Follow Dark Reading:
 January 27, 2017
LATEST SECURITY NEWS & COMMENTARY
How I Would Hack Your Network (If I Woke Up Evil)
How would an attacker target your company? Here's a first-person account of what might happen.
Most Companies Still Willing To Pay Ransom To Recover Data, Survey Shows
St. Louis Public Library system becomes latest example of growing number refusing to do so
There's No One Perfect Method For Encryption In The Cloud
The problem with encryption is that it affects performance, especially in the cloud. Know the different methods so you can pick the type that best suits your needs.
Meet Ripper.cc, A Reputation Service For Cybercriminals
Ripper.cc offers a service to help protect the genuine cybercriminals from the scammers in their midst.
Pew Research Study Exposes America's Poor Password Hygiene
Americans feel like they've lost control over their online lives, but they still aren't always practicing proper security.
Facebook Adds Physical Key Security For Member Accounts
Social media site now supports security keys to boost multifactor authentication.
Most Malware-Infected US Cities List Shows Size Doesn't Matter
Webroot's list of the top 10 most infected US cities includes only one city from the Top 10 most densely populated.
SentinelOne Raises $70 Million In Latest Funding Round
Endpoint security firm now has raised more than $110 million in capital.
MORE NEWS & COMMENTARY
HOT TOPICS
Kaspersky Lab Incident Investigations Head Arrested In Russia For 'Treason'
Security firm says the case doesn't affect its computer incidents investigation operations.

4 Reasons Why You Should Take Ransomware Seriously
The threats keep getting more sophisticated and the stakes keep getting higher. Is your organization ready to meet the challenge?

'123456' Leads The Worst Passwords Of 2016
New report analyzes trends in more than 5 million passwords stolen from enterprises and leaked to the public last year.

MORE
EDITORS' CHOICE

SOC Maturity By The Numbers
Most large organizations today have security operations centers in play, but only 15% rate theirs as mature.
Why Dependence On Cloud Providers Could Come Back And Bite Us
It's time to re-evaluate the cloud policies you have in place. And if you're not learning from the mistakes of others, you're doomed to repeat them.
Tech Resources
ACCESS TECH LIBRARY NOW

  • [Cybersecurity] Dark Reading Virtual Event

    How much should your organization spend on information security? What's the potential cost of a major hack or data breach? What's the risk that your enterprise will be hit by a cyberattack? How can you measure the benefits of your ...

  • [Office 365] Managing the Employee Lifecycle

    Microsoft's Office 365 has become the collaboration software of choice for many organizations. While some of these are choosing Microsoft for the first time, many Office 365 customers have a history with complex legacy infrastructure that makes it difficult and time consuming ...

MORE WEBINARS

Partner Perspectives

Meet 'Fruitfly:' Mac Malware Targeting Biomedical Research Centers
This newly discovered code contains indications that it has been circulating undetected for at least a couple years.

Machine Learning In Cybersecurity Warrants A Silver Shotgun Shell Approach
When protecting physical or virtual endpoints, it's vital to have more than one layer of defense against malware.

What to Consider When Moving To Hyperconverged Infrastructure
Scalability, data availability, and agility are three reasons why enterprises are making the move to HCI.

FEATURED REPORTS
  • The Top Cybersecurity Risks & How Enterprises Are Responding

    The information security landscape is a constantly shifting risk environment. Today's IT security department must manage both internal and external threats' ranging from malware to mobile device vulnerabilities, to cloud security and ransomware. Download the Dark Reading 2016 Strategic Security Survey ...

  • How Enterprises Are Attacking the IT Security Enterprise Challenge

    Information Security professionals have been making hard choices on the fly for some time, but the unrelenting nature of attacks and threats to users have raised the stakes. To learn more about what organizations are doing to tackle these threats ...

MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.