Follow Dark Reading:
 July 27, 2019
LATEST SECURITY NEWS & COMMENTARY
What Every Security Team Should Know About Internet Threats
Of particular interest for cybercriminals is the Domain Name System, which plays a central role in orchestrating all Internet and application traffic.
How to Create Smarter Risk Assessments
Executives and directors need quantitative measurements - such as likelihood of loss and hard-dollar financial impact - to make more informed decisions about security risks.
VPNs' Future: Less Reliant on Users, More Transparent, And Smarter
Virtual private networking is poised to become more automated and intelligent, especially as endpoints associated with cloud services and the IoT need protection.
DHS's Bob Kolasky Goes All in on Risk Management
As director of the DHS's National Risk Management Center, measuring and managing risk for critical infrastructure across 16 industrial sectors, Kolasky stands at a busy crossroads.

Planning a Bug Bounty Program? Follow Shopify's Example

Four years, $1 million in payouts, and the identification of 950 bugs later, Shopify provides an excellent example for organizations looking to launch their own programs.


Travel Security [from J4vv4D]

Do you travel to dangerous places, like Information Security Conferences?


Contest: Name That Toon

We provide the cartoon. You write the caption! Submit your caption in the comments, and our panel of experts will reward the winner with a $25 Amazon gift card.


FROM THE DARK READING NEWS DESK

Companies' 'Anonymized' Data May Violate GDPR, Privacy Regs
New study found that any database containing 15 pieces of demographic data could be used to identify individuals.
3 Takeaways from the First American Financial Breach
Data leaks from business logic flaws are not well understood and difficult to identify before they reach production environments. Here's how to find and prevent them.
FormGet Storage Bucket Leaks Passport Scans, Bank Details
Exposed files include mortgage and loan information, passport and driver's license scans, internal corporate files, and shipping labels.
Complete Personal Fraud Kits Sell for Less Than $40 on Dark Web
The low cost of records reflects the huge supply of PII after many breaches at hospitals, government agencies, and credit bureaus.
MORE NEWS & COMMENTARY
HOT TOPICS
How Cybercriminals Break into the Microsoft Cloud
Microsoft and Trimarc researchers explore the most common attacks against the cloud and effective defenses and mitigation.

The War for Cyber Talent Will Be Won by Retention not Recruitment
Six steps for creating a work environment that challenges, stimulates, rewards, and constantly engages employees fighting the good fight against cybercriminals.

8 Legit Tools and Utilities That Cybercriminals Commonly Misuse
Threat actors are increasingly 'living off the land,' using publicly available management and administration tools to conceal malicious activity.

MORE
EDITORS' CHOICE

7 Stats That Show What It Takes to Run a Modern SOC
An inside look at staffing levels, budget allocation, outsourcing habits, and the metrics used by security operations centers (SOCs).
CISO Pressures: Why the Role Stinks and How to Fix It
CISOs spend much less time in their role than other members of the boardroom. It's a serious problem that must be addressed.
Black Hat Q&A: Inside the Black Hat NOC
Cybersecurity expert Bart Stump explains what it's like to reliably deliver a useful, high-security network for one of the toughest audiences in the world.
Tech Resources
ACCESS TECH LIBRARY NOW

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.