Follow Dark Reading:
 August 03, 2021
LATEST SECURITY NEWS & COMMENTARY
New Normal Demands New Security Leadership Structure
At the inaugural Omdia Analyst Summit, experts discuss where the past year has created gaps in traditional security strategy and how organizations can fill them.
Build a Continuous Education Program for Better Cybersecurity
Addictive learning works because it keeps students interested and challenged at all times.
Microsoft Warns of 'Crafty' Phishing Campaign
The active campaign uses legitimate-looking original sender addresses and spoofed display sender addresses, along with other tactics, to bypass email filters.
Defenders Face New Challenges As Attack Complexity Grows
A new report states sophisticated attacks and a complex threat landscape lead to burnout among security pros.

(Sponsored Article) 5 Easy-to-Fix Vulnerabilities Threatening Your SMB

Small-business owners can no longer rely on their size to avoid cyberattacks, as no business bank account is too small in the age of automation. Don't become a statistic — protecting these vulnerabilities will keep you safer.


MORE NEWS & COMMENTARY
HOT TOPICS
Inside the Famed Black Hat NOC
Network operations center managers Bart Stump and Neil Wyler (aka Grifter) again head up the show network, but with a new hybrid twist.

Attackers' Use of Uncommon Programming Languages Continues to Grow
Attackers use uncommon languages — such as Go, D, Nim, and Rust — to evade detection or make their development process more efficient.

The Power of Comedy for Cybersecurity Awareness Training
Cybersecurity is serious stuff, but the way we talk about it shouldn't be if we want people to pay attention and remember what they're taught.

MORE
EDITORS' CHOICE

Multiple Zero-Day Flaws Discovered in Popular Hospital Pneumatic Tube System
'PwnedPiper' flaws could allow attackers to disrupt delivery of lab samples, or steal hospital employee credentials, new research shows.
8 Security Tools to be Unveiled at Black Hat USA
Security researchers and practitioners share a host of new cyber tools for penetration testing, reverse engineering, malware defense, and more.
LATEST FROM THE EDGE

5 Key Questions When Evaluating Software Supply Chain Security
Knowing what to ask a potential supplier can minimize risks associated with third-party software vulnerabilities and breaches.
Tech Resources
ACCESS TECH LIBRARY NOW

  • Making Security Orchestration Automation and Response (SOAR) Work in Your Enterprise

    Over the past few years, many enterprises have been improving cybersecurity by implementing the Security Orchestration, Automation, and Response (SOAR) framework, which provides a path to collect threat data from multiple sources and respond to some security events automatically. How ...

  • Two Sides of the PAM Coin

    There are two sides of the PAM (Privileged Access Management) Coin. Password vaulting is one. Privilege Elevation is the other. A vault is a great first step in protecting your company from identity-related data breaches, but don't stop there! We ...

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By Dark Reading
Informa Tech
303 Second St., Suite 900 South Tower, San Francisco, CA 94107
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.