Follow Dark Reading:
 July 26, 2021
LATEST SECURITY NEWS & COMMENTARY
Kaseya Offers Customers Decryption Key for Massive Ransomware Attack
The remote management software company will not disclose the source of the decryption key, but at least one company has confirmed that it works.
Understanding and Mitigating Insider Threats in Today's Remote-Work World
The insider threat menace has grown during the pandemic, worsened by an increase in credential theft and broader use of shadow IT.
Biden Administration Responds to Geopolitical Cyber Threats
In response to growing concerns regarding the recent uptick in large-scale, nation-state-backed ransomware attacks on critical infrastructure, the Biden administration is taking new action to tackle the evolving challenges posed by ransomware attacks.
Malware Infects Japanese Devices Ahead of Olympic Games
A Japanese security company reports the wiper malware searches for specific file types in a target's personal Windows folder.
Ransomware Is Top Concern for Many Security Pros: Report
A survey of IT and security professionals also reveals COVID-19 has significantly changed the malware landscape.
MORE NEWS & COMMENTARY
HOT TOPICS
7 Hot Cyber Threat Trends to Expect at Black Hat
A sneak peek of some of the main themes at Black Hat USA next month.

Top Security Leaders Share Management Tips, Lessons, and Stories
A panel of experts from Microsoft, Twitter, Cisco, and MongoDB share their thoughts on non-technical CISOs, managing through crises, and how they wish people communicated with them.

Peloton Breach Reveals a Coming IoT Data Winter
We will see more and more Internet of Things attacks unless we adjust course quickly.

MORE
EDITORS' CHOICE

What Does It Take to Secure Containers?
A vast majority of DevOps practitioners say containerization technology provides security, but some companies — especially security firms — disagree.
Software Security: A Sounding Board for Needed Change
If the federal government is going to have software that performs critical functions, it must take complete ownership, accountability, and oversight of software from concept to delivery, through maintenance.
LATEST FROM THE EDGE

How to Secure Your Cryptocurrency Wallet
No matter your reason for investing in crypto, the two key steps are setting up a digital wallet and transferring your crypto assets to it. Here's how to do so securely.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Unifying Your Endpoint Security Strategy

    For enterprises that support many users and endpoints, building and maintaining a consistent security strategy was a major challenge even before 2020. Since the onset of the global pandemic, however, it has become more difficult than ever to build and maintain ...

  • Making Security Orchestration Automation and Response (SOAR) Work in Your Enterprise

    Over the past few years, many enterprises have been improving cybersecurity by implementing the Security Orchestration, Automation, and Response (SOAR) framework, which provides a path to collect threat data from multiple sources and respond to some security events automatically. How ...

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By Dark Reading
Informa Tech
303 Second St., Suite 900 South Tower, San Francisco, CA 94107
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.