Follow Dark Reading:
 October 06, 2017
LATEST SECURITY NEWS & COMMENTARY
Russian Hackers Pilfered Data from NSA Contractor's Home Computer: Report
Classified information and hacking tools from the US National Security Agency landed in the hands of Russian cyberspies, according to a Wall Street Journal report.
Equifax Lands $7.25 Million Contract with IRS
The embattled credit monitoring agency will provide taxpayer identification verification and fraud prevention services to the federal tax agency.
How Businesses Should Respond to the Ransomware Surge
Modern endpoint security tools and incident response plans will be key in the fight against ransomware.
Private, Public, or Hybrid? Finding the Right Fit in a Bug Bounty Program
How can a bug bounty not be a bug bounty? There are several reasons. Here's why you need to understand the differences.
MORE NEWS & COMMENTARY
HOT TOPICS
Best and Worst Security Functions to Outsource
Which security functions are best handled by third parties, and which should be kept in-house? Experts weigh in.

5 IT Practices That Put Enterprises at Risk
No one solution will keep you 100% protected, but if you avoid these common missteps, you can shore up your security posture.

Ransomware Will Target Backups: 4 Ways to Protect Your Data
Backups are the best way to take control of your defense against ransomware, but they need protecting as well.

MORE
EDITORS' CHOICE

10 Steps for Writing a Secure Mobile App
Best practices to avoid the dangers of developing vulnerability-ridden apps.
Tech Resources
ACCESS TECH LIBRARY NOW

  • 4 Key Steps in Implementing the Data Warehouse of the Future

    Today organizations need performance and flexibility at an affordable price. A Hadoop-based environment offers just that: speed, scalability, and flexibility while minimizing disruption to a company. Join this session to learn how to implement the technology gradually, target the right ...

  • What You Need to Know about GDPR

    GDRP is an acronym that stands for General Data Protection Regulation and it's designed to give control of personal data back to individuals and take it out of the hands of the companies that collect it for commercial use. It ...

MORE WEBINARS

Partner Perspectives

URL Obfuscation: Still a Phisher's Phriend
There are three primary techniques to trick users into thinking a website link is real: URL shorteners, URL doppelgangers, and URL redirects.

TrickBot Rapidly Expands its Targets in August
TrickBot shifted its focus to U.S banks and credit card companies, soaring past the 1,000 target URL mark in a single configuration.

Where Do Security Vulnerabilities Come From?
There are three major causes: code quality, complexity, and trusted data inputs.

FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.