Follow Dark Reading:
 July 29, 2019
LATEST SECURITY NEWS & COMMENTARY
Companies' 'Anonymized' Data May Violate GDPR, Privacy Regs
New study found that any database containing 15 pieces of demographic data could be used to identify individuals.
A Security-First Approach to DevOps
Aware of the risks inherent in software, businesses are recognizing the need for application security.
3 Takeaways from the First American Financial Breach
Data leaks from business logic flaws are not well understood and difficult to identify before they reach production environments. Here's how to find and prevent them.
Malware Researcher Hutchins Sentenced to Supervised Release
Marcus Hutchins, the researcher known for stopping WannaCry, avoids jail time over charges of creating and distributing Kronos malware.
ICYMI

7 Hot Cybersecurity Trends to Be Highlighted at Black Hat
Just some of the research and ideas worth checking out at this year's 'security summer camp.'
6 Security Tips That'll Keep the Summer Fun
Taking some time off this summer? Before you head out on vacation, make sure your devices and apps are also ready.
MORE NEWS & COMMENTARY
HOT TOPICS
How Cybercriminals Break into the Microsoft Cloud
Microsoft and Trimarc researchers explore the most common attacks against the cloud and effective defenses and mitigation.

The War for Cyber Talent Will Be Won by Retention not Recruitment
Six steps for creating a work environment that challenges, stimulates, rewards, and constantly engages employees fighting the good fight against cybercriminals.

What Every Security Team Should Know About Internet Threats
Of particular interest for cybercriminals is the Domain Name System, which plays a central role in orchestrating all Internet and application traffic.

MORE
EDITORS' CHOICE

7 Stats That Show What It Takes to Run a Modern SOC
An inside look at staffing levels, budget allocation, outsourcing habits, and the metrics used by security operations centers (SOCs).
Black Hat Q&A: Inside the Black Hat NOC
Cybersecurity expert Bart Stump explains what it's like to reliably deliver a useful, high-security network for one of the toughest audiences in the world.
NEW FROM THE EDGE

Travel Security [from J4vv4D]
Do you travel to dangerous places, like Information Security Conferences?
Tech Resources
ACCESS TECH LIBRARY NOW

  • DDoS Resilience, Remediation & Recovery: Updating Your Strategy

    Are you ready for a DDoS attack on your network -- or on your service provider's network - or is it time to update your resilience, remediation and recovery plan? In this webinar, learn strategies that will make your business ...

  • Vendor ATT&CK Misdirection and How to Avoid It

    In this webinar, you will learn how a simple shift to an adversary-focused approach will help stop targeted threats and will evolve your security program from lean-back to lean-forward -- no matter the size or maturity of your security team.

MORE WEBINARS
FEATURED REPORTS
  • Salary Survey: Can you spare 10 minutes?

    InformationWeek and Interop are putting together a comprehensive IT salary report and we need your help... Can you spare 10 minutes?

  • 2019 State of DevOps

    DevOps is needed in today's business environment, where improved application security is essential and users demand more applications, services, and features -- fast. We sought to see where DevOps adoption and deployment stand, this report summarizes our survey findings. Find ...

MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.