Follow Dark Reading:
 July 15, 2019
LATEST SECURITY NEWS & COMMENTARY
A Lawyer's Guide to Cyber Insurance: 4 Basic Tips
The time to read the fine print in your cybersecurity insurance policy is before you sign on the dotted line.

There’s a Security Incident in the Cloud: Who’s Responsible?

It's a valid question, and one many enterprises remain unsure of amid a mass migration that has transformed business over the past few years.


German Schools Ban Office 365, Cite Privacy Concerns
The ruling follows years of debate over whether German schools and institutions should use Microsoft tools and services.
Competing Priorities Mean Security Risks for Small Businesses
Small business IT professionals are trying to balance multiple priorities and finding that the balance often leaves the company with serious security risks.

Name That Toon: Beat the Heat

We provide the cartoon. You write the caption! Enter to win a $25 Amazon gift card.


MORE NEWS & COMMENTARY
HOT TOPICS
10 Ways to Keep a Rogue RasPi From Wrecking Your Network
A Raspberry Pi attached to the network at NASA JPL became the doorway for a massive intrusion and subsequent data loss. Here's how to keep the same thing from happening to your network.

Coast Guard Warns Shipping Firms of Maritime Cyberattacks
A commercial vessel suffered a significant malware attack in February, prompting the US Coast Guard to issues an advisory to all shipping companies: Here be malware.

4 Reasons Why SOC Superstars Quit
Security analysts know they are a hot commodity in the enviable position of writing their own ticket. Here's how to keep them engaged, challenged, and happy.

MORE
EDITORS' CHOICE

7 Hot Cybersecurity Trends to Be Highlighted at Black Hat
Just some of the research and ideas worth checking out at this year's 'security summer camp.'
Black Hat USA Arsenal Serves Up A Smorgasbord of Cybersecurity Tools
Visit the Arsenal this August to go hands-on with hackable gadgets and catch live demos of open-source security tools from some of the best in the business.
NEW FROM THE EDGE

Back to Basics with Log Management, SIEMs & MSSPs

Experts offer their tips on making better use of log data and alerts to improve your security profile.



Tech Resources
ACCESS TECH LIBRARY NOW

  • Vendor ATT&CK Misdirection and How to Avoid It

    In this webinar, you will learn how a simple shift to an adversary-focused approach will help stop targeted threats and will evolve your security program from lean-back to lean-forward -- no matter the size or maturity of your security team.

  • Find out What Your Peer's Top Priorities Are For 2020

    Protecting the network is important but it's no longer enough to secure applications and data. That's why adoption of a Zero Trust security framework is on the rise. Register and attend this webinar to find out more.

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.