Follow Dark Reading:
 June 19, 2017
LATEST SECURITY NEWS & COMMENTARY
Hacker Bypasses Microsoft ATA for Admin Access
Microsoft's Advanced Threat Analytics defense platform can be cheated, a researcher will show at Black Hat USA next month.
Forrester: Rapid Cloud Adoption Drives Demand for Security Tools
Cloud services revenue is poised to skyrocket from $114 billion in 2016 to $236 billion by 2020, driving the market for products to secure data in the cloud.
Why Your AppSec Program Is Doomed to Fail & How to Save It
With these measures in place, organizations can avoid common pitfalls.
FIN10 Threat Actors Hack and Extort Canadian Mining, Casino Industries
Previously unknown threat actor has extracted hundreds of thousands of dollars from Canadian companies in a vicious cyberattack campaign that dates back to 2013, FireEye says.
MORE NEWS & COMMENTARY
HOT TOPICS
US Warns of North Korea's Not-So-Secret 'Hidden Cobra' DDoS Botnet
Reclusive government behind DDoS infrastructure is targeting organizations around the world US-CERT says.

Trump's Executive Order: What It Means for US Cybersecurity
The provisions are all well and good, but it's hardly the first time they've been ordered by the White House.

1 Million Endpoints Exposed on Public Internet via Microsoft File-Sharing Services
Research on global Internet security posture found endpoints leaving Microsoft SMB file-sharing systems wide open online, a finding that explains the rapid spread of WannaCry, Rapid7 says.

MORE
EDITORS' CHOICE

Android Security Apps for BYOD Users
A look at 8 security apps that experts recommend for Android.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Securing Your Endpoints from Ransomware & Other Trending Attacks

    Attackers have shifted their tactics. They've discovered new ways to re-engineer tactics to make them easier to execute, more evasive, and more likely to deceive targeted users. Combined with targeting platforms that organizations falsely consider more secure, these sophisticated attacks, ...

  • Open Source: The Benefits & Challenges

    Open source technology is gaining ground throughout IT and especially in operating systems and databases. Open source software drives efficiency and innovation, but affects your application stacks and introduces new challenges to keeping them highly available and performing. Find out ...

MORE WEBINARS

Partner Perspectives

Cyber Insurance: Read the Fine Print!
Applying for insurance is a grueling process involving detailed questionnaires and lengthy technical interviews that can still leave you without an adequate safety net.

Ditch the Big Ass Spreadsheet with Continuous Security Compliance
Replacing outdated spreadsheets with automated, continuous monitoring reduces workload and increases reliability, making compliance easy.

Hide & Seek: Security Teams Lack Visibility in the Cloud
IT leaders remain on the hot seat when it comes to their ability to continuously monitor the state of their data and operations. How hot is your seat?

FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.