Follow Dark Reading:
 August 08, 2020
LATEST SECURITY NEWS & COMMENTARY
What a Security Engineer & Software Engineer Learned by Swapping Roles
A security engineer and infrastructure engineer with Salesforce share lessons learned from their professional role reversal, and advice for people on both teams.
Pen Testers Share the Inside Story of Their Arrest and Exoneration
Coalfire's Gary De Mercurio and Justin Wynn share the inside story of their infamous arrest last year while conducting a contracted red-team engagement in an Iowa courthouse -- and what it took to clear their names.
Getting to the Root: How Researchers Identify Zero-Days in the Wild
Google Project Zero researcher Maddie Stone explains the importance of identifying flaws exploited in the wild and techniques used to do it.
Researchers Create New Framework to Evaluate User Security Awareness
Approaches based on questionnaires and self-evaluation are not always a good indicator of how well a user can mitigate social engineering threats.
A Mix of Optimism and Pessimism for Security of the 2020 Election
DHS CISA's Christopher Krebs and Georgetown University's Matt Blaze at Black Hat USA give the lowdown on where things stand and what still needs to happen to protect the integrity of November's election.

MORE NEWS & COMMENTARY
HOT TOPICS

Why Confidential Computing Is a Game Changer

Confidential Computing is a transformational technology that should be part of every enterprise cloud deployment. It's time to start unlocking the possibilities together.

11 Hot Startups to Watch at Black Hat USA
A sneak peek at the up-and-coming organizations to check out on the Black Hat USA virtual show floor.

Where Dark Reading Goes Next
Dark Reading Editor-in-Chief gives a complete rundown of all the Dark Reading projects you might not even know about, his insight into the future of the security industry, and how we plan to cover it.

MORE
VIDEOS FROM THE DARK READING NEWS DESK

Dark Reading Video News Desk Returns to Black Hat
UPDATED: Coming to you prerecorded from in front of carefully arranged bookcases around the world ...!
A Mix of Optimism and Pessimism for Security of the 2020 Election
DHS CISA's Christopher Krebs and Georgetown University's Matt Blaze at Black Hat USA give the lowdown on where things stand and what still needs to happen to protect the integrity of November's election.
Exploiting Google Cloud Platform With Ease
Security engineer Dylan Ayrey and Cruise senior infrastructure security engineer Allison Donovan describe fundamental weaknesses in GCP identity management that enable privilege escalation and lateral movement.
Why Satellite Communication Eavesdropping Will Remain A Problem
Oxford PhD candidate James Pavur shows that SATCOM security has still made no progress since previous Black Hat disclosures, and discusses the physical and economic limitations that slow make it unlikely to improve anytime soon.
On 'Invisible Salamanders' and Insecure Messages
Cornell researcher Paul Grubbs discusses how vulnerabilities found in Facebook Messenger encryption could mean trouble for your secure messages.

Tech Resources
ACCESS TECH LIBRARY NOW

  • Cyber Attack Evasion Techniques

    When it comes to evasion techniques there's a perpetual cat and mouse game between malware developers and solutions providers. By drawing on the latest in evasion techniques, malware developers not only go undetected on the compromised machine but more importantly, ...

  • Shifting Security from Speedbump to Digital Accelerator

    When you attend this webinar, you will learn about three practices that can help your businesses balance security and agility, without compromise.

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By Dark Reading
Informa Tech
303 Second St., Suite 900 South Tower, San Francisco, CA 94107
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.