Follow Dark Reading:
 July 22, 2019
LATEST SECURITY NEWS & COMMENTARY
Malware in PyPI Code Shows Supply Chain Risks
A code backdoor in a package on the Python Package Index demonstrates the importance of verifying code brought in from code repositories.
Mirai Groups Target Business IoT Devices
More than 30% of Mirai attacks, and an increasing number of variants of the malicious malare, are going after enterprise IoT devices, raising the stakes for business.
The Problem with Proprietary Testing: NSS Labs vs. CrowdStrike
Why apples-to-apples performance tests are the only way to accurately gauge the impact of network security products and solutions.
Europol Head Fears 5G Will Give Criminals an Edge
Catherine De Bolle is concerned law enforcement will lose its ability to track criminals with the arrival of 5G networks.
MORE NEWS & COMMENTARY
HOT TOPICS
The 10 Essentials of Infosec Forensics
Whether it's your first investigation or 500th, review the basics of IT forensics to streamline and simplify your discovery.

Software Developers Face Secure Coding Challenges
Seven in ten developers are expected to write secure code, but less than half receive feedback on security, a survey finds.

MITRE ATT&CK Framework Not Just for the Big Guys
At Black Hat, analysts from MITRE and Splunk will detail how organizations of many different sizes are leveraging ATT&CK's common language.

MORE
EDITORS' CHOICE

8 Legit Tools and Utilities That Cybercriminals Commonly Misuse
Threat actors are increasingly 'living off the land,' using publicly available management and administration tools to conceal malicious activity.
A Password Management Report Card
New research on password management tools identifies the relative strengths and weaknesses of 12 competing offerings.
NEW FROM THE EDGE

Security Considerations in a BYOD Culture

The 'bring your own device' movement has put security pros on high alert for a new breed of predator who is on the hunt to find ways to exploit the ever-expanding attack surface.


Tech Resources
ACCESS TECH LIBRARY NOW

  • DDoS Resilience, Remediation & Recovery: Updating Your Strategy

    Are you ready for a DDoS attack on your network -- or on your service provider's network - or is it time to update your resilience, remediation and recovery plan? In this webinar, learn strategies that will make your business ...

  • 10 Emerging Threats to Enterprise Applications

    In this Dark Reading webinar, application security experts offer a look at some of the latest and most potentially damaging threats to current enterprise apps, and how those threats can expose your organization to data compromise and theft.

MORE WEBINARS
FEATURED REPORTS
  • Security Professionals, We Need Your Input: Got 10 mins to spare?

    We are seeking your input for an important survey about the role of the IT security or the cybersecurity professional. Participate and get a chance to enter a drawing for 1 of 10 $50 Amazon gift cards.

  • 2019 State of IT Infrastructure

    This report examines the current state of enterprise data center, storage and network infrastructure, explores how it is evolving, and looks into future plans for implementation. Read the Report today!

MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.