Follow Dark Reading:
 October 14, 2016
LATEST SECURITY NEWS & COMMENTARY
Information Security Spending Will Top $101 Billion By 2020
Spending on security services will drive much of the growth, IDC says in new forecast
Internet Routing Security Effort Gains Momentum
More than 40 network operators agree to filter routing information, prevent IP address-spoofing, and to work together to thwart Internet traffic abuse and problems.
80% Of IT Pros Say Users Set Up Unapproved Cloud Services
Shadow IT is a growing risk concern among IT pros, with most reporting users have gone behind their backs to set up unapproved cloud services.
Most Small Businesses Lack Response Plan For Hacks
Half of small business owners have experienced malware, phishing, Trojans, hacking, and unauthorized access to customer data, according to Nationwide survey.
IoT Default Passwords: Just Don't Do It
The rise of the Internet of Things makes the use of default passwords especially perilous. There are better options.
Vera Bradley Stores Report Payment Card Breach
The retailer discloses security incident targeting customer payment card data at its stores between July 25 and September 23.
Survey Shows Lack Of Preparation For EU's Data Privacy Law
More than 80% of companies know little about the 2018 General Data Protection Regulation (GDPR) -- and 97% have no plans to prepare for it.
MORE NEWS & COMMENTARY
HOT TOPICS
Ransomware Raises The Bar Again
The infamous form of attack now ranks as the top threat to financial services, but preparedness can pay off for victims.

Attack Uses Image Steganography For Stealthy Malware Ops On Instagram
Endgame details 'Instegogram' and Apple Mac OS X flaw with Instagram images.

Database Breaches: An Alarming Lack Of Preparedness
It's no secret that databases are fertile ground for malicious activities. Here's how a seven-step process for monitoring known harbingers of an imminent attack can help reduce the risk.

MORE
EDITORS' CHOICE

7 Ways Electronic Voting Systems Can Be Attacked
Pre-election integrity tests and post-election audits and checks should help spot discrepancies and errors, but risks remain.
Tech Resources
ACCESS TECH LIBRARY NOW

  • [IoT] How We Can Build Smarter Cities

    Cities are central to our lives. More than half of the global population now lives in and around cities and the percentage - the congestion - will only continue to grow. Governments have to rethink how they do business in ...

  • Live Demo: Office 365 Provisioning Deep Dive

    Since the release of Office 365 five years ago, many of the "easy" Office 365 migrations have been completed. Customers migrating to Office 365 now have much more complex requirements, such as having to work around unique user access and governance challenges that ...

MORE WEBINARS

Partner Perspectives

Access, Trust, And The Rise Of Electronic Personal Assistants
App and device makers are working hard to deliver user control over privacy.

Cybersecurity Economics In Government -- Is Funding The Real Problem?
Government leadership and those chartered with creating budgets could benefit from applying sound value-management practices when considering the cybersecurity budget process.

Cyber-Anything-As-A-Service: Should The Government Just Outsource Everything?
Agencies should be able to select and provision from a variety of cybersecurity services and capabilities to improve their overall effectiveness and efficiency.

FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.