Follow Dark Reading:
 June 28, 2018
LATEST SECURITY NEWS & COMMENTARY
WPA3 Brings New Authentication and Encryption to Wi-Fi
The Wi-Fi Alliance officially launches its latest protocol, which offers new capabilities for personal, enterprise, and IoT wireless networks.
First Women-Led Cybersecurity Venture Capital Firm Launches
Chenxi Wang, former Forrester VP of research and Twistlock executive, heads up Rain Capital, with the intent to also help build new startups.
Black Hat Survey: Enterprise Tech, US Government Unprepared for Cyberattacks
The 2018 Black Hat Attendee survey reveals worries over the effectiveness of enterprise security technology, and threat to US infrastructure.
Russia, Facebook & Cybersecurity: Combating Weaponized FUD in the Social Media Age
It's up to everyone -- users, security pros, government -- to be critical about the online information we encounter.
Destructive Nation-State Cyberattacks Will Rise
More than 90 percent of respondents in a Tripwire survey in Europe expect attacks by state-sponsored threat actors to increase in the next 12 months.
Cynicism in Cybersecurity: Confessions of a Recovering Cynic
Anyone constantly dealing with complex computer systems teetering on the brink of disaster will likely succumb to the cult of cynicism. These four strategies will help you focus on the positive.
MORE NEWS & COMMENTARY
HOT TOPICS
Cracking Cortana: The Dangers of Flawed Voice Assistants
Researchers at Black Hat USA will show how vulnerabilities in Microsoft's Cortana highlight the need to balance security with convenience.

8 Security Tips for a Hassle-Free Summer Vacation
It's easy to let your guard down when you're away. Hackers know that, too.

Intel Names Window Snyder as Chief Software Security Officer
The microprocessor giant hires security veteran credited with leading both Microsoft's and Apple's security advancements.

MORE
EDITORS' CHOICE

10 Tips for More Secure Mobile Devices
Mobile devices can be more secure than traditional desktop machines - but only if the proper policies and practices are in place and in use.
7 Places Where Privacy and Security Collide
Privacy and security can experience tension at a number of points in the enterprise. Here are seven - plus some possibilities for easing the strain.
Tech Resources
ACCESS TECH LIBRARY NOW

  • The Latest In Domain Fraud Trends And How To Secure Your Brand's Domain Footprint

    With suspicious and infringing domains on the rise, it's imperative that organizations protect themselves and their customers from the threats they pose, bringing the rise of strategic domain management and its importance. Learn how your organization can protect themselves.

  • Migrating Security Controls to the Cloud

    Hear as top experts in cloud security discuss the transition of legacy, on-premises security systems to the cloud, and how your organization can protect your data and operations against potential threats while expanding your use of cloud services.

MORE WEBINARS
FEATURED REPORTS
  • 2018 State of the Cloud Report

    Cloud adoption is growing, but how are organizations taking advantage of it? Interop ITX and InformationWeek surveyed technology decision-makers to find out, read this report to discover what they had to say!

  • How Enterprises Are Attacking the IT Security Problem

    Enterprises are spending more of their IT budgets on cybersecurity technology. How do your organization's security plans and strategies compare to what others are doing? Here's an in-depth look.

MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Weekly
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, cick here.
To opt-out of any future Dark Reading Weekly Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.