Follow Dark Reading:
 July 10, 2017
LATEST SECURITY NEWS & COMMENTARY
[Strategic Security Report] Assessing Cybersecurity Risk
As cyber attackers become more sophisticated and enterprise defenses become more complex, many enterprises are faced with a complicated question: what is the risk of an IT security breach? This report delivers insight on how today's enterprises evaluate the risks they face. This report also offers a look at security professionals' concerns about a wide variety of threats, including cloud security, mobile security, and the Internet of Things.
IoT Physical Attack Exploit to be Revealed at Black Hat
Security researcher Billy Rios plans to demonstrate how an exploit can cause an IoT device to launch a physical attack against a human.
The SOC Is Dead...Long Live the SOC
The traditional security operations center can't deal with present reality. We must rethink the concept in a way that prepares for the future.
IRS to Launch Educational Phishing Series
The Internal Revenue Service is preparing to launch an educational series on phishing attacks and related warning signs.
MORE NEWS & COMMENTARY
HOT TOPICS
Symantec to Buy 'Browser Isolation' Firm Fireglass
Fireglass's emerging Web security technology will become modular component in Symantec's Integrated Cyber Defense Platform.

8 Things Every Security Pro Should Know About GDPR
Organizations that handle personal data on EU citizens will soon need to comply with new privacy rules. Are you ready?

CopyCat Malware Infects 14 Million Android Devices
A new malware strain is discovered with a novel approach to infecting Android handheld devices with adware.

MORE
EDITORS' CHOICE

NotPetya: How to Prep and Respond if You're Hit
Security pros share practices to prepare and handle advanced malware attacks like NotPetya.
Tech Resources
ACCESS TECH LIBRARY NOW

  • AI, Machine Learning & The Future of News

    More organizations today are looking to integrate artificial intelligence and machine learning into their operational processes, and news and financial data firm Bloomberg is no exception. A2 Radio welcomes Bloomberg's CTO and Head of Data Science Gideon Mann to the ...

  • New Security Technologies: Advice & Best Practices on Selecting The Right One

    Given today's threat landscape, combined with so many security options available today, it can be daunting when selecting new or alternative technologies to protect your business. Your security team has unique challenges; therefore, you should be asking your next security ...

MORE WEBINARS

Partner Perspectives

Security Experts & Hackers: We're Not So Different
Using the similarities among hackers and security programmers can be an advantage.

Doxing, DoS & Defacement: Today's Mainstream Hacktivism Tools
Anyone can get angry at you and become a hacktivist. Here's how to protect your organization from these increasingly common cyber attacks.

Compliance in the Cloud Needs To Be Continuous & Automated
Complex IT environments require timely visibility into risk and compliance.

FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.