Follow Dark Reading:
 March 07, 2016
LATEST SECURITY NEWS & COMMENTARY
When Encryption Becomes The Enemy's Best Friend
The growth in SSL/TLS traffic has made it a lot easier for threat actors to slip attacks and malware past enterprise defenses.
Cloud Survival Guide: 3 Tips For CISOs
To thrive in the cloud era, CISOs must refashion their roles as business enablers, adopt automation wherever possible, and go back to the basics on security hygiene.
Free 'DCEPT' Tool Entraps Attackers Stealing Admin Credentials
SecureWorks researchers offer their homegrown 'honeytoken' detection tool as open-source.
MORE NEWS & COMMENTARY
HOT TOPICS
Better Locks Than Back Doors: Why Apple Is Right About Encryption
What the landmark privacy case and a new documentary about Stuxnet both have to say about the encryption versus government oversight debate.

Liability in the Cyborg Age
At RSA conference, cyborg anthropologists discuss legal quagmires that occur when we invite tech into our bodies and ask machines to start making decisions for us.

Why Your Security Tools Are Exposing You to Added Risks
The big lesson from 12 months of security product vulnerabilities: there's no foundation of trust in any piece of software. They all represent a potential new attack vector.

MORE
EDITORS' CHOICE

Truly Random Number Generator Promises Stronger Encryption Across All Devices, Cloud
So long pseudo-random number generator. Quantum mechanics brought us true randomness to power our crypto algorithms, and it's strengthening encryption in the cloud, datacenter, and the Internet of Things.
Tech Resources
ACCESS TECH LIBRARY NOW

  • The Analytics Job and Salary Outlook for 2016

    With data science and big data top-of-mind for all types of organizations, hiring analytics professionals often was a challenge for managers in 2015. For the professional with good data skills, that meant not only full employment but some decent bumps in ...

  • [Security] Identity & Behavioral Biometrics

    Despite millions spent each year on security, breaches still persist thanks to the compromised user credentials. How can you make the most of your existing security investments, while ensuring those who access your network are who they say they are?

MORE WEBINARS

Partner Perspectives

Protection Is Necessary, But Not Sufficient
It's time to move the conversation beyond malware and point defenses and onto dealing with breaches in their entirety.

The Machines Are Coming! The Machines Are Coming!
A revolution in human-machine teaming for security operations is at hand.

What Should Security Cost?
Understanding the economics of information security.

FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.