Follow Dark Reading:
 March 08, 2016
LATEST SECURITY NEWS & COMMENTARY
First Fully Functional Mac Ransomware Contained Before It Could Cause Havoc
KeRanger slips by Apple's protections by piggybacking on legitimate BitTorrent client.
Automakers In The Hotseat For Vehicle Cybersecurity
Car cybersecurity one to three years behind threats, as drivers look to automakers to secure vehicles from hacking.
Cloud Survival Guide: 3 Tips For CISOs
To thrive in the cloud era, CISOs must refashion their roles as business enablers, adopt automation wherever possible, and go back to the basics on security hygiene.
MORE NEWS & COMMENTARY
HOT TOPICS
Free 'DCEPT' Tool Entraps Attackers Stealing Admin Credentials
SecureWorks researchers offer their homegrown 'honeytoken' detection tool as open-source.

Why Your Security Tools Are Exposing You to Added Risks
The big lesson from 12 months of security product vulnerabilities: there's no foundation of trust in any piece of software. They all represent a potential new attack vector.

Better Locks Than Back Doors: Why Apple Is Right About Encryption
What the landmark privacy case and a new documentary about Stuxnet both have to say about the encryption versus government oversight debate.

MORE
EDITORS' CHOICE

Hack The Pentagon: DoD Launches First-Ever Federal Bug Bounty Program
Defense Secretary Ash Carter offers insight into DoD's new vulnerability-hunting program that offers monetary awards.
Tech Resources
ACCESS TECH LIBRARY NOW

  • [APM] Go From Pure Data to User Enlightenment with APM

    Attend this webinar to learn how to gain a competitive advantage by delivering the very best user experience with improvements based on actual application performance, including mobile, mainframe, on-premises infrastructure, the cloud, and user feedback.

  • The Analytics Job and Salary Outlook for 2016

    With data science and big data top-of-mind for all types of organizations, hiring analytics professionals often was a challenge for managers in 2015. For the professional with good data skills, that meant not only full employment but some decent bumps in ...

MORE WEBINARS

Partner Perspectives

Protection Is Necessary, But Not Sufficient
It's time to move the conversation beyond malware and point defenses and onto dealing with breaches in their entirety.

The Machines Are Coming! The Machines Are Coming!
A revolution in human-machine teaming for security operations is at hand.

What Should Security Cost?
Understanding the economics of information security.

FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.