Follow Dark Reading:
 December 07, 2016
LATEST SECURITY NEWS & COMMENTARY
Most iOS Apps In Enterprises Not Using Apple Encryption Feature
Despite a January 1, 2017 deadline, not many app vendors have switched on the Apple App Transport Security, according to a study by Appthority.
US Presidential Commission Outlines Key Cybersecurity Actions For Future Administrations
Report outlines ways to lock down critical infrastructure as well as IoT - and the urgent need to expand the security workforce by 2020 with 100,000 new jobs.
Web Gateways: 5 Big Security Challenges
Overreliance on Web gateways is putting data, users, customers, organizations, and reputation in harm's way.
Pennsylvania State Prosecutor's Office Paid Ransom In 'Avalanche' Ransomware Attack
Allegheny County state prosecutor's office paid attackers $1,400 in Bitcoin to free its data.
Derivative Suit Against Home Depot For 2014 Data Breach Dismissed
Judge says defendants may have been slow to spike up network security, but did not fail to act.
MORE NEWS & COMMENTARY
HOT TOPICS
Where Cybercriminals Go To Buy Your Stolen Data
What malicious sites provide both free and paid access to stolen credit cards, company databases, malware and more?

The Human Firewall: Why People Are Critical To Email Security
Technology is just the beginning; employees must be fully on board with security procedures.

20 Questions Smart Security Pros Should Ask About 'Intelligence'
Threat intel is a hot but complicated topic that encompasses a lot more than just data feeds. Here's how to get beyond the fear, uncertainty, and doubt to maximize its potential.

MORE
EDITORS' CHOICE

The 7 Most Sensational Breaches Of 2016
The biggest hacks, data exposures, and thefts that left companies and government entities reeling.
CARTOON CAPTION CONTEST

Name That Tune: Naughty or Nice

Submit your caption win a $25 Amazon gift card.


Tech Resources
ACCESS TECH LIBRARY NOW

  • [Cybersecurity] Build & Maintain an Effective Cyberthreat-Hunting Team

    As online attackers and exploits get more sophisticated, many enterprises are discovering that more traditional, passive methods of detecting cyberthreats aren't working as well as they used to. To help find and eradicate sophisticated threats more quickly, enterprises are building "...

  • [Ransomware] Taking the Mystery out of Ransomware

    Lost data. Systems locked down. Whole companies coming to a grinding halt. When it comes to ransomware, the damage it can do to your company is immense. Many companies are perplexed by ransomware and don't know how to best protect ...

MORE WEBINARS

Partner Perspectives

PoisonTap USB Device Can Hack A Locked PC In A Minute
This is just one example of an emerging technology that enables anyone with physical access to a computer's USB port to potentially harvest data and gain access by spoofing an Internet ecosystem.

Protect Your Company From Hackable Holiday Gifts
This holiday season promises to be full of devices, apps, and connectivity. Planning and executing appropriate security precautions now will save your business from a serious breach later.

Avalanche Cybercrime Platform Takedown Leaves A Lot To Clean Up
Help us wipe out the remaining bots and put an end to Avalanche once and for all.

FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.