Follow Dark Reading:
 July 20, 2017
LATEST SECURITY NEWS & COMMENTARY
Best of Black Hat: 20 Epic Talks in 20 Years
In celebration of Black Hat's 20th birthday, we take a look back at the most memorable presentations and demos since the show's inception in 1997.
Online Courses Projected to Drive Credit Card Fraud to $24B by 2018
An underground ecosystem provides cybercriminals with online tutorials, tools, and credit card data they need to commit fraud.
Catastrophic Cloud Attack Costs Would Rival that of Hurricane Damages
Lloyd's of London estimates multi-billion-dollar loss figures in worst-case scenarios of a major zero-day exploit or massive cloud outage.
Most Office 365 Admins Rely on Recycle Bin for Data Backup
Nearly 66% of Office 365 administrators use Recycle Bin to back up their data, a practice that could leave data lost and unrecoverable.
'AVPass' Sneaks Malware Past Android Antivirus Apps
Researchers at Black Hat USA will release a toolset that studies and then cheats specific Android AV apps.
98% of Companies Favor Integrating Security with DevOps
A majority of companies are either planning or have launched an integrated DevOps and security team, a new report shows.
4 Steps to Securing Citizen-Developed Apps
Low- and no-code applications can be enormously helpful to businesses, but they pose some security problems.
MORE NEWS & COMMENTARY
HOT TOPICS
Apple iOS Malware Growth Outpaces that of Android
Number of iOS devices running malicious apps more than tripled in three consecutive quarters, while infected Android devices remained largely flat, report shows.

7 Deadly Sins to Avoid When Mitigating Cyberthreats
How digitally savvy organizations can take cyber resilience to a whole new dimension.

AWS S3 Breaches: What to Do & Why
Although basic operations in Amazon's Simple Storage Services are (as the name implies) - simple - things can get complicated with access control and permissions.

MORE
IN CASE YOU MISSED IT

(Sponsored Article) Should Security Controls Be Focused on Internal or External Threats?
What really matters is that your controls work no matter where the threat actors originate.
IoT Security Incidents Rampant and Costly
New research offers details about the hidden - and not so hidden - costs of defending the Internet of Things.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Out of the Black Box: Selling Security to your C-suite

    To maximize the return on cloud security investments, CISOs need a seat at the table. Unfortunately, getting them there isn't always simple, especially when security is often handled in a clandestine way that doesn't always clearly demonstrate its value. Join ...

  • The Real Impact of a Data Security Breach

    In this webcast, experts discuss the real losses associated with a breach, both in the data center and in the business and how an effective data breach response program can help mitigate the damage.

MORE WEBINARS

Partner Perspectives

Profile of a Hacker: The Real Sabu
There are multiple stories about how the capture of the infamous Anonymous leader Sabu went down. Here's one, and another about what he is doing today.

The Hunt for Networks Building Death Star-Sized Botnets
Internet of Things devices are more critically vulnerable to compromise in DDos attacks than ever before. Here's how to defend against them.

Securing your Cloud Stack from Ransomware
Poor configuration, lack of policies, and permissive behaviors are three factors that can leave your cloud infrastructure vulnerable to ransomware threats.

FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.