Follow Dark Reading:
 June 21, 2017
LATEST SECURITY NEWS & COMMENTARY
Data Breach Costs Drop Globally But Increase in US
The average total cost of a data breach declined 10% year-over-year around the world, but in the US edged upward by 5%.
Apple iOS Threats Fewer Than Android But More Deadly
Data leakage and corruption haunt iOS and Android mobile apps the most, a new study shows.
Organizations Are Detecting Intrusions More Quickly
But almost every other metric in Trustwave's 2017 global cybersecurity report card is headed in the wrong direction.
Feds Call on Contractors to Play Ball in Mitigating Insider Threats
It's said that you're only as strong as your weakest player. That's as true in security as it is in sports.
Cybersecurity Fact vs. Fiction
Based on popular media, it's easy to be concerned about the security of smart cars, homes, medical devices, and public utilities. But how truly likely are such attacks?
Trusted IDs Gain Acceptance in Smart Building Environment
A majority of survey respondents believe identities can be connected across multiple systems and devices through a single ID card or mobile phone.
MORE NEWS & COMMENTARY
HOT TOPICS
Major Websites Vulnerable to their Own Back-End Servers
DoD, other websites found with back-end server flaws and misconfigurations that could give attackers an entryway to internal networks, researcher will demonstrate at Black Hat USA next month.

1 Million Endpoints Exposed on Public Internet via Microsoft File-Sharing Services
Research on global Internet security posture found endpoints leaving Microsoft SMB file-sharing systems wide open online, a finding that explains the rapid spread of WannaCry, Rapid7 says.

Hacker Bypasses Microsoft ATA for Admin Access
Microsoft's Advanced Threat Analytics defense platform can be cheated, a researcher will show at Black Hat USA next month.

MORE
SAVE THE DATE! NOVEMBER 29-30

Dark Reading Launches New Conference on Cyber Defense
November event will focus on attendee interaction, "blue team" best practices
VIRTUAL EVENT TODAY AT 11 ET

Understanding Cyber Attackers and Cyber Threats

Alll-day online conference to help you better understand your adversaries and prepare your defenses.


Tech Resources
ACCESS TECH LIBRARY NOW

  • Big Data Applied: Real World Use Cases

    Organizations today may have more data than ever before in the form of "big data." And the tools they use today may be more sophisticated than ever before. But unless those tools are put to use in a way that ...

  • Securing Your Endpoints from Ransomware & Other Trending Attacks

    Attackers have shifted their tactics. They've discovered new ways to re-engineer tactics to make them easier to execute, more evasive, and more likely to deceive targeted users. Combined with targeting platforms that organizations falsely consider more secure, these sophisticated attacks, ...

MORE WEBINARS

Partner Perspectives

Cloud Security & the Power of Shared Responsibility
When you and your CSP jointly embrace the shared security responsibility model you can achieve greater success than you or your provider can achieve alone.

Cyber Insurance: Read the Fine Print!
Applying for insurance is a grueling process involving detailed questionnaires and lengthy technical interviews that can still leave you without an adequate safety net.

Ditch the Big Ass Spreadsheet with Continuous Security Compliance
Replacing outdated spreadsheets with automated, continuous monitoring reduces workload and increases reliability, making compliance easy.

FEATURED REPORTS
  • [Dark Reading] Security Spending Survey

    Enterprises are spending an unprecedented amount of money on IT security -- where does it all go? In this survey, Dark Reading polled senior IT management on security budgets and spending plans, and their priorities for the coming year. Download ...

  • [Interop ITX 2017] State Of DevOps Report

    The DevOps movement brings application development and infrastructure operations together to increase efficiency and deploy applications more quickly. But embracing DevOps means making significant cultural, organizational, and technological changes. This research report will examine how and why IT organizations are ...

MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.