Follow Dark Reading:
 July 07, 2016
LATEST SECURITY NEWS & COMMENTARY
So You Want To Be A Penetration Tester
Penetration testers must have an innate curiosity of how networked systems work coupled with a solid understanding of IT operations. It also helps to be able to think like an attacker.
Comey: No Evidence Clinton Email Server Was Hacked, But Still 'Possible'
The FBI does not recommend charges against Hillary Clinton after investigation into use of her personal email server.
5 Things To Consider With A Threat Hunting Program
A change in mindset and the ability to think like a malicious hacker are two key requirements.
How To Use Threat Intelligence Intelligently
Sometimes it's about a beer, but it's mainly about being prepared before opening the threat intel floodgates.
MORE NEWS & COMMENTARY
HOT TOPICS
Diagnosis SOC-atrophy: What To Do When Your Security Operation Center Gets Sick
Whether it's due to lack of attention, poor capital planning or alert fatigue, there are lots of reasons why an SOC can become unhealthy. Here's how to make it better.

How Not To Write A Pen Test RFP
The downside of a failed request for a penetration test proposal is a no-win situation for everyone. Here are five common mistakes to avoid.

MORE
EDITORS' CHOICE

West Point Trains Female Cadets For Cyber Branch
An internship at a Silicon Valley startup is one program aimed at helping close the cybersecurity skills gap.
A Closer Look At Microsoft's Proposed Norms For Cybersecurity
Microsoft last month outlined steps companies can take to collaborate on cybersecurity, following its proposed norms for nation-states.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Analytics Talent: Find It. Use It. Retain It.

    This session will cover how organizations that are new to analytics or are expending their analytics initiatives can find analytics talent, including those in your existing employee base. Read more and register for this session >>

  • 2016 Underground Hacker Marketplace - It's a Good Time to Be a Bad Guy

    The underground marketplace is booming and only getting bigger, more sophisticated, and competitive. Attend this webinar and take a journey with James Bettke, SecureWorks Counter Threat Unit (CTU) researcher and Sean O'Connor, SecureWorks CISO Op-Intel analyst as they walk you ...

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Weekly
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Weekly Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.