Follow Dark Reading:
 June 08, 2017
LATEST SECURITY NEWS & COMMENTARY
Cybersecurity Faces 1.8 Million Worker Shortfall By 2022
(ISC)2 report shows the skills shortage is getting worse.
Cloud, Hackers, Trump Presidency, Drive Security Spend
Businesses reevaluate their security spending in response to the growth of cloud, fear of malicious hackers, and the Trump presidency, research finds.
RIG Exploit Kit Takedown Sheds Light on Domain Shadowing
Threat actors hid tens of thousands of shadow domains behind legitimate domains to carry out malicious activity.
Security in the Cloud: Pitfalls and Potential of CASB Systems
The transition to cloud has driven a demand for CASB systems, but today's systems lack the full breadth of functionality businesses need.
Cybersecurity Stands as Big Sticking Point in Software M&A
The breach that was the fly in the ointment of the Yahoo-Verizon deal is one of many now surfacing as security of acquired firms starts to become a point of negotiation.
Balancing the Risks of the Internet of Things
Do the benefits of an Internet-connected coffee maker really outweigh its security issues?
Interpol Analyzes Global Response to WannaCry Attack
Interpol cybercrime unit chiefs gather to evaluate the global extent of WannaCry and track criminals via blockchain analysis.
75% of Vulns Shared Online Before NVD Publication
Research shows more than 75% of vulnerabilities are reported on the dark web, security sites and sources before publication to the National Vulnerability Database.
MORE NEWS & COMMENTARY
HOT TOPICS
WannaCry Exploit Could Infect Windows 10
The EternalBlue remote kernel exploit used in WannaCry could be used to infect unpatched Windows 10 machines with malware, researchers find.

OneLogin Breach Reignites Concerns over Password Managers
Entrusting all your passwords to a single organization creates a single point of failure, experts say in the wake of a new data breach at OneLogin.

Chinese 'Fireball' Malware Infects 20% of Global Corporate Networks
The Fireball malware has infected over 250 million computers and is capable of executing code on all of them, raising potential for large-scale damage.

MORE
SPONSORED ARTICLE

Risky Business: ICS & The Rise of Cyber Attacks

How 'security enforced by physics' can bolster defenses against industrial control system attacks.


EDITORS' CHOICE

Why Compromised Identities Are IT's Fault
The eternal battle between IT and security is the source of the problem.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Free Yourself from Legacy Apps

    They've served their purpose years ago, but now they're stretching your IT budget and increasing security and compliance risks. Every enterprise has them, what are they? - Legacy applications. Don't get stuck between a rock and a hard place. Learn ...

  • [Cybersecurity Skills Shortage] Managing Through The Drought

    In this webinar, security experts discuss methods for doing better security with fewer people, including: Time-saving tools for automating security functions, effective ways to use outsourcing and third-party services, creative places to look for new talent and the best ways ...

MORE WEBINARS

Partner Perspectives

DevOps & SecOps: The Perks of Collaboration
Organizations can't bypass security in favor of speed, making SecOps a perfect complement to DevOps.

DNS Is Still the Achilles' Heel of the Internet
Domain Name Services is too important to do without, so we better make sure it's reliable and incorruptible

WanaCrypt0r Hits Worldwide
Consumers and businesses should be sure their Windows systems and software are updated with all current patches in order to stop the spread of this dangerous ransomware attack.

FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.