Follow Dark Reading:
 March 15, 2016
LATEST SECURITY NEWS & COMMENTARY
FBI's Most Wanted Cybercriminals
The Federal Bureau of Investigation has got millions of dollars worth of rewards waiting for those who can help them nab these accused cyber thieves, spies and fraudsters.
5 Hot Security Job Skills
Cybersecurity job openings are looking for people with a blend of technical, security, and industry-specific talents -- and it helps to know Python, Hadoop, MongoDB, and other big-data analysis tools, too.
Understanding The 2 Sides Of Application Security Testing
Everybody likes to focus on the top 10 vulnerabilities but I've never found a company with a top 10 vulnerabilities problem. Every company has a different top 10.

Cartoon: Getting To Know You

John Klossner's humorous perspective on privacy and PII.


MORE NEWS & COMMENTARY
HOT TOPICS
Two Biggest Reasons Ransomware Keeps Winning
New report also makes predictions on what hijinks ransomware might get up to next.

Hackers' Typo Foils Their $1 Billion Wire Transfer Heist
Stolen credentials are no use without good spelling.

Security Lessons From "The Gluten Lie"
How faith healers and security vendors have learned what lies work.

MORE
EDITORS' CHOICE: TOMORROW!

Dark Reading Radio: When Will Passwords Finally Die?
Join us this Wednesday, March 16, at 1pm EDT/10am PDT, for the next episode of Dark Reading Radio.
Tech Resources
ACCESS TECH LIBRARY NOW

  • [UX] How to Deliver the Best App Experience to Users

    Attend this webinar to learn how to gain a competitive advantage by delivering the very best user experience with improvements based on actual application performance, including mobile, mainframe, on-premises infrastructure, the cloud, and user feedback.

  • [Security] Identity & Behavioral Biometrics

    Despite millions spent each year on security, breaches still persist thanks to the compromised user credentials. How can you make the most of your existing security investments, while ensuring those who access your network are who they say they are?

MORE WEBINARS

Partner Perspectives

Who Took The Cookies From The Cookie Jar?
The indictment of five Iranian hackers three years after the fact raises the question: Is naming them a worthwhile part of the threat defense lifecycle, or is it a meaningless distraction?

Data In The Cloud: What Everyone Should Know
When vetting a cloud or SaaS provider, it is imperative that you find out how they handle data security and privacy. Here are some key questions to ask.

Knowledge Gap Series: The Myths Of Analytics
It may not be rocket science, but it is data science.

FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.