Follow Dark Reading:
 March 09, 2016
LATEST SECURITY NEWS & COMMENTARY
Patch Management Still Plagues Enterprise
Half of organizations don't even know difference between applying a patch and remediating a vulnerability.
Forgot My Password: Caption Contest Winners Announced
Sticky notes, clouds and authentication jokes. And the winning caption is...
The New BEC Phishing Attack: Stealing Data Instead Of Cash
Duped by phishers posing as company executives, Seagate and Snapchat expose employee tax, payroll data.
A Warning for Wearables: Think Before You Emote
An examination of how wearable devices could become the modern equivalent of blogs broadcasting proprietary workplace information directly to the Internet of Things -- and beyond.
MORE NEWS & COMMENTARY
HOT TOPICS
Free 'DCEPT' Tool Entraps Attackers Stealing Admin Credentials
SecureWorks researchers offer their homegrown 'honeytoken' detection tool as open-source.

When Encryption Becomes The Enemy's Best Friend
The growth in SSL/TLS traffic has made it a lot easier for threat actors to slip attacks and malware past enterprise defenses.

MORE
EDITORS' CHOICE

Hottest Topics To Come Out Of RSA Conference
Encryption, bug bounties, and threat intel dominated the mindshare of the cybersecurity hive mind at RSAC last week.
Tech Resources
ACCESS TECH LIBRARY NOW

  • [APM] Go From Pure Data to User Enlightenment with APM

    Attend this webinar to learn how to gain a competitive advantage by delivering the very best user experience with improvements based on actual application performance, including mobile, mainframe, on-premises infrastructure, the cloud, and user feedback.

  • The Analytics Job and Salary Outlook for 2016

    With data science and big data top-of-mind for all types of organizations, hiring analytics professionals often was a challenge for managers in 2015. For the professional with good data skills, that meant not only full employment but some decent bumps in ...

MORE WEBINARS

Partner Perspectives

Knowledge Gap Series: The Myths Of Analytics
It may not be rocket science, but it is data science.

Protection Is Necessary, But Not Sufficient
It's time to move the conversation beyond malware and point defenses and onto dealing with breaches in their entirety.

The Machines Are Coming! The Machines Are Coming!
A revolution in human-machine teaming for security operations is at hand.

FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.