Follow Dark Reading:
 July 31, 2021
LATEST SECURITY NEWS & COMMENTARY
Inside the Famed Black Hat NOC
Network operations center managers Bart Stump and Neil Wyler (aka Grifter) again head up the show network, but with a new hybrid twist.
101: Why BGP Hijacking Just Won't Die
A look at the dangers of attacks on the Internet's Border Gateway Protocol and what ISPs and enterprises can do about them.
When Software Updates Get Hacked
Darned if you do, darned if you don't: Software fixes have become extensively automated, which works when software supply chains are secure. Yet with attackers focused on compromising those pipelines, is automated patching such a good idea?
Phishing, Viruses Continue to Dominate the Malware Landscape
Despite concerns over widely publicized ransomware and supply chain attacks, most enterprises report that phishing attacks and viruses are the most common threats they face.
How Do I Let Go of 'Human Error' as an Explanation for Incidents?
Successfully learning from incidents requires a deeper and more expansive perspective of them.
MORE NEWS & COMMENTARY
HOT TOPICS
Top Security Leaders Share Management Tips, Lessons, and Stories
A panel of experts from Microsoft, Twitter, Cisco, and MongoDB share their thoughts on non-technical CISOs, managing through crises, and how they wish people communicated with them.

How to Secure Your Cryptocurrency Wallet
With your investments in a digital wallet, under your control, you are the sole owner and can have the peace of mind that no institution can confiscate your digital assets.

When Ransomware Comes to (Your) Town
While steps for defending against a ransomware attack vary based on the size of the government entity and the resources available to each one, rooting out ransomware ultimately will come down to two things: system architecture and partnerships.

MORE
EDITORS' CHOICE

How Gaming Attack Data Aids Defenders Across Industries
Web application attacks against the video game industry quadrupled in 2020 compared to the previous year, but companies outside entertainment can learn from the data.
FROM THE NEWS DESK

8 Security Tools to be Unveiled at Black Hat USA
Security researchers and practitioners share a host of new cyber tools for penetration testing, reverse engineering, malware defense, and more.
Tech Resources
ACCESS TECH LIBRARY NOW

  • External Threat Hunting - Reduce Supply Chain Risk

    In this webinar, we'll look at how one Fortune 100 organization transformed its security program by investing in external threat hunting, establishing a world class threat reconnaissance program that now has proven ROI. With no-touch monitoring of its third parties' networks, ...

  • Making Security Orchestration Automation and Response (SOAR) Work in Your Enterprise

    Over the past few years, many enterprises have been improving cybersecurity by implementing the Security Orchestration, Automation, and Response (SOAR) framework, which provides a path to collect threat data from multiple sources and respond to some security events automatically. How ...

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
CrowdStrike Falcon X Recon+ Expands Threat Intelligence Suite, Delivering Managed Protection Against Dark Web Threats
CrowdStrike expands fast-growing threat intelligence leadership with new offering to help organizations proactively hunt threat actors looking for opportunities to exploit their brand, steal their data and gain unauthorized access.
Tenable Helps Organizations Disrupt Attacks with New Active Directory Security Readiness Checks
Tenable has developed 10 foundational configuration checks for its solutions, including Tenable.io, Tenable.sc and both Nessus Professional and Nessus Essentials, that assess Microsoft Active Directory security readiness.
Zerto Announces General Availability of Zerto 9 for Ransomware Recovery
Solution also provides enhanced cloud data management and protection capabilities for end users and managed service providers.
Noetic Cyber Launches with $20M in Funding
New entrant to cyber asset management and continuous controls monitoring markets brings innovative approach to fundamental cybersecurity challenge.
Epiphany Systems Launches Offensive Context-Aware Platform
Epiphany's 'Exploitability Index' helps contextualize cyber-risk and drives better decisions.
MORE PRODUCTS & RELEASES
Dark Reading Daily
-- Published By Dark Reading
Informa Tech
303 Second St., Suite 900 South Tower, San Francisco, CA 94107
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.