Follow Dark Reading:
 November 09, 2016
LATEST SECURITY NEWS & COMMENTARY
The 7 Types Of Security Jobs, According To NIST
NIST's Cybersecurity Workforce Framework gives the security industry a way to classify specific specialty areas and work roles and identify a path for career growth.
Microsoft November Security Updates Include Fix For Zero-Day Flaw
In total, company released 14 security bulletins, six of which addressed Critical flaws
Is Fingerprint Authentication Making The Password Problem Worse?
Problems emerge when users switch to a new phone.
Stay Vigilant To The Evolving Threat Of Social Engineering
Even the most cyber-savvy individuals can easily get tripped up by a social engineering attack. But users can trip-up a threat simply by paying attention.
New Free Mirai Scanner Tools Spot Infected, Vulnerable IoT Devices
Imperva and Rapid7 have built scanners to discover IoT devices vulnerable or infected with Mirai malware.
Synopsys Expands Software Security With Cigital, Codiscope Acquisitions
Deal is expected to close by December 2016 and will be funded with combination of US cash and debt.
China Passes Controversial Cybersecurity Law
Global business and rights groups raise concern about the censorship that could impact foreign business interests.
MORE NEWS & COMMENTARY
HOT TOPICS
Changing IoT Passwords Won't Stop Attacks. Here's What Will.
The solution will take an industry-wide effort, it won't happen overnight, and the problem is not the users' fault!

Transitioning From The Server Room To The Boardroom
How can IT professionals balance business goals and information security?

Microsoft Fires Back At Google For Windows 0-Day Disclosure
Software giant to issue patch on Nov. 8. Meanwhile, Russian hacker group exploits flaw in targeted attacks.

MORE
COMING SOON: A DARK READING CYBERSECURITY VIRTUAL EVENT

Re-Thinking The Philosophy Of Enterprise Security

Keynoter James Robinson, Director, Risk & Threat Management, Office of the CISO at Optiv discusses why security departments fail (and what you can do about it). He's just one of the security all-stars offering their in-depth views on the myths surrounding data defense. Save the date: Tuesday, Nov 15, 11 am - 5:15 PM ET.


Tech Resources
ACCESS TECH LIBRARY NOW

  • The Global Privacy Challenge

    Are you doing business internationally? Think about it: Do you even know if your corporate data might be stored internationally? Privacy regulations vary dramatically in regions around the globe. The differences between doing business in the EU versus the US ...

  • Spearphishing & Targeted Social Engineering Attacks On Your Users

    In this eye-opening webinar, top experts on phishing and social engineering will discuss the motives and methods that attackers use to execute these targeted "spearphishing" attacks. You'll get insight on how the attackers choose their social engineering targets, the methods ...

MORE WEBINARS

Partner Perspectives

Every Minute Of Security Planning Will Save You 10 Minutes In Execution
Leveraging automation, orchestration, and interoperability in your cybersecurity plans now will save you significant time later.

Ransomware Doesn't Have To Mean Game Over
3 methods can help you recover from a ransomware attack relatively unscathed.

Automate And Orchestrate Workflows For Better Security
Security automation has become a central goal for many organizations as they try to respond faster to more threats with limited resources.

FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.