Follow Dark Reading:
 June 09, 2017
LATEST SECURITY NEWS & COMMENTARY
Security Orchestration Fine-Tunes the Incident Response Process
Emerging orchestration technology can cut labor-intensive tasks for security analysts.
Move Over, Mirai: Persirai Now the Top IP Camera Botnet
Mirai's success has spawned a flurry of similar IoT malware.
The Economics of Software Security: What Car Makers Can Teach Enterprises
Embedding security controls early in the application development process will go a long way towards driving down the total cost of software ownership.
Outdated Operating Systems, Browsers Correlate with Real Data Breaches
Study shows companies running out-of-date OSes were three times more likely to suffer a data breach, and those with the outdated browsers, two times more likely.
Microsoft to Buy Hexadite for AI, Enterprise Security
Acquisition of Israeli security startup aims to strengthen Windows 10 security with artificial intelligence, company says.
Comey Has 'No Doubt' on Russia's Involvement in US Election Hacking
James Comey testifies before the Senate Intelligence Committee that he believes Russia's government attempted to interfere in the US elections last year.
Apple Employees in China Detained for Selling User Data
Chinese authorities in Beijing detained twenty-two Apple employees suspected of illegally obtaining personal data.
MORE NEWS & COMMENTARY
HOT TOPICS
WannaCry Exploit Could Infect Windows 10
The EternalBlue remote kernel exploit used in WannaCry could be used to infect unpatched Windows 10 machines with malware, researchers find.

Cybersecurity Faces 1.8 Million Worker Shortfall By 2022
(ISC)2 report shows the skills shortage is getting worse.

Securely Managing Employee Turnover: 3 Tips
Don't let the process spiral into organizational chaos. Here are steps you can take to keep your company safe.

MORE
EDITORS' CHOICE

From Reporter to Private Investigator to Security Engineer
How I fell in love with coding and traded in a camera-rigged Prius for a MacBook and a GitHub account.
Tech Resources
ACCESS TECH LIBRARY NOW

  • AI & Machine Learning: Real World Use Cases

    AT this event you will get real-world use cases for machine learning in business and industry, designed to spark your thinking as you examine your first, or second, or 27th, implementation of this advanced technology in your organization. Find out ...

  • 6 Trending Attacks & How to Secure Your Endpoints Against Them

    Attackers have shifted their tactics. They've discovered new ways to re-engineer older tactics to make them easier to execute, more evasive, and more likely to deceive targeted users. Combined with targeting platforms that organizations falsely consider more secure, these new ...

MORE WEBINARS

Partner Perspectives

Hide & Seek: Security Teams Lack Visibility in the Cloud
IT leaders remain on the hot seat when it comes to their ability to continuously monitor the state of their data and operations. How hot is your seat?

Will Deception as a Defense Become Mainstream?
If your organization has the right resources, deception strategies offer a powerful way to slow down and entrap potential intruders.

DevOps & SecOps: The Perks of Collaboration
Organizations can't bypass security in favor of speed, making SecOps a perfect complement to DevOps.

FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.