Follow Dark Reading:
 February 10, 2017
LATEST SECURITY NEWS & COMMENTARY
Hacking The Penetration Test
Penetration testers rarely get spotted, according to a Rapid7 report analyzing its real-world engagements.
Threat Hunting Becoming Top Of Mind Issue For SOCs
Nearly 80% of the respondents in a LinkedIn poll said that threat hunting already is, or should be a top-level initiative.
4 Signs You, Your Users, Tech Peers & C-Suite All Have 'Security Fatigue'
If security fatigue is the disease we've all got, the question is how do we get over it?
InfoSec Teams Share Keys To CISO Success
Tech expertise and business engagement are critical for CISOs who want to strengthen security but lack authority in their organizations.
Harvest Season: Why Cyberthieves Want Your Compute Power
Attackers are hijacking compute power in order to pull off their other crimes.
AT&T, IBM, Palo Alto Networks, Symantec, Team Up In IoT Security
IoT Cybersecurity Alliance is made up of AT&T, IBM, Nokia, Palo Alto Networks, Symantec, and Trustonic.
Ex-NSA Contractor Indicted In Alleged Theft Of Classified Data
Harold Thomas Martin III, accused of stealing 50 terabytes of highly sensitive government information, will appear in court on Feb. 14.
MORE NEWS & COMMENTARY
HOT TOPICS
Windows SMB Zero-Day Exploit On The Loose
Vulnerability allows remote attackers to trigger denial-of-service conditions on several Windows client versions.

Enterprise Android Vs iOS: Which is More Secure?
The answer is not as simple as you think. A mobile security expert parses the pros and cons.

4 Signs You, Your Users, Tech Peers & C-Suite All Have 'Security Fatigue'
If security fatigue is the disease we've all got, the question is how do we get over it?

MORE
EDITORS' CHOICE

When Hackers Hack Hackers
Notable cases of internecine cyber squabbles.
THREAT INTEL SURVEY

Share Your Threat Intelligence Practices

Answer 20 confidential questions exploring how enterprises collect and use threat intelligence data and enter a contest to win an iPad Air. Results will be published on Dark Reading.


Tech Resources
ACCESS TECH LIBRARY NOW

  • [Cybersecurity] Costs vs. Benefits

    This online event, hosted by the editors of Dark Reading, brings together IT security leaders, business executives, and cyber threat experts will provide you with a holistic view of the costs and benefits of information security investments.

  • [Office 365] Managing the Employee Lifecycle

    Microsoft's Office 365 has become the collaboration software of choice for many organizations. While some of these are choosing Microsoft for the first time, many Office 365 customers have a history with complex legacy infrastructure that makes it difficult and time consuming ...

MORE WEBINARS

Partner Perspectives

Outsider Attacks Give Nightmares To CIOs, CEOs, CISOs
Three main threats companies aren't prepared to handle include outside attacks, data vulnerability and insider sabotage.

Meet 'Fruitfly:' Mac Malware Targeting Biomedical Research Centers
This newly discovered code contains indications that it has been circulating undetected for at least a couple years.

Machine Learning In Cybersecurity Warrants A Silver Shotgun Shell Approach
When protecting physical or virtual endpoints, it's vital to have more than one layer of defense against malware.

FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.