Follow Dark Reading:
 August 03, 2019
LATEST SECURITY NEWS & COMMENTARY
Farewell, Dear Password? The Future of Identity and Authorization
Many organizations are questioning whether eliminating passwords as an authentication tool would augment their overall security posture.
A Realistic Path Forward for Security Orchestration and Automation
Security teams often look to technology to solve their security challenges. Yet sometimes investing in new products can create more issues.
Why Every Organization Needs an Incident Response Plan
OK, perhaps that's self-evident, so how come it far too often still takes an incident to trigger planning?
Keep Your Eye on Digital Certificates
X.509 certificates help secure the identity, privacy, and communication between two endpoints, but these digital certificates also have built-in expirations and must be managed.
A Security-First Approach to DevOps
Aware of the risks inherent in software, businesses are recognizing the need for application security.
FROM THE DARK READING NEWS DESK

Capital One: What We Should Learn This Time
Where Capital One went wrong, what the bank did right, and more key takeaways from the latest mega-breach.
Black Hat: A Summer Break from the Mundane and Controllable
Enjoy the respite from the security tasks that await you back at home. Then prepare yourself for the uphill battles to come. Here's how.
US Utilities Hit with Phishing Attack
An email phishing attack, thought to be from a nation-state actor, claims that engineers have failed licensing exams.
MORE NEWS & COMMENTARY
HOT TOPICS
Companies' 'Anonymized' Data May Violate GDPR, Privacy Regs
New study found that any database containing 15 pieces of demographic data could be used to identify individuals.

Sextortion Email Scams Rise Sharply
Cybercriminals are increasingly trying to trick people into paying ransoms by threatening to expose compromising activities to friends and family.

4 Network Security Mistakes Bound to Bite You
It's Shark Week again! Are you ready to outmaneuver sharks of the cyber variety? These tips can help.

MORE
EDITORS' CHOICE

8 Free Tools to Be Showcased at Black Hat and DEF CON
Expect a full slate of enterprise-class open source tools to take the spotlight when security researchers share their bounties with the community at large.
Security Training That Keeps Up with Modern Development
Black Hat USA speakers to discuss what it will take to 'shift knowledge left' to build up a corps of security-savvy software engineers.
Tech Resources
ACCESS TECH LIBRARY NOW

  • DDoS Resilience, Remediation & Recovery: Updating Your Strategy

    Are you ready for a DDoS attack on your network -- or on your service provider's network - or is it time to update your resilience, remediation and recovery plan? In this webinar, learn strategies that will make your business ...

  • 10 Emerging Threats to Enterprise Applications

    In this Dark Reading webinar, application security experts offer a look at some of the latest and most potentially damaging threats to current enterprise apps, and how those threats can expose your organization to data compromise and theft.

MORE WEBINARS
FEATURED REPORTS
  • [Malware Threats Survey] Do you have 10 mins to spare?

    Dark Reading needs your help with this 10-minute survey. Complete the survey and you can enter to win one of five $50 Amazon gift cards!

  • State of the Cloud

    This research report will delve into public, private and hybrid cloud adoption trends, with a special focus on infrastructure as a service and its role in the enterprise. Find out the challenges organizations are experiencing, and the technologies and strategies ...

MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.