Follow Dark Reading:
 June 15, 2019
LATEST SECURITY NEWS & COMMENTARY
Triton Attackers Seen Scanning US Power Grid Networks
The development follows speculation and concern among security experts that the attack group would expand its scope to the power grid.
Better Cybersecurity Research Requires More Data Sharing
Researchers at the Workshop on the Economics of Information Security highlight the cost savings of sharing cybersecurity data and push for greater access to information on breaches, attacks, and incidents.
Sensory Overload: Filtering Out Cybersecurity's Noise
No organization can prioritize and mitigate hundreds of risks effectively. The secret lies in carefully filtering out the risks, policies, and processes that waste precious time and resources.
Predicting Vulnerability Weaponization
Advances in data science are making it possible to shift vulnerability management from a reactive to a proactive discipline.
BlueKeep RDP Vulnerability a Ticking Time Bomb
One month after Microsoft disclosed the flaw, nearly 1 million systems remain unpatched, and Internet scans looking for vulnerable systems have begun increasing.
MORE NEWS & COMMENTARY
HOT TOPICS
Tomorrow's Cybersecurity Analyst Is Not Who You Think
Organizations can't just rely on diverse and cutting-edge technologies to fight adversaries. They will also need people with diverse expertise and backgrounds.

6 Security Scams Set to Sweep This Summer
Experts share the cybersecurity threats to watch for and advice to stay protected.

Huawei Represents Massive Supply Chain Risk: Report
The Chinese technology giant's enormous product and service footprint gives it access to more data than almost any other single organization, Recorded Future says.

MORE
EDITORS' CHOICE

7 Truths About BEC Scams
Business email compromise attacks are growing in prevalence and creativity. Here's a look at how they work, the latest stats, and some recent horror stories.
What 3 Powerful GoT Women Teach Us about Cybersecurity
Imagine Game of Thrones' Daenerys Targaryen, Arya Stark, and Cersei Lannister on the front lines in the real-world battleground of enterprise security.
Tech Resources
ACCESS TECH LIBRARY NOW

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
CURRENT ISSUE
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
PRODUCTS & RELEASES
Dark Reading Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.