Follow Dark Reading:
 June 20, 2017
LATEST SECURITY NEWS & COMMENTARY
RNC Voter Data on 198 Million Americans Exposed in the Cloud
One of the largest known US voter data leaks compromised personal information via an unsecured public-storage cloud account set up on behalf of the Republican National Committee.
Major Websites Vulnerable to their Own Back-End Servers
DoD, other websites found with back-end server flaws and misconfigurations that could give attackers an entryway to internal networks, researcher will demonstrate at Black Hat USA next month.
Invisible Invaders: Why Detecting Bot Attacks Is Becoming More Difficult
Traditional methods can't block the latest attackers, but a behavioral approach can tell the difference between bots and humans.
Rise of Nation State Threats: How Can Businesses Respond?
Cybersecurity experts discuss nation-state threats of greatest concerns, different types of attacks, and how organization can prepare.
Microsoft, Accenture Team up on Blockchain for Digital ID Network
Microsoft and Accenture use blockchain tech to build a digital ID network, which will help give legal identification to 1.1 billion people without official documents.
Accused Yahoo Hacker May Comply with US Extradition
A Canadian hacker accused of collaborating with Russian cybercriminals in the 2014 Yahoo breach, may waive his right to fight US extradition.
MORE NEWS & COMMENTARY
HOT TOPICS
Hacker Bypasses Microsoft ATA for Admin Access
Microsoft's Advanced Threat Analytics defense platform can be cheated, a researcher will show at Black Hat USA next month.

1 Million Endpoints Exposed on Public Internet via Microsoft File-Sharing Services
Research on global Internet security posture found endpoints leaving Microsoft SMB file-sharing systems wide open online, a finding that explains the rapid spread of WannaCry, Rapid7 says.

Trump's Executive Order: What It Means for US Cybersecurity
The provisions are all well and good, but it's hardly the first time they've been ordered by the White House.

MORE
IN CASE YOU MISSED IT

(Sponsored Article) 3 Steps to Stop Departing Employees from Pocketing Your IP
It takes more than policies to prevent staffers from taking customer information, price lists, marketing plans, sales data, and competitive intelligence when they leave for greener pastures.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Securing Your Endpoints from Ransomware & Other Trending Attacks

    Attackers have shifted their tactics. They've discovered new ways to re-engineer tactics to make them easier to execute, more evasive, and more likely to deceive targeted users. Combined with targeting platforms that organizations falsely consider more secure, these sophisticated attacks, ...

  • Open Source: The Benefits & Challenges

    Open source technology is gaining ground throughout IT and especially in operating systems and databases. Open source software drives efficiency and innovation, but affects your application stacks and introduces new challenges to keeping them highly available and performing. Find out ...

MORE WEBINARS

Partner Perspectives

Cyber Insurance: Read the Fine Print!
Applying for insurance is a grueling process involving detailed questionnaires and lengthy technical interviews that can still leave you without an adequate safety net.

Ditch the Big Ass Spreadsheet with Continuous Security Compliance
Replacing outdated spreadsheets with automated, continuous monitoring reduces workload and increases reliability, making compliance easy.

Hide & Seek: Security Teams Lack Visibility in the Cloud
IT leaders remain on the hot seat when it comes to their ability to continuously monitor the state of their data and operations. How hot is your seat?

FEATURED REPORTS
  • [Interop ITX 2017] State Of DevOps Report

    The DevOps movement brings application development and infrastructure operations together to increase efficiency and deploy applications more quickly. But embracing DevOps means making significant cultural, organizational, and technological changes. This research report will examine how and why IT organizations are ...

  • The State of IT Ops & Modern Application Tools in the Enterprise

    This new survey conducted by UBM and Sumo Logic highlights the need for visibility into and intelligence about the full IT application stack. Read the report today!

MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.