Follow Dark Reading:
 July 20, 2019
LATEST SECURITY NEWS & COMMENTARY

Security Considerations in a BYOD Culture

The 'bring your own device' movement has put security pros on high alert for a new breed of predator who is on the hunt to find ways to exploit the ever-expanding attack surface.


Frank Taylor: Better Processes Lead to Tighter Security

If the now-retired Air Force Brigadier General and first-ever GE CSO ever got the memo about career specialization and 'nichey' expertise, he apparently forgot to read it.


The Truth About Vulnerabilities in Open Source Code

Turns out the problem isn't with the code itself, experts say.


The 10 Essentials of Infosec Forensics
Whether it's your first investigation or 500th, review the basics of IT forensics to streamline and simplify your discovery.

Caption Contest: Name That Toon

We provide the cartoon. You write the caption! Enter to win a $25 Amazon gift card.


About The Edge

Like a Sunday magazine in a daily newspaper, The Edge offers a variety of value-add content.


FROM THE DARK READING NEWS DESK

Malware in PyPI Code Shows Supply Chain Risks
A code backdoor in a package on the Python Package Index demonstrates the importance of verifying code brought in from code repositories.
Mirai Groups Target Business IoT Devices
More than 30% of Mirai attacks, and an increasing number of variants of the malicious malare, are going after enterprise IoT devices, raising the stakes for business.
Europol Head Fears 5G Will Give Criminals an Edge
Catherine De Bolle is concerned law enforcement will lose its ability to track criminals with the arrival of 5G networks.
MORE NEWS & COMMENTARY
HOT TOPICS
Software Developers Face Secure Coding Challenges
Seven in ten developers are expected to write secure code, but less than half receive feedback on security, a survey finds.

8 Legit Tools and Utilities That Cybercriminals Commonly Misuse
Threat actors are increasingly 'living off the land,' using publicly available management and administration tools to conceal malicious activity.

MITRE ATT&CK Framework Not Just for the Big Guys
At Black Hat, analysts from MITRE and Splunk will detail how organizations of many different sizes are leveraging ATT&CK's common language.

MORE
EDITORS' CHOICE

Where Businesses Waste Endpoint Security Budgets
Too many systems, failure to test tools, and fear of replacement drive endpoint complexity and render products less effective.
The Problem with Proprietary Testing: NSS Labs vs. CrowdStrike
Why apples-to-apples performance tests are the only way to accurately gauge the impact of network security products and solutions.
Tech Resources
ACCESS TECH LIBRARY NOW

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.