Follow Dark Reading:
 August 03, 2017
LATEST SECURITY NEWS & COMMENTARY
Proposed IoT Security Bill Well-Intentioned But Likely Hard To Enforce
Internet of Things Cybersecurity Improvement Act of 2017 proposes minimum set of security controls for IoT products sold to government.
Chinese Telecom DDoS Attack Breaks Record
A distributed denial of service siege spanning more than 11 days broke a DDoS record for the year, according to a report from Kaspersky Lab.
Microsoft Security Put to the Test at Black Hat, DEF CON
Researchers at both conferences demonstrated workarounds and flaws in applications and services including Office 365, PowerShell, Windows 10, Active Directory and Windows BITs.
72% of Businesses Plan for Endpoint Security Budget Boost
One-third of organizations investing more in endpoint security say there will be a "substantial" increase in budget.
MORE NEWS & COMMENTARY
HOT TOPICS
Lethal Dosage of Cybercrime: Hacking the IV Pump
At DEF CON, a researcher demonstrated how to attack a popular model of infusion pump used in major hospitals around the world.

Throw Out the Playbooks to Win at Incident Response
Four reasons why enterprises that rely on playbooks give hackers an advantage.

MORE
EDITOR'S CHOICE

Staying in Front of Cybersecurity Innovation
Innovation is challenging for security teams because it encompasses two seemingly contradictory ideas: it's happening too slowly and too quickly.
DEF CON Rocks the Vote with Live Machine Hacking
Jeff Moss, founder of the hacker conference, is planning to host a full-blown election and voting system for hacking in 2018 at DEF CON, complete with a simulated presidential race.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Using Threat Data to Improve Your Cyber Defense

    Attend this webinar to learn how you can determine which threats pose the greatest danger to your enterprise, and how to analyze threat data and use it to help improve your organization's cyber defense.

  • The Real Impact of a Data Security Breach

    In this webcast, experts discuss the real losses associated with a breach, both in the data center and in the business and how an effective data breach response program can help mitigate the damage.

MORE WEBINARS

Partner Perspectives

Fight 'Credential Stuffing' with a New Approach to Authorization
Token-based authorization that lets users prove their identity through Facebook, Google, or Microsoft credentials can dramatically reduce your attack surface and give enterprises a single point of control.

Can Your Risk Assessment Stand Up Under Scrutiny?
Weak risk assessments have gotten a pass up until now, but that may be changing.

Lessons from Verizon: Managing Cloud Security for Partners
The recent Verizon breach - data exposed by an insecure Amazon S3 bucket - highlights the need for enterprises to have visibility into how partners and other stakeholders keep their data secure.

FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.