Follow Dark Reading:
 July 31, 2019
LATEST SECURITY NEWS & COMMENTARY
Capital One Breach Affects 100M US Citizens, 6M Canadians
The breach exposed credit card application data, Social Security numbers, and linked bank accounts, among other information.
BlueKeep Exploits Appear as Security Firms Continue to Worry About Cyberattack
The lack of an attack has puzzled some security experts, but the general advice remains that companies should patch their vulnerable systems more quickly.
Container Security Is Falling Behind Container Deployments
Organizations are increasingly turning to containers even though they are not as confident in the security of those containers, according to a new survey.
Insecure Real-Time Video Protocols Allow Hollywood-Style Hacking
Lack of security in the default settings of Internet-enabled video cameras make co-opting video feeds not just a movie-hacker technique, but a reality for millions of cameras.
Suffering SOC Saga Continues
New study exposes low confidence among security professionals in their security operations centers.
Transforming 'Tangible Security' into a Competitive Advantage
Today's consumers want to see and touch security. Meeting this demand will be a win-win for everyone, from users to vendors to security teams.
CISOs Must Evolve to a Data-First Security Program
Such a program will require effort and reprioritization, but it will let your company fight modern-day threats and protect your most important assets.
Apple iOS Flaw Could Give Attacker Access via iMessage
Google Project Zero researchers found an iOS vulnerability that could let an attacker snoop on a victim's phone remotely.
DHS Warns About Security Flaws in Small Airplanes
Rapid7 researchers found holes in CAN bus networks that an attacker could exploit to sabotage its operation.
MORE NEWS & COMMENTARY
HOT TOPICS
Companies' 'Anonymized' Data May Violate GDPR, Privacy Regs
New study found that any database containing 15 pieces of demographic data could be used to identify individuals.

How Cybercriminals Break into the Microsoft Cloud
Microsoft and Trimarc researchers explore the most common attacks against the cloud and effective defenses and mitigation.

What Every Security Team Should Know About Internet Threats
Of particular interest for cybercriminals is the Domain Name System, which plays a central role in orchestrating all Internet and application traffic.

MORE
EDITORS' CHOICE

9 Things That Don't Worry You Today (But Should)
There are security concerns that go far beyond the usual suspects. Here are some that should be on your list of scary things.
Black Hat Q&A: Cracking Apple's T2 Security Chip
Duo Labs' Mikhail Davidow and Jeremy Erickson speak about their research on the Apple T2 security chip, and why they're sharing it at Black Hat USA.
NEW FROM THE EDGE

Keep Your Eye on Digital Certificates
X.509 certificates help secure the identity, privacy, and communication between two endpoints, but these digital certificates also have built-in expirations and must be managed.
Tech Resources
ACCESS TECH LIBRARY NOW

MORE WEBINARS
FEATURED REPORTS
  • Darktrace Cloud Threat Report

    This report summarizes 11 case studies of cloud-based attacks identified by cyber AI, including spear phishing, insider threat, and zero-day malware.

  • 2019 State of IT Infrastructure

    This report examines the current state of enterprise data center, storage and network infrastructure, explores how it is evolving, and looks into future plans for implementation. Read the Report today!

MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.