Follow Dark Reading:
 June 30, 2016
LATEST SECURITY NEWS & COMMENTARY
The Attribution Question: Does It Matter Who Attacked You?
Everyone will ask whodunnit, but how can an organization put that information to practical use during disaster recovery and planning for the future?
How To Bridge The Cyber Insurance Gap
CISOs and insurance executives must unite and create more defined terminology and expectations for cyber insurance.
The Newbie's 'How To Survive Black Hat' Guide
There's little chance you won't be totally exhausted after "drinking from the information firehose" all week. But if you follow these eight steps, it will be a very satisfying kind of fatigue.
Legit Tools Helping Attackers Hide Malicious Activity, Study Finds
Malware often just used only for initial break-in, LightCyber report says.
Hackers Pilfer $10 Million From Ukraine Bank
Reports allege criminals used SWIFT to transfer money, have compromised several Ukraine, Russia banks.
Over 25,000 IoT CCTV Cameras Used In DDoS Attack
Probe uncovers attacks generated from 105 global locations and delivering 50,000 HTTP requests per second.
MORE NEWS & COMMENTARY
HOT TOPICS
Cerber Strikes With Office 365 Zero-Day Attacks
Ransomware variant continues its success through chameleon-like reinvention.

5 Ways To Think Like A Hacker
Security expert says CISOs need to use simulations more effectively so they can understand how hackers work and beat them at their own game.

Mind The Gap: CISOs Versus 'Operators'
How open communication among security execs and analysts, incidents responders, and engineers can help organizations stay on top of the constantly changing threat landscape.

MORE
EDITORS' CHOICE

Recalibrating Cybersecurity Spending Projections
How big and how fast will the cybersecurity market grow in five years? Inquiring minds want to know.
Tech Resources

Partner Perspectives

Shifting The Economic Balance Of Cyberattacks
Our goal should be to simply make the cost of conducting a cyberattack so expensive that cybercriminals view attacking our organization as a bad return on investment.

Adaptive Security Demands A Shift In Mindset: Part 2 In A Series
By adopting new ways of thinking about security, improving the capabilities of existing systems, and integrating key innovations, enterprises will be well on their way to better security.

The Importance Of Taking A More Active Role To Protect Our Data
Big data has lots of potential to make our decisions more efficient and effective. But like any powerful substance, too much in the wrong hands can have disastrous consequences.

FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.