Follow Dark Reading:
 July 17, 2017
LATEST SECURITY NEWS & COMMENTARY
Cloud AV Can Serve as an Avenue for Exfiltration
Black Hat USA researchers show how bad guys can use cloud AV connections to bypass air-gaps and extremely segmented networks to keep stolen data flowing.
50,000 Machines Remain Vulnerable to EternalBlue Attacks
Researcher's free scanner tool finds many systems remain at risk of EternalBlue-based attacks like WannaCry and NotPetya.
7 Deadly Sins to Avoid When Mitigating Cyberthreats
How digitally savvy organizations can take cyber resilience to a whole new dimension.
AsTech Offers a $5 Million Security Breach Warranty
AsTech expands its warranty program with a guarantee it will find Internet application vulnerabilities or it will pay up to $5 million if there is a breach.
MORE NEWS & COMMENTARY
HOT TOPICS
Desperately Seeking Security: 6 Skills Most In Demand
When people say there's a security skills gap, this is what they really mean.

The High Costs of GDPR Compliance
Looming, increasingly strict EU privacy regulations are pushing privacy spending to the top of IT priorities and budgets.

Verizon Suffers Cloud Data Leak Exposing Data on Millions of Customers
Six million of Verizon's US customers had their personal and account information exposed, including PIN numbers.

MORE
IN CASE YOU MISSED IT

Black Hat Survey: Security Pros Expect Major Breaches in Next Two Years
Significant compromises are not just feared, but expected, Black Hat attendees say
Tech Resources
ACCESS TECH LIBRARY NOW

  • New Security Technologies: Advice & Best Practices on Selecting The Right One

    Given today's threat landscape, combined with so many security options available today, it can be daunting when selecting new or alternative technologies to protect your business. Your security team has unique challenges; therefore, you should be asking your next security ...

  • AI & Machine Learning: Real World Use Cases

    At this event you will get real-world use cases for machine learning in business and industry, designed to spark your thinking as you examine your first, or second, or 27th, implementation of this advanced technology in your organization. Find out ...

MORE WEBINARS

Partner Perspectives

The Hunt for Networks Building Death Star-Sized Botnets
Internet of Things devices are more critically vulnerable to compromise in DDos attacks than ever before. Here's how to defend against them.

Securing your Cloud Stack from Ransomware
Poor configuration, lack of policies, and permissive behaviors are three factors that can leave your cloud infrastructure vulnerable to ransomware threats.

Security Experts & Hackers: We're Not So Different
Using the similarities among hackers and security programmers can be an advantage.

FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.