Follow Dark Reading:
 July 15, 2017
LATEST SECURITY NEWS & COMMENTARY
50,000 Machines Remain Vulnerable to EternalBlue Attacks
Researcher's free scanner tool finds many systems remain at risk of EternalBlue-based attacks like WannaCry and NotPetya.
7 Deadly Sins to Avoid When Mitigating Cyberthreats
How digitally savvy organizations can take cyber resilience to a whole new dimension.
AsTech Offers a $5 Million Security Breach Warranty
AsTech expands its warranty program with a guarantee it will find Internet application vulnerabilities or it will pay up to $5 million if there is a breach.
MORE NEWS & COMMENTARY
HOT TOPICS
Microsoft Patches Critical Zero-Day Flaw in Windows Security Protocol
Researchers at Preempt uncovered two critical vulnerabilities in the Windows NTLM security protocols, one of which Microsoft patched today.

Verizon Suffers Cloud Data Leak Exposing Data on Millions of Customers
Six million of Verizon's US customers had their personal and account information exposed, including PIN numbers.

How Code Vulnerabilities Can Lead to Bad Accidents
The software supply chain is broken. To prevent hackers from exploiting vulnerabilities, organizations need to know where their applications are, and whether they are built using trustworthy components.

MORE
EDITOR'S CHOICE

Desperately Seeking Security: 6 Skills Most In Demand
When people say there's a security skills gap, this is what they really mean.
Tech Resources
ACCESS TECH LIBRARY NOW

  • New Security Technologies: Advice & Best Practices on Selecting The Right One

    Given today's threat landscape, combined with so many security options available today, it can be daunting when selecting new or alternative technologies to protect your business. Your security team has unique challenges; therefore, you should be asking your next security ...

  • AI Through the Consumer's Eyes

    Beyond the gimmick factor, what can AI projects such as Alexa, autonomous vehicles, and companion robots offer your business? This session will look at some additional benefits that many may not have considered including customer intelligence, data collection, and customer ...

MORE WEBINARS

Partner Perspectives

The Hunt for Networks Building Death Star-Sized Botnets
Internet of Things devices are more critically vulnerable to compromise in DDos attacks than ever before. Here's how to defend against them.

Securing your Cloud Stack from Ransomware
Poor configuration, lack of policies, and permissive behaviors are three factors that can leave your cloud infrastructure vulnerable to ransomware threats.

Security Experts & Hackers: We're Not So Different
Using the similarities among hackers and security programmers can be an advantage.

FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.