Follow Dark Reading:
 July 19, 2017
LATEST SECURITY NEWS & COMMENTARY
IoT Security Incidents Rampant and Costly
New research offers details about the hidden - and not so hidden - costs of defending the Internet of Things.
Apple iOS Malware Growth Outpaces that of Android
Number of iOS devices running malicious apps more than tripled in three consecutive quarters, while infected Android devices remained largely flat, report shows.
Dow Jones Data Leak Results from Amazon AWS Configuration Error
Security pros expect to see more incidents like the Dow Jones leak, which exposed customers' personal information following a public cloud configuration error.
Zero-Day Exploit Surfaces that May Affect Millions of IoT Users
A zero-day vulnerability dubbed Devil's Ivy is discovered in a widely used third-party toolkit called gSOAP.
SIEM Training Needs a Better Focus on the Human Factor
The problem with security information and event management systems isn't the solutions themselves but the training that people receive.
Rapid7 Buys Security Orchestration and Automation Firm Komand
Rapid7 has acquired Komand with plans to integrate its orchestration and automation technology into the Insights platform.
MORE NEWS & COMMENTARY
HOT TOPICS
Verizon Suffers Cloud Data Leak Exposing Data on Millions of Customers
Six million of Verizon's US customers had their personal and account information exposed, including PIN numbers.

7 Deadly Sins to Avoid When Mitigating Cyberthreats
How digitally savvy organizations can take cyber resilience to a whole new dimension.

Desperately Seeking Security: 6 Skills Most In Demand
When people say there's a security skills gap, this is what they really mean.

MORE
SAVE THE DATE: NOV 29-30

Dark Reading INsecurity Conference Registration Now Open

November event will focus on attendee interaction, "blue team" best practices.


Tech Resources
ACCESS TECH LIBRARY NOW

  • Out of the Black Box: Selling Security to your C-suite

    To maximize the return on cloud security investments, CISOs need a seat at the table. Unfortunately, getting them there isn't always simple, especially when security is often handled in a clandestine way that doesn't always clearly demonstrate its value. Join ...

  • The Real Impact of a Data Security Breach

    In this webcast, experts discuss the real losses associated with a breach, both in the data center and in the business and how an effective data breach response program can help mitigate the damage.

MORE WEBINARS

Partner Perspectives

The Hunt for Networks Building Death Star-Sized Botnets
Internet of Things devices are more critically vulnerable to compromise in DDos attacks than ever before. Here's how to defend against them.

Securing your Cloud Stack from Ransomware
Poor configuration, lack of policies, and permissive behaviors are three factors that can leave your cloud infrastructure vulnerable to ransomware threats.

Security Experts & Hackers: We're Not So Different
Using the similarities among hackers and security programmers can be an advantage.

FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.