Follow Dark Reading:
 February 03, 2017
LATEST SECURITY NEWS & COMMENTARY
Metasploit Can Now Be Directly Linked To Hardware For Vulnerability Testing
New hardware bridge extends penetration testing tools capabilities into physical world.
HD Moore Joins Research-Driven Consulting Firm
Metasploit creator joins Atredis Partners.
A Hogwarts For Cyber Protection?
How the UK is minting a new generation of cybersecurity wizards.
Businesses Fear Brand Damage More Than Security Breaches
Organizations struggling with risk management are more concerned about brand damage than cyberattacks, new Ponemon study shows.
Netherlands Opts For Manual Vote-Count Amid Cyberattack Fears
Ballots will be counted by hand in the March 15 election after doubts surface over the safety and security of electronic system.
Hewlett Packard Enterprise Buys User And Entity Behavioral Analytics Firm
Integration expected to boost HPE's Intelligent Edge strategy for better protection against next-gen attacks.
MORE NEWS & COMMENTARY
HOT TOPICS
How I Would Hack Your Network (If I Woke Up Evil)
How would an attacker target your company? Here's a first-person account of what might happen.

Why You're Doing Cybersecurity Risk Measurement Wrong
Measuring risk isn't as simple as some make it out to be, but there are best practices to help you embrace the complexity in a productive way. Here are five.

Netflix Scam Spreads Ransomware
A program found on suspicious websites aims to trick Windows/PC users into creating fake Netflix logins so it can deliver ransomware.

MORE
EDITORS' CHOICE

10 Essential Elements For Your Incident-Response Plan
The middle of a DDoS attack or ransomware infection is hardly the time to start talking about divisions of labor, or who should do what when.
A New Mantra For Cybersecurity: 'Simulate, Simulate, Simulate!'
What security teams can learn from the Apollo 13 space program, a global pandemic, and major infrastructure disruptions to identify their best responses to attacks.
Tech Resources
ACCESS TECH LIBRARY NOW

MORE WEBINARS

Partner Perspectives

Outsider Attacks Give Nightmares To CIOs, CEOs, CISOs
Three main threats companies aren't prepared to handle include outside attacks, data vulnerability and insider sabotage.

Meet 'Fruitfly:' Mac Malware Targeting Biomedical Research Centers
This newly discovered code contains indications that it has been circulating undetected for at least a couple years.

Machine Learning In Cybersecurity Warrants A Silver Shotgun Shell Approach
When protecting physical or virtual endpoints, it's vital to have more than one layer of defense against malware.

FEATURED REPORTS
  • [Secure Application Development] New Best Practices

    The transition from DevOps to SecDevOps is combining with the move toward cloud computing to create new challenges - and new opportunities - for the information security team. Download this report, to learn about the new best practices for secure ...

  • The Top Cybersecurity Risks & How Enterprises Are Responding

    The information security landscape is a constantly shifting risk environment. Today's IT security department must manage both internal and external threats' ranging from malware to mobile device vulnerabilities, to cloud security and ransomware. Download the Dark Reading 2016 Strategic Security Survey ...

MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.