Follow Dark Reading:
 July 01, 2017
LATEST SECURITY NEWS & COMMENTARY
9 Ways to Protect Your Cloud Environment from Ransomware
The same technology driving faster collaboration and data transfer also enables cybercriminals to quickly spread ransomware.
The Case for Crowdsourcing Security Buying Decisions
Why our industry needs a sharing platform with open and transparent access to peer knowledge, meaningful metrics, and transparency around security products and services
US Tech Companies Argued to Maintain Russia Spy Agency Ties
US technology companies lobbied the US government to create exceptions for a ban on business relationships with Russia's Federal Security Service.
Vulnerabilities Found in German e-Government Communication Library
Researchers find critical flaws in secure communications protocol used in areas including population registration, justice and public health systems.
8tracks Hit With Breach of 18 Million Accounts
Hackers attack Internet radio user database, gaining access to email addresses and encrypted passwords.
MORE NEWS & COMMENTARY
HOT TOPICS
Petya Or Not? Global Ransomware Outbreak Hits Europe's Industrial Sector, Thousands More
With echoes of WannaCry, infections spread fast. Some security researchers describe malware as variant of Petya; others say it's a brand new sample.

Massive Skype Zero-Day Enables Remote Crashes
A security researcher uncovered a Skype vulnerability that could allow hackers to remotely execute code and crash software if exploited.

8 Hot Hacking Tools to Come out of Black Hat USA
High-impact tools for white hats that will be revealed and released next month at Black Hat USA in Las Vegas.

MORE
EDITORS' CHOICE

How To (And Not To) Make the Online Trust Honor Roll
Five websites generated the highest score in their sector for the 2017 Online Trust Audit & Honor Roll. Here is what it takes to get there and be listed among the Online Trust Alliance's Top 50
[Strategic Security Report] How Enterprises Are Attacking the IT Security Problem
Enterprises are spending more of their IT budgets on cybersecurity technology. How do your organization's security plans and strategies compare to what others are doing? Here's an in-depth look.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Analytics 2017: What we Learned & What?s to Come

    At AllAnalytics, our editors have interviewed countless experts, attended numerous events (virtually and in person), and have tracked the news and opinion related to technology, analytics, artificial intelligence, and more. We've talked to CIOs, CTOs, data scientists, data analysts, recruiters, ...

  • How Cloud Can Help You Streamline Business Workflow

    In order to optimize your utilization of cloud computing, you need to be able to deliver reliable and scalable high performing application over your corporate network. Your business counterparts will expect you to provide network performance that can handle all ...

MORE WEBINARS

Partner Perspectives

Doxing, DoS & Defacement: Today's Mainstream Hacktivism Tools
Anyone can get angry at you and become a hacktivist. Here's how to protect your organization from these increasingly common cyber attacks.

Compliance in the Cloud Needs To Be Continuous & Automated
Complex IT environments require timely visibility into risk and compliance.

Talking Cyber-Risk with Executives
Explaining risk can be difficult since CISOs and execs don't speak the same language. The key is to tailor your message for the audience.

FEATURED REPORTS
  • [Dark Reading] Security Spending Survey

    Enterprises are spending an unprecedented amount of money on IT security -- where does it all go? In this survey, Dark Reading polled senior IT management on security budgets and spending plans, and their priorities for the coming year. Download ...

  • [Interop ITX 2017] State Of DevOps Report

    The DevOps movement brings application development and infrastructure operations together to increase efficiency and deploy applications more quickly. But embracing DevOps means making significant cultural, organizational, and technological changes. This research report will examine how and why IT organizations are ...

MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.