Follow Dark Reading:
 July 06, 2021
LATEST SECURITY NEWS & COMMENTARY
Microsoft Issues New CVE for 'PrintNightmare' Flaw
Company says remote code execution issue in all Windows versions is different from one in Windows Print Spooler that it had patched last month, though both affect same function.
Secured-Core PCs May Mitigate Firmware Attacks, but Adoption Lags
Microsoft maintains that exploitation of recent Dell vulnerabilities would be blocked on ultra-secure PCs - but most systems do not have the technology yet.
Watch for Cybersecurity Games at the Tokyo Olympics
The cybersecurity professionals guarding the Summer Olympics are facing at least as much competition as the athletes, and their failure could have steeper ramifications.
WFH: A Smart Time to Revisit Employee Use of Social Media
Employers have their hands full when it comes to monitoring online activities that could hurt the brand or violate the organization's core values.
(Sponsored Article) Avast Hacker Archives: Cybersecurity's Best 'Aha!' Moments
In the AHA podcast, Avast CISO Jaya Baloo interviews cybersecurity's greatest minds and reveals the "Aha!" moments that have shaped our technological world.
SOC Investment Improves Detection and Response Times, Data Shows
A survey of IT and security pros finds many are confident in their ability to detect security incidents in near-real time or within minutes.
Barracuda Agrees to Acquire Skout Cybersecurity
The acquisition will bring Barracuda into the extended detection and response (XDR) market with a tool for managed service providers.
MORE NEWS & COMMENTARY
HOT TOPICS
7 Unconventional Pieces of Password Wisdom
Challenging common beliefs about best practices in password hygiene.

3 Things Every CISO Wishes You Understood
Ensuring the CISO's voice is heard by the board will make security top of mind for the business, its employees, and their customers.

CISA Publishes Catalog of Poor Security Practices
Organizations often focus on promoting best practices, CISA says, but stopping poor security practices is equally important.

MORE
EDITORS' CHOICE

Why Are There Never Enough Logs During an Incident Response?
Most security pros believe their responses could be dramatically quicker were the right logs available, and usually they're not.
9 Hot Trends in Cybersecurity Mergers & Acquisitions
Security experts share their observations of the past year in cybersecurity M&A, highlighting key trends and notable deals.
LATEST FROM THE EDGE

5 Mistakes That Impact a Security Team's Success
The way we work and treat each other go a long way in improving our organizations' security posture.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Building Threat Intelligence into Your Enterprise Security Strategy

    In recent years, many enterprises have discovered that they can improve their defenses by collecting data about broad trends in online attacks that may pertain to their own IT environments. This "threat intelligence" can make it easier for security teams ...

  • Weaknesses in Software Supply Chains: Cyber's Unspoken Reality

    Until the recent SolarWinds compromise, the conversation around supply chains - and more importantly, their vulnerabilities - was rarely discussed in the cybersecurity industry. However, over the last few years, supply chains have become an increasingly lucrative target for hackers. ...

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By Dark Reading
Informa Tech
303 Second St., Suite 900 South Tower, San Francisco, CA 94107
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.