Follow Dark Reading:
 October 21, 2016
LATEST SECURITY NEWS & COMMENTARY
How To Crash A Drone By Hacking Its 3D Propeller Design
Researchers from Israel's Ben-Gurion University of the Negev and two other universities show how attackers can exploit 3D manufacturing processes.
New Free Tool Stops Petya Ransomware & Rootkits
Meanwhile, Locky puts ransomware on the Check Point Top Three Global Malware List for the first time ever.
Why Poor Cyber Hygiene Invites Risk
Modern cybersecurity today is all about risk management. That means eliminating and mitigating risks where possible, and knowingly accepting those that remain.
US Bank Regulators Draft Rules For Financial Services Cybersecurity
Proposed standards will require financial firms to recover from any cyberattack within two hours.
Yahoo Demands Government Be More Transparent About Data Requests
In a letter to the Director of National Intelligence, the tech company says this transparency would also help clear Yahoo's name in customer email scan case.
MORE NEWS & COMMENTARY
HOT TOPICS
How To Become A Cybersecurity Entrepreneur In A Crowded Market
If you want to build the next great cybersecurity startup, use your expertise, then follow these three simple suggestions.

7 Regional Hotbeds For Cybersecurity Innovation
These regions are driving cybersecurity innovation across the US with an abundance of tech talent, educational institutions, accelerators, incubators, and startup activity.

'Kevin Durant Effect': What Skilled Cybersecurity Pros Want
For seasoned cybersecurity professionals, motivation for sticking with their current jobs doesn't mean big management promotions or higher salaries, a new Center for Strategic and International Studies (CSIS) report finds.

MORE
EDITORS' CHOICE

9 Sources For Tracking New Vulnerabilities
Keeping up with the latest vulnerabilities -- especially in the context of the latest threats -- can be a real challenge.
Malvertising Trends: Don't Talk Ad Standards Without Ad Security
How malvertising marries the strengths and weaknesses of the complex digital advertising ecosystem perfectly - and what online publishers and security leaders need to do about it.
Tech Resources
ACCESS TECH LIBRARY NOW

MORE WEBINARS

Partner Perspectives

Why Aren't We Talking More Proactively About Securing Smart Infrastructure?
Let's not perpetuate the vicious cycle of security complexity and failure by trying to bolt on security after the fact.

Access, Trust, And The Rise Of Electronic Personal Assistants
App and device makers are working hard to deliver user control over privacy.

Cybersecurity Economics In Government -- Is Funding The Real Problem?
Government leadership and those chartered with creating budgets could benefit from applying sound value-management practices when considering the cybersecurity budget process.

FEATURED REPORTS
  • [Dark Reading] 2016 Security Salary Survey

    Cybersecurity spending is at an all-time high, according to many industry estimates, but that rapid increase in spending apparently is not having much impact on the salaries of security professionals. Our report asks the question: Is there more to an ...

  • [Forrester Report] Digital Experience Technology & Delivery Priorities

    Across the board, organizations' investments revolve around implementing personalized initiatives, solving people challenges, and assembling digital experience platforms. In this report, Forrester outlines top 2015 priorities that application development and delivery professionals are aware of.

MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.