Follow Dark Reading:
 October 04, 2016
LATEST SECURITY NEWS & COMMENTARY
Grading Obama: D- President Failed To Protect Us From The Bad Guys
A barely passing grade from a former special agent in charge of the NYC FBI cybercrimes division for failing to create deterrents and policies that encourage self defense.

Grading Obama: C+ Administration Missed Key Opportunities To Civilize Cyberspace

A middling grade because the President's cyber policy initiatives were reactive, laisse faire, and didn't buttress American economic opportunity.


Insider Threats To Data Have Gone Up In Past Year
Bitglass study on data leak risks to organizations by users reveals careless, unauthorized uses of devices have increased breaches.
IoT DDoS Attack Code Released
Mirai malware could signal the beginning of new trend in using Internet of Things devices as bots for DDoS attacks.
Microsoft Execs Talk Public Policy Changes For Cloud
Microsoft highlights security and privacy among 78 public-policy recommendations for the future of global cloud growth.
Hackers Attacked Voter Registration Systems Of 20 US States, Says Official
US Homeland Security Department calls for scan of election websites and improve security even as FBI probes Russian involvement.
MORE NEWS & COMMENTARY
HOT TOPICS
Today's Cybersecurity Management Requires A New Approach
The current managed security services provider model just doesn't work in our information-rich world. Time to shake things up.

Decrypting The Dark Web: Patterns Inside Hacker Forum Activity
Data analysis to be presented at Black Hat Europe highlights trends in communication between bad actors who gather in underground forums across the Dark Web.

10 Hottest Sessions At Black Hat Europe 2016
A sneak-peek at some of the more intriguing Briefings at the upcoming conference in London.

MORE
EDITORS' CHOICE

16 Innovative Cybersecurity Technologies Of 2016
This year's SINET 16 Innovators were chosen from 82 applicants representing nine countries.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Identify & Remediate Vulnerabilities Hiding In Your Applications

    Fixing vulnerabilities isn't just a job for your in-house development team and the giants of Silicon Valley. It's a job for all the developers of the third-party software components embedded in countless applications and services - from open-source, to commercial ...

  • Less Staff + More Security Needs = Better Incident Response

    In this webinar on September 28th, Duane Kuroda will shine a light on this problem and provide best practices to help you take charge. Results of a just-completed survey of your peers about the state of the problem will be ...

MORE WEBINARS

Partner Perspectives

Cyber-Anything-As-A-Service: Should The Government Just Outsource Everything?
Agencies should be able to select and provision from a variety of cybersecurity services and capabilities to improve their overall effectiveness and efficiency.

'Beep' Prepared: How Security Economics Can Help The Coyote Catch The Roadrunner
The practice of security economics demonstrates how gaps in the security architecture impair business results.

Sharing Cybersecurity Threat Intelligence Is The Only Way We Win
Security organizations must leverage each other's information in order to better predict, prevent, detect, and respond to threats their customers and organizations face.

FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.