Follow Dark Reading:
 July 20, 2017
LATEST SECURITY NEWS & COMMENTARY
New IBM Mainframe Encrypts All the Things
Next-generation Z series features the elusive goal of full data encryption - from an application, cloud service, or database in transit or at rest.
IoT Security Incidents Rampant and Costly
New research offers details about the hidden - and not so hidden - costs of defending the Internet of Things.
98% of Companies Favor Integrating Security with DevOps
A majority of companies are either planning or have launched an integrated DevOps and security team, a new report shows.
Catastrophic Cloud Attack Costs Would Rival that of Hurricane Damages
Lloyd's of London estimates multi-billion-dollar loss figures in worst-case scenarios of a major zero-day exploit or massive cloud outage.
Online Courses Projected to Drive Credit Card Fraud to $24B by 2018
An underground ecosystem provides cybercriminals with online tutorials, tools, and credit card data they need to commit fraud.
Dow Jones Data Leak Results from Amazon AWS Configuration Error
Security pros expect to see more incidents like the Dow Jones leak, which exposed customers' personal information following a public cloud configuration error.
4 Steps to Securing Citizen-Developed Apps
Low- and no-code applications can be enormously helpful to businesses, but they pose some security problems.
MORE NEWS & COMMENTARY
HOT TOPICS
Apple iOS Malware Growth Outpaces that of Android
Number of iOS devices running malicious apps more than tripled in three consecutive quarters, while infected Android devices remained largely flat, report shows.

7 Deadly Sins to Avoid When Mitigating Cyberthreats
How digitally savvy organizations can take cyber resilience to a whole new dimension.

AWS S3 Breaches: What to Do & Why
Although basic operations in Amazon's Simple Storage Services are (as the name implies) - simple - things can get complicated with access control and permissions.

MORE
EDITORS' CHOICE

Best of Black Hat: 20 Epic Talks in 20 Years
In celebration of Black Hat's 20th birthday, we take a look back at the most memorable presentations and demos since the show's inception in 1997.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Out of the Black Box: Selling Security to your C-suite

    To maximize the return on cloud security investments, CISOs need a seat at the table. Unfortunately, getting them there isn't always simple, especially when security is often handled in a clandestine way that doesn't always clearly demonstrate its value. Join ...

  • The Real Impact of a Data Security Breach

    In this webcast, experts discuss the real losses associated with a breach, both in the data center and in the business and how an effective data breach response program can help mitigate the damage.

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Weekly
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Weekly Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.