Follow Dark Reading:
 December 21, 2016
LATEST SECURITY NEWS & COMMENTARY
Russian Hackers Run Record-Breaking Online Ad-Fraud Operation
'Methbot' is a sophisticated cybercrime scheme that has hit major US advertisers and publishing brands and pilfered millions of dollars per day.
Panasonic Inflight Entertainment System Vulnerable To Attack
Flaws could theoretically allow access to aircraft control systems, IOActive says in disputed report.
Report: ShadowBrokers Obtained Stolen NSA Info Via Rogue Insider
Flashpoint researchers have 'medium confidence' that rogue insider, not just outside hacker, was involved in ShadowBrokers' August and December data dumps.
20 Questions Security Pros Should Ask Themselves Before Moving To The Cloud
A template for working collaboratively with the business in today's rapidly changing technology environment.
Application Security Still Slows Developer Work
Cooperation among DevOps teams might be growing, but security testing still seen as a road block to continuous delivery.
44% Of Companies Miss Breach Reporting Deadlines
Balabit research on security investigation says organizations lack of understanding lead to delay in breach probe.
Democrats And Republicans Join In Demand For Select Cyber Panel
Four senators push Mitch McConnell for select committee on foreign cyber threats and Russian interference in US presidential polls.
MORE NEWS & COMMENTARY
HOT TOPICS
Microsoft Execs: Identity, Threat Intelligence Driving Company's Security Strategy
One year after Microsoft announced its $1B investment into a holistic cybersecurity strategy, executives discuss how their plans unfolded and what's on the agenda for 2017.

Real-World Fallout From The Cybersecurity Skills Gap
Two new studies connect the dots between an organization's lack of staffing and skills to its ability to fend off cyberattacks.

8 Most Hackable Holiday Gifts, 2016 Edition
You better watch out! Otherwise, you may be giving the gift of malware or unauthorized access to networks and devices.

MORE
EDITORS' CHOICE

5 Ways The Cyber-Threat Landscape Shifted In 2016
IoT botnets and turnkey phishing services were just some of the ways the bad guys stayed ahead in 2016.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Can You Trust Your Data?

    In the aftermath of a US presidential election in which all major polls failed to predict the outcome -- the election of Donald J. Trump over Hillary Clinton -- plenty of people are wondering what happened. Can they trust data ...

  • [Cybersecurity] Build & Maintain an Effective Cyberthreat-Hunting Team

    As online attackers and exploits get more sophisticated, many enterprises are discovering that more traditional, passive methods of detecting cyberthreats aren't working as well as they used to. To help find and eradicate sophisticated threats more quickly, enterprises are building "...

MORE WEBINARS

Partner Perspectives

Investments In Security Operations Centers Are Paying Off, Study Finds
SOCs help organizations reduce security incidents and improve operational maturity.

Phishing Can Leverage Users To Bypass Sandboxes
Using social engineering to bypass traditional security defenses is not new and will certainly continue to grow.

Are Unconscious Biases Weakening Your Security Posture?
Proactively addressing your biases can help you build a resilient and adaptable security foundation.

FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.