Follow Dark Reading:
 June 28, 2017
LATEST SECURITY NEWS & COMMENTARY
Petya Or Not? Global Ransomware Outbreak Hits Europe's Industrial Sector, Thousands More
With echoes of WannaCry, infections spread fast. Some security researchers describe malware as variant of Petya; others say it's a brand new sample.
Massive Skype Zero-Day Enables Remote Crashes
A security researcher uncovered a Skype vulnerability that could allow hackers to remotely execute code and crash software if exploited.
Microsoft Integrates EMET into Fall Windows 10 Update
The Windows 10 Creators Update, slated to launch this fall, will include components from the Enhanced Mitigation Experience Toolkit (EMET).
WannaCry Blame Game: Why Delayed Patching is Not the Problem
While post mortems about patching, updating, and backups have some value, the best preventative security controls are increased understanding and knowledge.
No-Name Security Incidents Caused as Many Tears as WannaCry, Pros Say
Half of security pros say they've worked just as frantically this year to fix other incidents that the public never heard about.
MORE NEWS & COMMENTARY
HOT TOPICS
8 Hot Hacking Tools to Come out of Black Hat USA
High-impact tools for white hats that will be revealed and released next month at Black Hat USA in Las Vegas.

WannaCry Forces Honda to Take Production Plant Offline
Work on over 1,000 vehicles affected at automaker's Sayama plant in Japan while systems were restored.

KPMG: Cybersecurity Has Reached a 'Tipping Point' from Tech to CEO Business Issue
Still, a majority of US-based chief execs say they will be maintaining and not investing in security technology over the next three years, a recent study shows.

MORE
EDITORS' CHOICE

9 Ways to Protect Your Cloud Environment from Ransomware
The same technology driving faster collaboration and data transfer also enables cybercriminals to quickly spread ransomware.
Tech Resources
ACCESS TECH LIBRARY NOW

  • How Cloud Can Streamline Business Workflow

    In order to optimize your utilization of cloud computing, you need to be able to deliver reliable and scalable high performing application over your corporate network. Your business counterparts will expect you to provide network performance that can handle all ...

  • Securing Your Endpoints from Ransomware & Other Trending Attacks

    Attackers have shifted their tactics. They've discovered new ways to re-engineer tactics to make them easier to execute, more evasive, and more likely to deceive targeted users. Combined with targeting platforms that organizations falsely consider more secure, these sophisticated attacks, ...

MORE WEBINARS

Partner Perspectives

Compliance in the Cloud Needs To Be Continuous & Automated
Complex IT environments require timely visibility into risk and compliance.

Talking Cyber-Risk with Executives
Explaining risk can be difficult since CISOs and execs don't speak the same language. The key is to tailor your message for the audience.

Cloud Security & the Power of Shared Responsibility
When you and your CSP jointly embrace the shared security responsibility model you can achieve greater success than you or your provider can achieve alone.

FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.