Follow Dark Reading:
 July 18, 2017
LATEST SECURITY NEWS & COMMENTARY
New IBM Mainframe Encrypts All the Things
Next-generation Z series features the elusive goal of full data encryption - from an application, cloud service, or database in transit or at rest.
Researchers Create Framework to Evaluate Endpoint Security Products
Black Hat USA researchers tested more than 30,000 types of malware to learn the effectiveness of endpoint security tools - and they'll demonstrate how they did it.
AWS S3 Breaches: What to Do & Why
Although basic operations in Amazon's Simple Storage Services are (as the name implies) - simple - things can get complicated with access control and permissions.
FBI Issues Warning on IoT Toy Security
IoT toys are more than fun and games and can potentially lead to a violation of children's privacy and safety, the Federal Bureau of Investigation warned Monday.
50% of Ex-Employees Still Have Access to Corporate Applications
Former employees increase the security risk for organizations failing to de-provision their corporate application accounts.
MORE NEWS & COMMENTARY
HOT TOPICS
Verizon Suffers Cloud Data Leak Exposing Data on Millions of Customers
Six million of Verizon's US customers had their personal and account information exposed, including PIN numbers.

Microsoft Patches Critical Zero-Day Flaw in Windows Security Protocol
Researchers at Preempt uncovered two critical vulnerabilities in the Windows NTLM security protocols, one of which Microsoft patched today.

7 Deadly Sins to Avoid When Mitigating Cyberthreats
How digitally savvy organizations can take cyber resilience to a whole new dimension.

MORE
SPECIAL REPORT

The Impact of a Security Breach 2017
Despite the escalation of cybersecurity staffing and technology, enterprises continue to suffer data breaches and compromises at an alarming rate. How do these breaches occur? How are enterprises responding, and what is the impact of these compromises on the business? This report offers new data on the frequency of data breaches, the losses they cause, and the steps that organizations are taking to prevent them in the future.
Tech Resources
ACCESS TECH LIBRARY NOW

  • [Cyber Attackers] How They Research Your Organization & What To Do About It

    In this eye-opening webinar, you'll learn how attackers can take advantage of your website, employees' social media, and other vehicles to learn about your organization - and get the ammunition they need to convince your end users to trust them.

  • Free Yourself from Legacy Apps

    They've served their purpose years ago, but now they're stretching your IT budget and increasing security and compliance risks - Legacy applications. Learn how to unburden yourself of legacy applications, while retaining the data that matters.

MORE WEBINARS

Partner Perspectives

The Hunt for Networks Building Death Star-Sized Botnets
Internet of Things devices are more critically vulnerable to compromise in DDos attacks than ever before. Here's how to defend against them.

Securing your Cloud Stack from Ransomware
Poor configuration, lack of policies, and permissive behaviors are three factors that can leave your cloud infrastructure vulnerable to ransomware threats.

Security Experts & Hackers: We're Not So Different
Using the similarities among hackers and security programmers can be an advantage.

FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.