Follow Dark Reading:
 July 22, 2017
LATEST SECURITY NEWS & COMMENTARY
Microsoft Rolls Out AI-based Security Risk Detection Tool
Microsoft Security Risk Detection leverages artificial intelligence to root out bugs in software before it's released.
Dark Reading News Desk Live at Black Hat USA 2017
Over 40 interviews streaming live right from Black Hat USA, July 26-27, from 2 p.m. - 7 p.m. Eastern Time (11 - 4 P.T.).
Speed of Windows 10 Adoption Not Affected by WannaCry
WannaCry has motivated security teams to stay current on patching but Windows 10 adoption remains the same.
20 Questions for Improving SMB Security
Security leaders in small and medium-sized business who want to up their game need to first identify where they are now, then, where they want to go.
MORE NEWS & COMMENTARY
HOT TOPICS
Apple iOS Malware Growth Outpaces that of Android
Number of iOS devices running malicious apps more than tripled in three consecutive quarters, while infected Android devices remained largely flat, report shows.

Dow Jones Data Leak Results from an AWS Configuration Error
Security pros expect to see more incidents like the Dow Jones leak, which exposed customers' personal information following a public cloud configuration error.

AWS S3 Breaches: What to Do & Why
Although basic operations in Amazon's Simple Storage Services are (as the name implies) - simple - things can get complicated with access control and permissions.

MORE
EDITORS' CHOICE

Best of Black Hat: 20 Epic Talks in 20 Years
In celebration of Black Hat's 20th birthday, we take a look back at the most memorable presentations and demos since the show's inception in 1997.
Tech Resources
ACCESS TECH LIBRARY NOW

  • [Cyberattacks] Using Data as Your First Line of Defense

    Attend this webinar to learn how you can determine which threats pose the greatest danger to your enterprise, and how to analyze threat data and use it to help improve your organization's cyber defense.

  • [Best Practices] Managing Multiple Clouds

    Putting all your eggs in one cloud basket is risky, because clouds are not immune to denials of service, nor are they immune to going out of business. Using multiple clouds with multiple vendors is a good idea, but managing ...

MORE WEBINARS

Partner Perspectives

Profile of a Hacker: The Real Sabu
There are multiple stories about how the capture of the infamous Anonymous leader Sabu went down. Here's one, and another about what he is doing today.

The Hunt for Networks Building Death Star-Sized Botnets
Internet of Things devices are more critically vulnerable to compromise in DDos attacks than ever before. Here's how to defend against them.

Securing your Cloud Stack from Ransomware
Poor configuration, lack of policies, and permissive behaviors are three factors that can leave your cloud infrastructure vulnerable to ransomware threats.

FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.