Follow Dark Reading:
 February 07, 2017
LATEST SECURITY NEWS & COMMENTARY
Vulnerabilities Hit High Water Mark in 2016
The good news is that coordinated disclosure keeps getting better.
Appeals Court Orders Review Of 2015 Target Breach Settlement
Order follows victim appeal to hold the retailer liable for future identity theft claims stemming from the 2013 breach.
Talking Cybersecurity From A Risk Management Point of View
CenturyLink CSO David Mahon reflects on the evolution of the chief information security officer and why today's CISOs are increasingly adopting a risk-based approach to security.

Name That Toon: Mobile (In)Security

Submit your caption in the comments, and our panel of experts will reward the winner with a $25 Amazon gift card.


MORE NEWS & COMMENTARY
HOT TOPICS
Windows SMB Zero-Day Exploit On The Loose
Vulnerability allows remote attackers to trigger denial-of-service conditions on several Windows client versions.

Metasploit Can Now Be Directly Linked To Hardware For Vulnerability Testing
New hardware bridge extends penetration testing tools capabilities into physical world.

10 Essential Elements For Your Incident-Response Plan
The middle of a DDoS attack or ransomware infection is hardly the time to start talking about divisions of labor, or who should do what when.

MORE
THREAT INTEL SURVEY

Share Your Threat Intelligence Practices

Answer 20 confidential questions exploring how enterprises collect and use threat intelligence data and enter a contest to win an iPad Air. Results will be published on Dark Reading.


Tech Resources
ACCESS TECH LIBRARY NOW

MORE WEBINARS

Partner Perspectives

Outsider Attacks Give Nightmares To CIOs, CEOs, CISOs
Three main threats companies aren't prepared to handle include outside attacks, data vulnerability and insider sabotage.

Meet 'Fruitfly:' Mac Malware Targeting Biomedical Research Centers
This newly discovered code contains indications that it has been circulating undetected for at least a couple years.

Machine Learning In Cybersecurity Warrants A Silver Shotgun Shell Approach
When protecting physical or virtual endpoints, it's vital to have more than one layer of defense against malware.

FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.