CenturyLink CSO David Mahon reflects on the evolution of the chief information security officer and why today's CISOs are increasingly adopting a risk-based approach to security.
Answer 20 confidential questions exploring how enterprises collect and use threat intelligence data and enter a contest to win an iPad Air. Results will be published on Dark Reading.
In this webinar, learn some of the latest attacks in phishing, vishing, scary new stains of ransomware, and whaling (business email compromise), some of the social engineers' tricks of the trade and how to use them to improve the effectiveness ...
This online event, hosted by the editors of Dark Reading, brings together IT security leaders, business executives, and cyber threat experts will provide you with a holistic view of the costs and benefits of information security investments.
The information security landscape is a constantly shifting risk environment. Today's IT security department must manage both internal and external threats' ranging from malware to mobile device vulnerabilities, to cloud security and ransomware. Download the Dark Reading 2016 Strategic Security Survey ...
Keep This Newsletter Out Of Your SPAM Folder Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.