Follow Dark Reading:
 October 12, 2016
LATEST SECURITY NEWS & COMMENTARY
Symantec Warns Of Second Group Targeting SWIFT Network
Those behind the Odinaff Trojan are using tools and infrastructure associated with the infamous Carbanak cybercrime group, security vendor says
Online Gaming Currency Funds Cybercrime In Real Life
You really needed Cristiano Ronaldo or that Doomhammer. Cybercriminals will help you get it for a price, and it's not even entirely illegal.
Businesses Sacrifice Security To Get Apps Released Faster
As the app economy continues to drive change in IT security, businesses struggle to meet customer demands while keeping their data secure.
UN Watchdog: Nuclear Plants Disrupted By Cyberattack
IAEA director Yukiya Amano says cyber threats to nuclear plants are "not an imaginary risk."
France's TV5Monde Was Victim Of Vicious Cyberattack In 2015
Hackers, allegedly Russians, targeted encoder systems in an attempt to destroy the network and cause major technical and financial damages.
MORE NEWS & COMMENTARY
HOT TOPICS
Cyber Hunters, Incident Response & The Changing Nature Of Network Defense
Or how I learned that network defense needs to evolve from a game of "stumbled upon" to "search and discover."

Ransomware Raises The Bar Again
The infamous form of attack now ranks as the top threat to financial services, but preparedness can pay off for victims.

MORE
EDITOR'S CHOICE

For The Birds: Dark Reading Cartoon Caption Contest Winners
Birdwatching-as-a-Service, live tweeting and NESTFLIX. And the winner is ...
Inside A Bug-Hunter's Head: 6 Motivators
Who are bug bounty hunters, and why do they hack? We dig inside the motivators driving today's hackers to seek vulnerabilities.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Visualization: Let Your Data Speak

    Your data analytics project doesn't really achieve a successful completion until you deliver the results to decision makers, whether the recipients are top executives, business unit leaders, or even the public at large. More and more data science teams are ...

  • Re-Thinking Your Enterprise IT Security Strategy

    Despite enterprises spending more money annually on cybersecurity defense than ever before, the number of businesses compromised continues to increase. Today's approach to data defense isn't where it needs to be and it's time for all enterprises, including yours, to ...

MORE WEBINARS

Partner Perspectives

Cybersecurity Economics In Government -- Is Funding The Real Problem?
Government leadership and those chartered with creating budgets could benefit from applying sound value-management practices when considering the cybersecurity budget process.

Cyber-Anything-As-A-Service: Should The Government Just Outsource Everything?
Agencies should be able to select and provision from a variety of cybersecurity services and capabilities to improve their overall effectiveness and efficiency.

'Beep' Prepared: How Security Economics Can Help The Coyote Catch The Roadrunner
The practice of security economics demonstrates how gaps in the security architecture impair business results.

FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
WhiteHat Security Partners with NowSecure For Mobile Application Security Testing Solution
WhiteHat Sentinel Mobile Express features automated static and dynamic testing to quickly detect and verify mobile application vulnerabilities
FireMon Welcomes New President & CEO, Satin H. Mirchandani
Security management vendor forges ahead with new CEO at the helm
ISAO Standards Organization To Release Initial Voluntary Guidelines For ISAOs
ISAO documents in response to Executive Order 13691 available Friday, September 30 on ISAO.org
MORE PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.