Follow Dark Reading:
 November 17, 2016
LATEST SECURITY NEWS & COMMENTARY
Security Experts Call For Regulation On IoT Cybersecurity
During a House Committee hearing today, Bruce Schneier also asks for the establishment of a new government agency devoted to cybersecurity.
Internet Of Things 'Pollutants' & The Case For A Cyber EPA
Recent IoT-executed DDoS attacks have been annoying, not life threatening. Should device makers be held liable if something worse happens?
Windows 10 Updates Target Ransomware Threats
Microsoft strengthens Windows 10 security with measures to prevent, detect, and respond to ransomware attacks. But they are only useful for businesses using all the right tools.
Thank Ransomware For Next-Gen Endpoint Security Momentum
More organizations are getting serious about making the move to newer endpoint security technologies that go beyond signature-based detection.
Digital Shadows Narrows Down Causes Of Tesco Hack
Security firm Digital Shadows uses the "analysis of competing hypothesis" to narrow down possible causes of the $3.1 million Tesco bank theft.
Symantec Study Shows Consumers Suffer From Security Overload
New survey finds that consumers are overwhelmed by the need to protect their devices from cybercriminals.
MORE NEWS & COMMENTARY
HOT TOPICS
Firmware Secretly Sent Text, Call Data On Android Users To China
Several Android models sold in the US likely impacted, says Kryptowire

Security Metrics Checklist
Which metrics are the best indicators of a strong cybersecurity team? Experts say security pros should be recording and reporting these data points to demonstrate their success.

Learning To Trust Cloud Security
Cloud-centric computing is inevitable, so you need to face your concerns and be realistic about risks.

MORE
EDITORS' CHOICE

The 7 Most Significant Government Data Breaches
Mega compromises at federal and state agencies over the past three years has compromised everything from personal data on millions to national security secrets.
Tech Resources
ACCESS TECH LIBRARY NOW

  • [Office 365] Simplifying Security & Management

    If your organization is moving to Office 365, you're facing the challenge of dealing with identity management and end users accessing Office applications and corporate data from potentially insecure devices. These challenges can be managed, register for this webinar and find ...

  • Spearphishing & Targeted Social Engineering Attacks On Your Users

    In this eye-opening webinar, top experts on phishing and social engineering will discuss the motives and methods that attackers use to execute these targeted "spearphishing" attacks. You'll get insight on how the attackers choose their social engineering targets, the methods ...

MORE WEBINARS

Partner Perspectives

8 Ways Businesses Can Better Secure Their Remote Workers
Remote workers may present challenges for IT staff, but a combination of cybersecurity best practices, strong policy, and a dedicated user awareness campaign could keep company data safe.

Every Minute Of Security Planning Will Save You 10 Minutes In Execution
Leveraging automation, orchestration, and interoperability in your cybersecurity plans now will save you significant time later.

Ransomware Doesn't Have To Mean Game Over
3 methods can help you recover from a ransomware attack relatively unscathed.

FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.