Follow Dark Reading:
 July 18, 2016
LATEST SECURITY NEWS & COMMENTARY
Staying Cyber Safe At The Olympics
Travel tips and more in hostile environments abroad.
Beyond Data: Why CISOs Must Pay Attention To Physical Security
Information security professionals are missing the big picture if they think of vulnerabilities and threats only in terms of data protection, password hygiene and encryption.
Meet The Teams In DARPA's All-Machine Hacking Tournament
"Autonomous security" is DARPA's latest game. Its Cyber Grand Challenge will culminate at DEF CON with a contest to see which of these seven finalists' machines will automatically detect and remediate the most security vulnerabilities.

Name That Toon: Who Needs Pokemon Go?

We provide the cartoon. You write the caption. Win a $25 Amazon gift card!


MORE NEWS & COMMENTARY
HOT TOPICS
Profiles Of The Top 7 Bug Hunters From Around the Globe
'Super hunters' share a common goal: to find the most high impact valid bugs before a bad guy does.

AirbnBreach: How Networks At Short-Term Rentals Are Wide Open To Attack
New age of community lodging opens the door for old-school network hacks, putting hosts and guests at risk of cyberattacks and stolen personal information.

Does Defense In Depth Still Work Against Today's Cyber Threats?
Yes. But not for much longer unless the industry shifts to an automated security and zero trust model.

MORE
IN CASE YOU MISSED IT

What SMBs Need To Know About Security But Are Afraid To Ask
A comprehensive set of new payment protection resources from the PCI Security Standards Council aims to help small- and medium-sized businesses make security a priority.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Millennials are Changing the Definition of Customer Care

    Millennials know exactly what they want and expectations are high - very high. They are empowered in their personal life and demand the same in business. Because they are always on and always connected, using everything from mobile devices to ...

  • Analytics & the Making of a President

    Join All Analytics Radio to learn about the use of analytics in presidential campaigns. What you learn by attending can provide insight into what the candidates know about you and millions of other citizens, and it can demonstrate what your ...

MORE WEBINARS

Partner Perspectives

Context-Rich And Context-Aware Cybersecurity
An adaptive threat-prevention model is quickly replacing traditional, unintegrated architectures as security teams work to achieve a sustainable advantage against complex threats.

Saving The Security Operations Center With Endpoint Detection And Response
EDR is the beginning of our return to control in the fight against cybercrime.

Shifting The Economic Balance Of Cyberattacks
Our goal should be to simply make the cost of conducting a cyberattack so expensive that cybercriminals view attacking our organization as a bad return on investment.

FEATURED REPORTS
  • Forrester Report: Cloud Powers The New Connected Economy

    This May 2016 Forrester report explores a landscape in which organizations in every industry are moving forward from cloud adoption to cloud creation and participation. Learn how you are a member of this networked economy & how the steps you take may ...

  • Gartner Magic Quadrant for Operational Database Management

    When it comes to managing your data, the choice is clear: Microsoft is an industry leader in operational database management systems (ODBMS). Don't take our word for it; read Gartner's assessment of the ODBMS landscape and see how Microsoft stacks ...

MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.