Follow Dark Reading:
 July 15, 2016
LATEST SECURITY NEWS & COMMENTARY
What SMBs Need To Know About Security But Are Afraid To Ask
A comprehensive set of new payment protection resources from the PCI Security Standards Council aims to help small- and medium-sized businesses make security a priority.
What's Next For Canada's Surveillance Landscape?
Edward Snowden headlines SecTor security conference as Canadian privacy advocates await the Trudeau government's next move in the country's complex privacy and security debate.
Sandia Labs Researchers Build DNA-Based Encrypted Storage
Researchers at Sandia National Laboratories in New Mexico are experimenting with encrypted DNA storage for archival applications.
72% of Black Hat Attendees Expect To Be Hit By 'Major' Data Breach Within A Year
End users are the biggest weakness, and we're not doing enough to address the problem.
1 In 3 Consumers Worldwide Hit By Payment Card Fraud
Card scam cases on the rise globally reportedly due to an increase in smartphone and tablet usage, study finds.
FDIC Likely Hacked By China But Covered Up Breach, Report Says
A 2013 FDIC internal memo indicates a cover-up of China breach by employees to protect chairman's job.
MORE NEWS & COMMENTARY
HOT TOPICS
New 'Ranscam' Ransomware Lowers The Bar But Raises The Stakes
Cisco Talos researchers discover new variant that doesn't decrypt your files after you pay up--it has already deleted them.

Does Defense In Depth Still Work Against Today's Cyber Threats?
Yes. But not for much longer unless the industry shifts to an automated security and zero trust model.

MORE
EDITORS' CHOICE

Profiles Of The Top 7 Bug Hunters From Around the Globe
'Super hunters' share a common goal: to find the most high impact valid bugs before a bad guy does.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Millennials are Changing the Definition of Customer Care

    Millennials know exactly what they want and expectations are high - very high. They are empowered in their personal life and demand the same in business. Because they are always on and always connected, using everything from mobile devices to ...

  • Analytics & the Making of a President

    Join All Analytics Radio to learn about the use of analytics in presidential campaigns. What you learn by attending can provide insight into what the candidates know about you and millions of other citizens, and it can demonstrate what your ...

MORE WEBINARS

Partner Perspectives

Context-Rich And Context-Aware Cybersecurity
An adaptive threat-prevention model is quickly replacing traditional, unintegrated architectures as security teams work to achieve a sustainable advantage against complex threats.

Saving The Security Operations Center With Endpoint Detection And Response
EDR is the beginning of our return to control in the fight against cybercrime.

Shifting The Economic Balance Of Cyberattacks
Our goal should be to simply make the cost of conducting a cyberattack so expensive that cybercriminals view attacking our organization as a bad return on investment.

FEATURED REPORTS
  • Forrester Report: Cloud Powers The New Connected Economy

    This May 2016 Forrester report explores a landscape in which organizations in every industry are moving forward from cloud adoption to cloud creation and participation. Learn how you are a member of this networked economy & how the steps you take may ...

  • Gartner Magic Quadrant for Operational Database Management

    When it comes to managing your data, the choice is clear: Microsoft is an industry leader in operational database management systems (ODBMS). Don't take our word for it; read Gartner's assessment of the ODBMS landscape and see how Microsoft stacks ...

MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.