligence
Strong enterprise cybersecurity programs must be a built on a framework that incorporates strategic, operational, and tactical leadership and goals.

MORE
IN CASE YOU MISSED IT

(Sponsored Article) 3 Ways your Phishing Defense Can Be like the Marines
To lower the security threat, organizations must choose the right battles. These best practices will show you how.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Fearless & Secure Cloud Migration

    In this webinar, learn how to make a safe, secure migration to the cloud, that both manages risks and takes advantage of all the security benefits. Also, learn how other security pros are approaching their cloud security efforts.

  • Cloud Security: Don't Go Blind While Playing in the Cloud

    Attend this webinar to understand the security transformation from an on-prem fortress mentality to federated cloud services functioning outside your traditional zone of control.

MORE WEBINARS

Partner Perspectives

'Reaper': The Professional Bot Herder's Thingbot
Is it malicious? So far it's hard to tell. For now it's a giant blinking red light in security researchers faces warning us that we'd better figure out how to secure the Internet of Things.

'Goldilocks' Legislation Aims to Clean up IoT Security
The proposed Internet of Things Cybersecurity Improvement Act of 2017 is not too hard, not too soft, and might be just right.

5 Reasons CISOs Should Keep an Open Mind about Cryptocurrency
With untold new markets for Bitcoin and other 'alt-coins,' it's going to be an exciting future -- and security leaders need to get ready for it.

FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.