Follow Dark Reading:
 June 28, 2019
LATEST SECURITY NEWS & COMMENTARY
7 Ways to Mitigate Supply Chain Attacks
Breaches caused by external vendors and service providers have become a major and escalating problem for organizations.
How Hackers Infiltrate Open Source Projects
The dependency trees of modern software-development make smaller open-source projects vulnerable to hackers sabotaging code.
Office 365 Multifactor Authentication Done Right
Why the ubiquitous nature of Office 365 poses unique challenges for MFA-based security and how organizations can protect themselves.
Chronicle Folds into Google
Alphabet's enterprise cybersecurity division will become part of the Google security portfolio.
New Exploit for Microsoft Excel Power Query
Proof-of-concept, which allows remote code execution, is latest to exploit Dynamic Data Exchange (DDE) and is another reminder why organizations must ensure Office settings are secure.
More Supply, More Demand: Cybersecurity Skills Gap Remains
Although the number of programs for training workers in cybersecurity skills has increased, as well as the number of graduates, the gap in supply and demand for cybersecurity-skilled workers is essentially unchanged, leaving companies to struggle.
NIST Issues IoT Risk Guidelines
A new report offers the first step toward understanding and managing IoT cybersecurity risks.
Former Equifax CIO Sentenced to Prison for Insider Trading
Jun Ying is the second Equifax employee found guilty of insider trading related to the massive 2017 data breach.
MORE NEWS & COMMENTARY
HOT TOPICS
Pledges to Not Pay Ransomware Hit Reality
While risk analysts and security experts continue to urge companies to secure systems against ransomware, they are now also advising that firms be ready to pay.

Customers of 3 MSPs Hit in Ransomware Attacks
Early information suggests threat actors gained access to remote monitoring and management tools from Webroot and Kaseya to distribute malware.

Email Threats Continue to Grow as Attackers Evolve, Innovate
Threat actors increasingly using malicious URLs, HTTPS domains, file-sharing sites in email attacks, FireEye says.

MORE
EDITORS' CHOICE

Inside MLS, the New Protocol for Secure Enterprise Messaging
As personal messaging platforms see the rise of end-to-end encryption, businesses struggle to provide strong levels of security.
Understanding & Defending Against Polymorphic Attacks
Polymorphic malware is far from a new thing. But today, what is good for attackers is also good for defenders. Here's why.
Learn How Privacy Laws Can Be Used for Identity Theft at Black Hat USA
Attend Black Hat USA this summer and see how researchers are subverting the GDPR's privacy rules and detecting deep fakes with machine learning.
Tech Resources
ACCESS TECH LIBRARY NOW

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.