Follow Dark Reading:
 August 05, 2021
LATEST SECURITY NEWS & COMMENTARY
Why Supply Chain Attacks Are Destined to Escalate
In his keynote address at Black Hat USA on Wednesday, Matt Tait, chief operating officer at Corellium, called for software platform vendors and security researchers to do their part to thwart the fallout of software supply chain compromises.
As Attackers Circle, Federal Agencies Fail to Improve Cybersecurity
Despite being the frequent target of nation-state and criminal actors, nearly every US government agency gets a "C" or "D" for data security, according to a new Senate report.
A New Approach to Securing Authentication Systems' Core Secrets
Researchers at Black Hat USA explain issues around defending "Golden Secrets" and present an approach to solving the problem.

Dark Reading Virtual News Desk Returns to Black Hat

Coming to you prerecorded from home offices around the world!


5 Key Lessons From ICS Attacks Through the Ages
Industrial control systems attacks are happening with more frequency, but they are hardly new.
REvil Most Popular Ransomware Variant in 2021 (So Far)
An increase in global cyberattacks was driven by Web shell activity, targeted ransomware and extortion operations, and supply chain intrusions.
NSA & CISA Publish Kubernetes Security Guidance
Kubernetes is frequently targeted for data theft, computational power theft, or denial of service, the agencies say in a joint advisory.
MORE NEWS & COMMENTARY
HOT TOPICS
New Normal Demands New Security Leadership Structure
At the inaugural Omdia Analyst Summit, experts discuss where the past year has created gaps in traditional security strategy and how organizations can fill them.

8 Security Tools to be Unveiled at Black Hat USA
Security researchers and practitioners share a host of new cyber tools for penetration testing, reverse engineering, malware defense, and more.

Get Ahead of the Hack: Why Cyber Insurance Is Not Enough
Cybersecurity insurance is a smart investment to protect against the effects of ransomware and other attacks, but it shouldn't be your primary defense.

MORE
EDITORS' CHOICE

Average Cost to Buy Access to a Compromised Company: $1,000
The flourishing market for initial access to companies' networks highlights how cybercriminal groups continue to specialize in particular stages of the attack-chain pipeline.
Think Having Avoided Kaseya Means You're Safe? Guess Again
The lesson: Don't assume that everything coming from an apparently benign source is safe.
LATEST FROM THE EDGE

Let the Security Facts Speak for Themselves
Five ways sticking to the facts is good for an organization’s security posture.
Tech Resources
ACCESS TECH LIBRARY NOW

  • External Threat Hunting - Reduce Supply Chain Risk

    In this webinar, we'll look at how one Fortune 100 organization transformed its security program by investing in external threat hunting, establishing a world class threat reconnaissance program that now has proven ROI. With no-touch monitoring of its third parties' networks, ...

  • Making Security Orchestration Automation and Response (SOAR) Work in Your Enterprise

    Over the past few years, many enterprises have been improving cybersecurity by implementing the Security Orchestration, Automation, and Response (SOAR) framework, which provides a path to collect threat data from multiple sources and respond to some security events automatically. How ...

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By Dark Reading
Informa Tech
303 Second St., Suite 900 South Tower, San Francisco, CA 94107
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.