Follow Dark Reading:
 June 08, 2017
LATEST SECURITY NEWS & COMMENTARY
Outdated Operating Systems, Browsers Correlate with Real Data Breaches
Study shows companies running out-of-date OSes were three times more likely to suffer a data breach, and those with the outdated browsers, two times more likely.
Cybersecurity Faces 1.8 Million Worker Shortfall By 2022
(ISC)2 report shows the skills shortage is getting worse.
Cloud, Hackers, Trump Presidency, Drive Security Spend
Businesses reevaluate their security spending in response to the growth of cloud, fear of malicious hackers, and the Trump presidency, research finds.

Why Compromised Identities Are IT's Fault
The eternal battle between IT and security is the source of the problem.
RIG Exploit Kit Takedown Sheds Light on Domain Shadowing
Threat actors hid tens of thousands of shadow domains behind legitimate domains to carry out malicious activity.
Advice for Windows Migrations: Automate as Much as Possible
The security lessons Riverside Health System learned when moving to Windows 7 will help it quickly move to Windows 10.
Security in the Cloud: Pitfalls and Potential of CASB Systems
The transition to cloud has driven a demand for CASB systems, but today's systems lack the full breadth of functionality businesses need.
MORE NEWS & COMMENTARY
HOT TOPICS
WannaCry Exploit Could Infect Windows 10
The EternalBlue remote kernel exploit used in WannaCry could be used to infect unpatched Windows 10 machines with malware, researchers find.

OneLogin Breach Reignites Concerns over Password Managers
Entrusting all your passwords to a single organization creates a single point of failure, experts say in the wake of a new data breach at OneLogin.

Chinese 'Fireball' Malware Infects 20% of Global Corporate Networks
The Fireball malware has infected over 250 million computers and is capable of executing code on all of them, raising potential for large-scale damage.

MORE
EDITORS' CHOICE

8 Most Overlooked Security Threats

Businesses know the obvious security threats to watch for, but some of the biggest dangers may not be at top-of-mind.


Why Phishing Season Lasts All Year for Top US Retailers
No major brand is immune from cyber squatters; the more popular the company, the more look-alike domains phishers register as bait. Here are some techniques to watch out for.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Free Yourself from Legacy Apps

    They've served their purpose years ago, but now they're stretching your IT budget and increasing security and compliance risks. Every enterprise has them, what are they? - Legacy applications. Don't get stuck between a rock and a hard place. Learn ...

  • [Cybersecurity Skills Shortage] Managing Through The Drought

    In this webinar, security experts discuss methods for doing better security with fewer people, including: Time-saving tools for automating security functions, effective ways to use outsourcing and third-party services, creative places to look for new talent and the best ways ...

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Weekly
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Weekly Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.