Follow Dark Reading:
 February 14, 2017
LATEST SECURITY NEWS & COMMENTARY
'Shock And Awe' Ransomware Attacks Multiply
Ransomware attackers are getting more aggressive, destructive, and unpredictable.
IBM Brings Watson Cognitive Computing To The SOC
Technology known for a Jeopardy stunt six years ago is now powering question answering within IBM Security's QRadar system.
Obama's Former Cybersecurity Coordinator Named President Of CTA
Michael Daniel is now head of the newly incorporated nonprofit Cyber Threat Alliance, a security threat intel-sharing group of major security vendors.
National Security, Regulation, Identity Top Themes At Cloud Security Summit
Gen. Keith Alexander gives Trump a thumbs-up and Cloud Security Alliance releases a new application.
You Can't Hire Your Way Out of a Skills Shortage ... Yet
It will take much effort to fix the IT and cybersecurity talent crisis, but it is possible.
New Bug Bounty Program Targets IoT Security
GeekPwn bug bounty program aims to collect Internet of Things security vulnerabilities, and highlight mistakes to vendors.
Russia Suspect In Italian Ministry Hack
Italy's foreign ministry was victim of a cyberattack last year, but hackers did not gain access to classified information.
MORE NEWS & COMMENTARY
HOT TOPICS
When Hackers Hack Hackers
Notable cases of internecine cyber squabbles.

Hacking The Penetration Test
Penetration testers rarely get spotted, according to a Rapid7 report analyzing its real-world engagements.

Enterprise Android Vs iOS: Which is More Secure?
The answer is not as simple as you think. A mobile security expert parses the pros and cons.

MORE
EDITORS' CHOICE

Verizon Data Breach Digest Triangulates Humanity Inside Security
The 99-page report breaks out 16 different attack scenarios and specifies the target, sophistication level, attributes, and attack patterns, along with their times to discovery and containment.
Tech Resources
ACCESS TECH LIBRARY NOW

  • [Cybersecurity] Costs vs. Benefits

    This online event, hosted by the editors of Dark Reading, brings together IT security leaders, business executives, and cyber threat experts will provide you with a holistic view of the costs and benefits of information security investments.

  • [Cloud Security Roadmap] Mitigating Risks & Building for Long-Term Success

    Let your inner control freak go. The "we control everything" security strategy does not apply to the cloud, especially not multicloud. According to Forrester Research, in 2015, 29 percent of global enterprise infrastructure decision-makers said they had already adopted or were in ...

MORE WEBINARS

Partner Perspectives

Outsider Attacks Give Nightmares To CIOs, CEOs, CISOs
Three main threats companies aren't prepared to handle include outside attacks, data vulnerability and insider sabotage.

Meet 'Fruitfly:' Mac Malware Targeting Biomedical Research Centers
This newly discovered code contains indications that it has been circulating undetected for at least a couple years.

Machine Learning In Cybersecurity Warrants A Silver Shotgun Shell Approach
When protecting physical or virtual endpoints, it's vital to have more than one layer of defense against malware.

FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.