Follow Dark Reading:
 August 16, 2019
LATEST SECURITY NEWS & COMMENTARY
More Than 20 Data Breaches Reported Per Day in First Half of 2019
But incidents involving SSNs, addresses, birth dates were smaller than in previous years.
NSA Researchers Talk Development, Release of Ghidra SRE Tool
NSA researchers took the Black Hat stage to share details of how they developed and released the software reverse-engineering framework.
The Mainframe Is Seeing a Resurgence. Is Security Keeping Pace?
The old-school technology is experiencing new popularity, but too many people assume mainframes are inherently secure.
68% of Companies Say Red Teaming Beats Blue Teaming
The majority of organizations surveyed find red team exercises more effective than blue team testing, research shows.
The Flaw in Vulnerability Management: It's Time to Get Real
Companies will never be 100% immune to cyberattacks. But by having a realistic view of the basics, starting with endpoint vulnerabilities, we can build for a safer future.
New Research Finds More Struts Vulnerabilities
Despite aggressive updating and patching, many organizations are still using versions of Apache Struts with known -- and new -- vulnerabilities.
Adware, Trojans Hit Education Sector Hard
Students continue to be weak links for schools and universities, according to data from security firm Malwarebytes.
MORE NEWS & COMMENTARY
HOT TOPICS
The California Consumer Privacy Act's Hidden Surprise Has Big Legal Consequences
The CCPA's provision devoted to 'reasonable' cybersecurity procedures and policies could trip up your business. Get ready now.

Apple's New Bounty Program Has Huge Incentives, Big Risks
Industry observers applaud the program's ability to find exploits but fear unintended consequences.

MORE
EDITORS' CHOICE

7 Biggest Cloud Security Blind Spots
Cloud computing boon is for innovation, yet security organizations find themselves running into obstacles.
NEW FROM THE EDGE

5 Things to Know About Cyber Insurance
More businesses are recognizing the need for cyber insurance as part of an overall security strategy. Here are some key points to consider when evaluating, purchasing, and relying on a policy.
Tech Resources
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.