Follow Dark Reading:
 July 16, 2016
LATEST SECURITY NEWS & COMMENTARY
Meet The Teams In DARPA's All-Machine Hacking Tournament
"Autonomous security" is DARPA's latest game. Its Cyber Grand Challenge will culminate at DEF CON with a contest to see which of these seven finalists' machines will automatically detect and remediate the most security vulnerabilities.
Microsoft Wins Landmark Case Of Overseas Email Handover
US court overturns 2014 ruling favoring Department of Justice's right to seek data stored overseas.
New HIPAA Guidance Tackles Ransomware Epidemic In Healthcare
HHS addresses ransomware infections in wake of healthcare attacks.
Chinese Hacker Gets US Prison Term For Military Data Theft
Su Bin worked alongside Chinese military officers to steal sensitive data from major US defense contractors.
MORE NEWS & COMMENTARY
HOT TOPICS
New 'Ranscam' Ransomware Lowers The Bar But Raises The Stakes
Cisco Talos researchers discover new variant that doesn't decrypt your files after you pay up--it has already deleted them.

Does Defense In Depth Still Work Against Today's Cyber Threats?
Yes. But not for much longer unless the industry shifts to an automated security and zero trust model.

Name That Toon: Who Needs Pokemon Go?

We provide the cartoon. You write the caption. Win a $25 Amazon gift card!

MORE
EDITORS' CHOICE

What SMBs Need To Know About Security But Are Afraid To Ask
A comprehensive set of new payment protection resources from the PCI Security Standards Council aims to help small- and medium-sized businesses make security a priority.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Millennials are Changing the Definition of Customer Care

    Millennials know exactly what they want and expectations are high - very high. They are empowered in their personal life and demand the same in business. Because they are always on and always connected, using everything from mobile devices to ...

  • Analytics & the Making of a President

    Join All Analytics Radio to learn about the use of analytics in presidential campaigns. What you learn by attending can provide insight into what the candidates know about you and millions of other citizens, and it can demonstrate what your ...

MORE WEBINARS

Partner Perspectives

Context-Rich And Context-Aware Cybersecurity
An adaptive threat-prevention model is quickly replacing traditional, unintegrated architectures as security teams work to achieve a sustainable advantage against complex threats.

Saving The Security Operations Center With Endpoint Detection And Response
EDR is the beginning of our return to control in the fight against cybercrime.

Shifting The Economic Balance Of Cyberattacks
Our goal should be to simply make the cost of conducting a cyberattack so expensive that cybercriminals view attacking our organization as a bad return on investment.

FEATURED REPORTS
  • Forrester Report: Cloud Powers The New Connected Economy

    This May 2016 Forrester report explores a landscape in which organizations in every industry are moving forward from cloud adoption to cloud creation and participation. Learn how you are a member of this networked economy & how the steps you take may ...

  • Gartner's Top 10 Cloud Myths

    Cloud computing is uniquely susceptible to the confusion and hype that surrounds it. Here, Gartner provides a top 10 list of the most common misconceptions that CIOs should look out for.

MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.