Follow Dark Reading:
 June 03, 2017
LATEST SECURITY NEWS & COMMENTARY
It's About Time: Where Attackers Have the Upper Hand
Businesses take a median of 38 days to detect cybercrime, but can decrease the impact of a breach with faster incident response.
Hollywood Film Studio Seeks Up-And-Coming Hackers for Reality TV Show
New program on A&E will feature competitions, personalities
How to Succeed at Incident Response Metrics
Establishing a baseline of what information you need is an essential first step.
Cosmetic Surgery Clinic's Photos Released in Cyber Blackmail Attack
A Lithuanian cosmetic surgery clinic is breached, with attackers releasing more than 25,000 patient photos, some of them nude, following a blackmail scheme.
MORE NEWS & COMMENTARY
HOT TOPICS
Chinese 'Fireball' Malware Infects 20% of Global Corporate Networks
The Fireball malware has infected over 250 million computers and is capable of executing code on all of them, raising potential for large-scale damage.

OneLogin Breach Reignites Concerns over Password Managers
Entrusting all your passwords to a single organization creates a single point of failure, experts say in the wake of a new data breach at OneLogin.

SMB Security: Don't Leave the Smaller Companies Behind
Helping improve the security posture of small and medium-sized businesses should be a priority for security organizations of all sizes.

MORE
EDITORS' CHOICE

8 Most Overlooked Security Threats
Businesses know the obvious security threats to watch for, but some of the biggest dangers may not at top-of-mind.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Free Yourself from Legacy Apps

    They've served their purpose years ago, but now they're stretching your IT budget and increasing security and compliance risks. Every enterprise has them, what are they? - Legacy applications. Don't get stuck between a rock and a hard place. Learn ...

  • [Cybersecurity] Managing the Skills Shortage

    In this webinar, security experts discuss methods for doing better security with fewer people, including: Time-saving tools for automating security functions, effective ways to use outsourcing and third-party services, creative places to look for new talent and the best ways ...

MORE WEBINARS

Partner Perspectives

DevOps & SecOps: The Perks of Collaboration
Organizations can't bypass security in favor of speed, making SecOps a perfect complement to DevOps.

DNS Is Still the Achilles' Heel of the Internet
Domain Name Services is too important to do without, so we better make sure it's reliable and incorruptible

WanaCrypt0r Hits Worldwide
Consumers and businesses should be sure their Windows systems and software are updated with all current patches in order to stop the spread of this dangerous ransomware attack.

FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.