Follow Dark Reading:
 August 06, 2020
LATEST SECURITY NEWS & COMMENTARY
What A Security Engineer & Software Engineer Learned By Swapping Roles
A security engineer and infrastructure engineer with Salesforce share lessons learned from their professional role reversal, and advice for people on both teams.
Microsoft Teams Vulnerable to Patch Workaround, Researchers Report
Attackers could work around an earlier patch and use Microsoft Teams Updater to download binaries and payloads.
DDoS Attacks Doubled in Q2 Compared with Prior Quarter
Most attacks were small, but the big ones got bigger than ever, Cloudflare says.
Tales from the Trenches Show Security Issues Endemic to Healthcare
The CISO for Indiana University Health says simple policies, good communication, and strong authentication go much further than vendor tools in solving security problems.
3 Tips for Securing Open Source Software
Maintaining myriad open source components can be tough. Here's how teams can begin to address open source security and continue to innovate.
Cybersecurity Budget Rose in 2019, Uncertainty Prevails in 2020
Budgets rise as IT complexity continued to challenge companies, with identity and access management technology an increasingly common focus.
Retooling the SOC for a Post-COVID World
Residual work-from-home policies will require changes to security policies, procedures, and technologies.
MORE NEWS & COMMENTARY
HOT TOPICS
11 Hot Startups to Watch at Black Hat USA
A sneak peek at the up-and-coming organizations to check out on the Black Hat USA virtual show floor.

Pen Testers Share the Inside Story of Their Arrest and Exoneration
Coalfire's Gary De Mercurio and Justin Wynn share the inside story of their infamous arrest last year while conducting a contracted red-team engagement in an Iowa courthouse -- and what it took to clear their names.

New 'Nanodegree' Program Provides Hands-On Cybersecurity Training
Emerging streamlined curriculum programs aim to help narrow the skills gap.

MORE
BLACK HAT HIGHIGHTS

Dark Reading Video News Desk Returns to Black Hat
UPDATED: Coming to you prerecorded from in front of carefully arranged bookcases around the world ...!
A Paramedic's Guide to Cybersecurity: Video
In this video segment, the Dark Reading News Desk speaks to several guests about healthcare cybersecurity. We begin with Rich Mogull, infosec pro and paramedic, for a discussion about what lessons cybersecurity can learn from emergency medical services and the parallels that already exist.

Come Say Hello and Visit Us at our Black Hat USA Booth

We’re giving away free passes to our Cybersecurity Crash Course at Interop, 2020 Cyber Threats Report, and a Virtual Meeting Backdrop.


EDITORS' CHOICE

By Vinton G. Cerf, Google VP & Chief Internet Evangelist

Why Confidential Computing Is a Game Changer
Confidential Computing is a transformational technology that should be part of every enterprise cloud deployment. It's time to start unlocking the possibilities together.
Tech Resources
ACCESS TECH LIBRARY NOW

  • The Changing Face of Threat Intelligence

    In this webinar, learn how enterprises are using threat intelligence and best practices for integrating threat intel into security operations and incident response.

  • IT Automation: Scaling to the Future

    Experts we will examine the layers of automation and orchestration in IT operations, and how they can provide high availability and greater scale for modern applications and business demands.

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By Dark Reading
Informa Tech
303 Second St., Suite 900 South Tower, San Francisco, CA 94107
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.