Follow Dark Reading:
 May 18, 2019
LATEST SECURITY NEWS & COMMENTARY
Effective Pen Tests Follow These 7 Steps
Third-party pen tests are part of every comprehensive security plan. Here's how to get the most from this mandatory investment.
Q1 2019 Smashes Record For Most Reported Vulnerabilities in a Quarter
Once again, a high-proportion of the reported flaws have no current fix, according to Risk Based Security.
Artist Uses Malware in Installation
A piece of 'art' currently up for auction features six separate types of malware running on a vulnerable computer.
DevOps Repository Firms Establish Shared Analysis Capability
Following an attack on their users, and their shared response, Atlassian, GitHub, and GitLab decide to make the sharing of attack information a permanent facet of their operations.
When Older Windows Systems Won't Die
Microsoft's decision to patch unsupported machines for the critical CVE-2019-0708 flaw is a reminder that XP, 2003, and other older versions of Windows still run in some enterprises.
A Trustworthy Digital Foundation Is Essential to Digital Government
Agencies must take steps to ensure that citizens trust in the security of government's digital channels.
Exposed Elasticsearch Database Compromises Data on 8M People
Personal data exposed includes full names, physical and email addresses, birthdates, phone numbers, and IP addresses.
MORE NEWS & COMMENTARY
HOT TOPICS
Attackers Are Messing with Encryption Traffic to Evade Detection
Unknown groups have started tampering with Web traffic encryption, causing the number of fingerprints for connections using Transport Layer Security to jump from 19,000 to 1.4 billion in less than a year.

Microsoft Patches Wormable Vuln in Windows 7, 2003, XP, Server 2008
Microsoft releases security updates for some out-of-support systems to fix a bug that could be weaponized as a worm if exploited.

Missing in Action: Cybersecurity Professionals
Just as every organization security team's needs are unique, so are the reasons for the shortage of candidates for open positions. Here are five strategies to help you close the gap.

MORE
EDITORS' CHOICE

Demystifying the Dark Web: What You Need to Know
The Dark Web and Deep Web are not the same, neither is fully criminal, and more await in this guide to the Internet's mysterious corners.
Cyber Workforce Exec Order: Right Question, Wrong Answer
Shuffling resources, adding administrative process, and creating a competition and incentive system will do little to grow and mature the talent we need to meet the cybersecurity challenges we face.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Automating Cybersecurity Functions in Your Enterprise

    Organizations face tremendous challenges when trying to keep pace with the volume of cyber incidents they are seeing today. Information security leaders are looking to the benefits of security orchestration and automation to relieve the strain on their incident response ...

  • A Day in the Life of an OT Cybersecurity Expert

    Listen to three OT cybersecurity experts who will share their experience and lessons learned when securing the critical infrastructure.

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.