Follow Dark Reading:
 July 26, 2018
LATEST SECURITY NEWS & COMMENTARY
The ABCs of Hacking a Voting Machine
A hacker who successfully infiltrated a voting machine at last year's DEF CON will demonstrate at Black Hat USA how he did it, as well as what he later found stored on other decommissioned WinVote machines.
US Intel Officials Share Their National Cybersecurity Concerns
Leaders in the security sector discuss the most pressing cyberthreats threatening the United States and what can be done to mitigate them.
New Report Shows Pen Testers Usually Win
Pen testers are successful most of the time, and it's not all about stolen credentials, according to a new report based on hundreds of tests.
US-CERT Warns of ERP Application Hacking
ERP applications such as Oracle and SAP's are open to exploit and under attack, according to a new report referenced in a US-CERT warning.
Threat Hunting: Rethinking 'Needle in a Haystack' Security Defenses
In cyber, needles (that is, threats) can disappear quickly, for a variety of reasons, and long often after hackers have completed what they came to do.
Iranian Hacker Group Waging Widespread Espionage Campaign in Middle East
Unlike other threat actors that have a narrow set of targets, Leafminer has over 800 organizations in its sights, Symantec says.
London Calling with New Strategies to Stop Ransomware
The new London Protocol from the Certificate Authority Security Council/Browser Forum aims to minimize the possibility of phishing activity on high-value identity websites.
MORE NEWS & COMMENTARY
HOT TOPICS
72% of CEOs Steal Corporate IP from Former Employers
Employees often take corporate IP because they feel ownership over their work, a trend security experts say is a problem.

6 Ways to Tell an Insider Has Gone Rogue
Malicious activity by trusted users can be very hard to catch, so look for these red flags.

What the Incident Responders Saw
New report on IR professionals' experiences reveals just how advanced attackers, such as nation-state hackers, dig in even after they're detected.

MORE
EDITORS' CHOICE

7 Ways to Better Secure Electronic Health Records
Healthcare data is prime targets for hackers. What can healthcare organizations do to better protect all of that sensitive information?
The Fundamental Flaw in Security Awareness Programs
It's a ridiculous business decision to rely on the discretion of a minimally trained user to thwart a highly skilled sociopath, financially motivated criminal, or nation-state.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Active Archive & Data Repository with Hadoop

    Once you've begun to use Hadoop for ETL offload, the next logical steps on your journey toward the data warehouse of the future are to create an active archive and a data repository. This webinar will teach you how!

  • Improving Enterprise Authentication

    Learn about emerging methods for solving the authentication problem, and the need for building authentication strategies that go beyond the enterprise premises.

MORE WEBINARS
FEATURED REPORTS
  • 2018 State of the Cloud Report

    Cloud adoption is growing, but how are organizations taking advantage of it? Interop ITX and InformationWeek surveyed technology decision-makers to find out, read this report to discover what they had to say!

  • 2017 State of IT Report

    In today's technology-driven world, "innovation" has become a basic expectation. IT leaders are tasked with making technical magic, improving customer experience, and boosting the bottom line -- yet often without any increase to the IT budget. How are organizations striking ...

MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Weekly
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Weekly Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.