Follow Dark Reading:
 March 11, 2017
LATEST SECURITY NEWS & COMMENTARY
Stockpiling 0-Day Bugs Not So Dangerous After All, RAND Study Shows
A RAND Corp. study of more than 200 zero-days shows that benefits of disclosure can often be more modest than perceived.
Financial Institutions Less AppSec-Savvy Than You'd Think
New study shows banks all have policies in place, but lack metrics and good third-party software controls.
IoT & Liability: How Organizations Can Hold Themselves Accountable
To avoid a lawsuit, your company needs to better understand the state of your infrastructure and the devices and applications within it. Here are five areas on which to focus.
WikiLeaks Says It Will Help Firms Thwart 'CIA Hack Tools'
Julian Assange follows up leak of alleged CIA cyber espionage hack tools with promise of assistance against these.
FBI Chief Calls for United Fight Against Cybercrime
James Comey stresses the need to address encryption challenges faced by law enforcement.
MORE NEWS & COMMENTARY
HOT TOPICS
7 Hot Security Terms (and Buzzwords) to Know
How the security industry has a conversation with itself is constantly changing and the latest terms as well as buzzwords point us to where the technology is heading.

Why Printers Still Pose a Security Threat
Newly discovered security flaws in popular printers remind us how networked devices continue to put users at risk.

Google's 'SHA-1 Countdown Clock' Could Undermine Enterprise Security
In the wake of a recently documented 'collision' attack, Google researchers should consider delaying the release of the code behind the crack until companies can roll out adequate patches. Here's why



MORE
EDITORS' CHOICE

9 Phishing Lures that Could Hijack your 2017 Tax Refund
Scammers are taking an aggressive, social-engineering approach to tax season this year.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Evolution of the Data Scientist Role

    In the years since data scientist was declared the sexiest job, the role itself has evolved. As happens with any job, hiring managers have been adjusting their expectations for data science candidates, and executives are defining the role of the ...

  • Cyber Attacks: Is your Organization Doing What it Can to Protect Itself?

    Hackers are attacking the weakest link in your cybersecurity - your end users. Attend this webinar to determine if your cloud based email needs stronger security and up-time. Also, learn about key threat types and identify the questions you should ...

MORE WEBINARS

Partner Perspectives

4 Ways to Recover from a Cyberattack
Be prepared and act quickly are two key steps that will help you bounce back quickly from a cyberattack.

Adware vs. Ad Fraud: Viva la Difference!
Both earn their money in the advertising trade but they each have very different means of operation and targets.

DNSSEC: Why Do We Need It?
The number of signed domain names has grown considerably over the past two and a half years but some sectors are heavily lagging behind.

FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.