Follow Dark Reading:
 July 29, 2021
LATEST SECURITY NEWS & COMMENTARY
Data Breach Cost Hits Record High of $4.24M
The per-breach cost represents a 10% increase from the average cost per incident recorded one year prior, IBM reports.
CISA, FBI Name the Most Exploited Vulnerabilities Over the Past Year
List shows many relatively new and perimeter-like devices targeted in 2020 and 2021, according to an analysis by CISA, the FBI, the Australian Cyber Security Centre, and the United Kingdom’s National Cyber Security Centre.
Major Email Providers Add Brand-Verification Technology to Help Thwart Phishing
Google and other large providers are adopting BIMI, a technology for authenticated branding that could help drive security to reduce phishing attacks that use the logos of popular firms.
Managing Increased Cyber-Physical Security Threats in a Hyper-Connected World
Physical security and cybersecurity can't be managed separately.
How We Can Start Winning the Cyber War
Government and industry must work hand-in-hand to execute a winning game plan against cyber terrorists.
White House Issues Memo on US Critical Infrastructure Security
The memo describes critical infrastructure threats as one of the most significant issues confronting the nation.
UC San Diego Health Discloses Data Breach
The incident involved unauthorized access to some employee email accounts and may have affected personal data of employees, students, and patients.
MORE NEWS & COMMENTARY
HOT TOPICS
Praying Mantis Threat Group Targeting US Firms in Sophisticated Attacks
Group's advanced memory-resident attacks similar to those employed in sustained campaign against Australian companies and government last year, security vendor says.

How CIS Controls v8 Impacts SMBs
The Center for Internet Security has made big changes to its Control specs, including a greater focus on vendor relationships and cloud technologies.

How Do I Let Go of 'Human Error' as an Explanation for Incidents?
Successfully learning from incidents requires a deeper and more expansive perspective of them.

MORE
EDITORS' CHOICE

8 Security Tools to be Unveiled at Black Hat USA
Security researchers and practitioners share a host of new cyber tools for penetration testing, reverse engineering, malware defense, and more.
Why Trust Matters for the National Artificial Intelligence Research Resource Task Force
As the National Artificial Intelligence Research Resource Task Force sets about its work preparing recommendations for the creation of an AI research resource in the United States, fundamental problems of trust must be addressed.
LATEST FROM THE EDGE

101: Why BGP Hijacking Just Won't Die
A look at the dangers of attacks on the Internet's Border Gateway Protocol and what ISPs and enterprises can do about them.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Unifying Your Endpoint Security Strategy

    For enterprises that support many users and endpoints, building and maintaining a consistent security strategy was a major challenge even before 2020. Since the onset of the global pandemic, however, it has become more difficult than ever to build and maintain ...

  • Making Security Orchestration Automation and Response (SOAR) Work in Your Enterprise

    Over the past few years, many enterprises have been improving cybersecurity by implementing the Security Orchestration, Automation, and Response (SOAR) framework, which provides a path to collect threat data from multiple sources and respond to some security events automatically. How ...

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By Dark Reading
Informa Tech
303 Second St., Suite 900 South Tower, San Francisco, CA 94107
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.