[TechWeb](?_mc=NL_DR_EDT_DR_daily_20170325&cid=NL_DR_EDT_DR_daily_20170325&elqTrackId=ab1a49957c2747b787cc62826c21629a&elq=1de6f2319d6c483bbf0daaf76bfdc83c&elqaid=77538&elqat=1&elqCampaignId=26049)
Follow Dark Reading:
[RSS](
March 25, 2017
Top!Top
LATEST SECURITY NEWS & COMMENTARY
[Apple: Mac, iPhone Bugs That CIA Allegedly Exploited Were Fixed Years Ago](
New WikiLeaks data dump describes "Sonic Screwdriver," other CIA exploits for Mac desktops and iPhones
[Intro to Cyber Insurance: 7 Questions to Ask](
Buying a cyber insurance policy can be complex and difficult. Make sure you're asking these questions as you navigate the process.
[Sandia Testing New Intrusion Detection Tool That Mimics Human Brain](
Neuromorphic Data Microscope can spot malicious patterns in network traffic 100 times faster than current tool, lab claims.
[Google Slams Symantec for 'Failures' in SSL/TLS Certificate Process](
Google Chrome engineers railed on Symantec for allegedly issuing thousands of security certificates that had not been properly validated.
[Prioritizing Threats: Why Most Companies Get It Wrong](
To stay safer, focus on multiple-threat attack chains rather than on individual threats.
[America's JobLink Suffers Security Breach](
A third-party hacker exploited a flaw in America's JobLink application code to access the information of job seekers from 10 states.
[US Senate Overturns Obama Consumer Privacy Rule](
The FCC regulation, passed in October, was rejected in a 50-to-48 vote and is now in the House of Representatives.
[MORE NEWS & COMMENTARY](
HOT TOPICS
[Future of the SIEM](
Current SIEM systems have flaws. Here's how the SIEM's role will change as mobile, cloud, and IoT continue to grow.
[New Wave of Security Acquisitions Signals Start of Consolidation Trend](
A dozen recent high-profile deals reflect cybersecurity vendors' hopes of expanding their offerings with next-generation technology, ideas, and talent.
[MORE](
EDITORS' CHOICE
[7 Steps to Transforming Yourself into a DevSecOps Rockstar](
Security practitioners at one education software firm offer lessons learned from merging DevOps with security.
Tech Resources
- [Guide To AV Replacement](
- [Stop Malware & Non-Malware Attacks with Streaming Prevention](
- [[Gartner Market Guide] Managed Detection & Response Services](mdr)/387853?_mc=NL_DR_EDT_DR_daily_20170325&cid=NL_DR_EDT_DR_daily_20170325&elqTrackId=aac2dec2e357472d925fa0857fef79e6&elq=1de6f2319d6c483bbf0daaf76bfdc83c&elqaid=77538&elqat=1&elqCampaignId=26049)
- [Timeline of Ransomware Infection - When Cryptors Attack](
- [Internet of Threats: Security In The Growing IoT Market](
- [Preparing for Compliance with General Data Protection Regulation](
- [SAS Viya: An innovative, cloud-ready architecture designed for any analytical challenge](
[ACCESS TECH LIBRARY NOW](
- [NGES (Next Gen Endpoint Security): Tips & Key Considerations for Evaluating Solutions](
Next generation endpoint security (NGES) is one of the hottest topics in today's cybersecurity market, and for good reason. Traditional preventative measures alone offer insufficient endpoint protection - causing an influx of vendors offering NGES. While the market is relatively ...
- [IT Careers 3.0: What You Need to Get Ahead](
In the early years of tech, hard skills were all you needed. Over the last decade, the emphasis shifted to include soft skills such as communication, writing, time management, and collaboration. Today's employers want all of that, plus a working ...
[MORE WEBINARS](
Partner Perspectives
[Malware Explained: Packer, Crypter & Protector](
These three techniques can protect malware from analysis. Here's how they work.
[7 Things You Need to Know about Bayesian Spam Filtering](
Knowing how spam filters work can clarify how some messages get through, and how your own emails can avoid being caught.
[4 Ways to Recover from a Cyberattack](
Be prepared and act quickly are two key steps that will help you bounce back quickly from a cyberattack.
Middle!Middle
FEATURED REPORTS
- [The Evolution of Analytics: Opportunities & Challenges](
- [The Top Cybersecurity Risks & How Enterprises Are Responding](
The information security landscape is a constantly shifting risk environment. Today's IT security department must manage both internal and external threats' ranging from malware to mobile device vulnerabilities, to cloud security and ransomware. Download the Dark Reading 2016 Strategic Security Survey ...
[MORE REPORTS](
CURRENT ISSUE
[5 Security Technologies to Watch in 2017](
[DOWNLOAD THIS ISSUE]( [SUBSCRIBE NOW](
[BACK ISSUES]( | [MUST READS]( | [TECH DIGEST](
PRODUCTS & RELEASES
[NSS Labs Joins (IT-ISAC) for Strategic Threat Intelligence Sharing](it-isac)-for-strategic-threat-intelligence-sharing/d/d-id/1328421?_mc=NL_DR_EDT_DR_daily_20170325&cid=NL_DR_EDT_DR_daily_20170325&elqTrackId=0a733c85647646fab7ff06748677b338&elq=1de6f2319d6c483bbf0daaf76bfdc83c&elqaid=77538&elqat=1&elqCampaignId=26049)
[Registration Opens for U.S. Cyber Quests Competition](
[Senate Votes to Gut Broadband Privacy Rules](
[MORE PRODUCTS & RELEASES](
Dark Reading Daily
-- Published By [InformationWeek](?_mc=NL_DR_EDT_DR_daily_20170325&cid=NL_DR_EDT_DR_daily_20170325&elqTrackId=d0761279ae304f7293d720ad97144eda&elq=1de6f2319d6c483bbf0daaf76bfdc83c&elqaid=77538&elqat=1&elqCampaignId=26049)
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, [cick here.](
To opt-out of any future Dark Reading Daily Newsletter emails, please respond [here.](
Thoughts about this newsletter? [Give us feedback.](mailto:email@techwebnewsletters.com)
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our [Privacy Statement.](
[© 2017]( | [UBM Tech]( | [Privacy Statement]( | [Terms Of Service]( | [Contact Us](mailto:iwkbtnnewsletters@ubm.com)