Follow Dark Reading:
 March 10, 2016
LATEST SECURITY NEWS & COMMENTARY
Two Biggest Reasons Ransomware Keeps Winning
New report also makes predictions on what hijinks ransomware might get up to next.
Why Security & DevOps Can't Be Friends
Legacy applications are a brush fire waiting to happen. But retrofitting custom code built in the early 2000's is just a small part of the application security problem.
Patch Management Still Plagues Enterprise
Half of organizations don't even know difference between applying a patch and remediating a vulnerability.
MORE NEWS & COMMENTARY
HOT TOPICS
Forgot My Password: Caption Contest Winners Announced
Sticky notes, clouds and authentication jokes. And the winning caption is...

IoT Security Checklist: Get Ahead Of The Curve
The security industry needs to take a Consumer Reports approach to Internet of Things product safety, including rigorous development practices and both physical and digital testing.

Free 'DCEPT' Tool Entraps Attackers Stealing Admin Credentials
SecureWorks researchers offer their homegrown 'honeytoken' detection tool as open-source.

MORE
ICYMI: Best of Dark Reading

10 Security Certifications To Boost Your Career

Earning a security credential can help you open the door to a great job. But you need to know which certification is the right one for you.


Tech Resources
ACCESS TECH LIBRARY NOW

  • Deliver the best user experience

    Attend this webinar to learn how to gain a competitive advantage by delivering the very best user experience with improvements based on actual application performance, including mobile, mainframe, on-premises infrastructure, the cloud, and user feedback.

  • The Analytics Job and Salary Outlook for 2016

    With data science and big data top-of-mind for all types of organizations, hiring analytics professionals often was a challenge for managers in 2015. For the professional with good data skills, that meant not only full employment but some decent bumps in ...

MORE WEBINARS

Partner Perspectives

Knowledge Gap Series: The Myths Of Analytics
It may not be rocket science, but it is data science.

Protection Is Necessary, But Not Sufficient
It's time to move the conversation beyond malware and point defenses and onto dealing with breaches in their entirety.

The Machines Are Coming! The Machines Are Coming!
A revolution in human-machine teaming for security operations is at hand.

FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.