Follow Dark Reading:
 July 24, 2017
LATEST SECURITY NEWS & COMMENTARY
Speed of Windows 10 Adoption Not Affected by WannaCry
WannaCry has motivated security teams to stay current on patching but Windows 10 adoption remains the same.
20 Questions for Improving SMB Security
Security leaders in small and medium-sized business who want to up their game need to first identify where they are now, then, where they want to go.
Microsoft Rolls Out AI-based Security Risk Detection Tool
Microsoft Security Risk Detection leverages artificial intelligence to root out bugs in software before it's released.
Dark Reading News Desk Live at Black Hat USA 2017
Over 40 interviews streaming live right from Black Hat USA, July 26-27, from 2 p.m. - 7 p.m. Eastern Time (11 - 4 P.T.).
MORE NEWS & COMMENTARY
HOT TOPICS
Microsoft Office 365 Users Targeted in Brute Force Attacks
Attackers leveraged popular cloud service platforms to conduct persistent - and stealthy - login attempts on corporate Office 365 accounts.

DevOps & Security: Butting Heads for Years but Integration is Happening
A combination of culture change, automation, tools and processes can bring security into the modern world where it can be as agile as other parts of IT.

Dow Jones Data Leak Results from an AWS Configuration Error
Security pros expect to see more incidents like the Dow Jones leak, which exposed customers' personal information following a public cloud configuration error.

MORE
EDITORS' CHOICE

Best of Black Hat: 20 Epic Talks in 20 Years
In celebration of Black Hat's 20th birthday, we take a look back at the most memorable presentations and demos since the show's inception in 1997.
Tech Resources
ACCESS TECH LIBRARY NOW

  • [Cyberattacks] Using Data as Your First Line of Defense

    Attend this webinar to learn how you can determine which threats pose the greatest danger to your enterprise, and how to analyze threat data and use it to help improve your organization's cyber defense.

  • The Real Impact of a Data Security Breach

    In this webcast, experts discuss the real losses associated with a breach, both in the data center and in the business and how an effective data breach response program can help mitigate the damage.

MORE WEBINARS

Partner Perspectives

Profile of a Hacker: The Real Sabu
There are multiple stories about how the capture of the infamous Anonymous leader Sabu went down. Here's one, and another about what he is doing today.

The Hunt for Networks Building Death Star-Sized Botnets
Internet of Things devices are more critically vulnerable to compromise in DDos attacks than ever before. Here's how to defend against them.

Securing your Cloud Stack from Ransomware
Poor configuration, lack of policies, and permissive behaviors are three factors that can leave your cloud infrastructure vulnerable to ransomware threats.

FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.