Follow Dark Reading:
 July 26, 2018
LATEST SECURITY NEWS & COMMENTARY
The ABCs of Hacking a Voting Machine
A hacker who successfully infiltrated a voting machine at last year's DEF CON will demonstrate at Black Hat USA how he did it, as well as what he later found stored on other decommissioned WinVote machines.
US-CERT Warns of ERP Application Hacking
ERP applications such as Oracle and SAP's are open to exploit and under attack, according to a new report referenced in a US-CERT warning.
Iranian Hacker Group Waging Widespread Espionage Campaign in Middle East
Unlike other threat actors that have a narrow set of targets, Leafminer has over 800 organizations in its sights, Symantec says.
Securing Our Interconnected Infrastructure
A little over a year ago, the world witnessed NotPetya, the most destructive cyberattack to date. What have we learned?
Google Security Updates Include Titan Hardware Key
At Next 2018, Google also launches context-aware access management, shielded VMs, and G Suite security center investigation tool.
'Password Check Required'? Not So Fast
The most successful phishing emails tell users to check their passwords or investigate security alerts.
Google Calls Out Insecure Sites in New Chrome Version
The latest version of the Chrome browser puts a label on unencrypted websites.
MORE NEWS & COMMENTARY
HOT TOPICS
72% of CEOs Steal Corporate IP from Former Employers
Employees often take corporate IP because they feel ownership over their work, a trend security experts say is a problem.

6 Ways to Tell an Insider Has Gone Rogue
Malicious activity by trusted users can be very hard to catch, so look for these red flags.

What the Incident Responders Saw
New report on IR professionals' experiences reveals just how advanced attackers, such as nation-state hackers, dig in even after they're detected.

MORE
EDITORS' CHOICE

7 Ways to Better Secure Electronic Health Records
Healthcare data is prime targets for hackers. What can healthcare organizations do to better protect all of that sensitive information?
The Good & Bad News About Today's Cybersecurity Investment Landscape
Lots of things keep CISOs up at night. But instead of guessing what CISOs want, investors and vendors should incorporate customer feedback throughout product ideation and development cycles.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Active Archive & Data Repository with Hadoop

    Once you've begun to use Hadoop for ETL offload, the next logical steps on your journey toward the data warehouse of the future are to create an active archive and a data repository. This webinar will teach you how!

  • Improving Enterprise Authentication

    Learn about emerging methods for solving the authentication problem, and the need for building authentication strategies that go beyond the enterprise premises.

MORE WEBINARS

Partner Perspectives

Get Smart About Network Segmentation & Traffic Routing
Through a combination of intelligent segmentation and traffic routing to tools, you can gain much better visibility into your network. Here's how.

Boosting Security Effectiveness with 'Adjuvants'
How integrating corporate resources like the IT help desk, system administration, quality assurance and HR can breathe new life into your security program.

FEATURED REPORTS
  • 2017 State of IT Report

    In today's technology-driven world, "innovation" has become a basic expectation. IT leaders are tasked with making technical magic, improving customer experience, and boosting the bottom line -- yet often without any increase to the IT budget. How are organizations striking ...

  • How Enterprises Are Attacking the IT Security Problem

    Enterprises are spending more of their IT budgets on cybersecurity technology. How do your organization's security plans and strategies compare to what others are doing? Here's an in-depth look.

MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.