[TechWeb](?elq_mid=79845&elq_cid=22844169&_mc=NL_DR_EDT_DR_daily_20170818&cid=NL_DR_EDT_DR_daily_20170818&elqTrackId=707c41ec6b1842c09ec5242f95837284&elq=acf4843fa9294d61b4b5c31f48bd8339&elqaid=79845&elqat=1&elqCampaignId=27663)
Follow Dark Reading:
[RSS](
August 18, 2017
Top!Top?elq_mid=79845&elq_cid=22844169
LATEST SECURITY NEWS & COMMENTARY
[Microsoft Report: User Account Attacks Jumped 300% Since 2016](
Most of these Microsoft user account compromises can be attributed to weak, guessable passwords and poor password management, researchers found.
['Pulse Wave' DDoS Attacks Emerge As New Threat](
DDoS botnets are launching short but successive bursts of attack traffic to pin down multiple targets, Imperva says.
[Facebook Doles Out $100K Prize for Internet Defense Prize](100k-prize-for-internet-defense-prize/d/d-id/1329667?elq_mid=79845&elq_cid=22844169&_mc=NL_DR_EDT_DR_daily_20170818&cid=NL_DR_EDT_DR_daily_20170818&elqTrackId=20a2b2bc4bcb48878c1ad417829f5ab9&elq=acf4843fa9294d61b4b5c31f48bd8339&elqaid=79845&elqat=1&elqCampaignId=27663)
Winners developed a new method of detecting spearphishing in corporate networks.
[Critical Infrastructure, Cybersecurity & the 'Devil's Rope'](
How hackers today are engaging in a modern 'Fence Cutter War' against industrial control systems, and what security professionals need to do about it.
[70% of DevOps Pros Say They Didn't Get Proper Security Training in College](
Veracode survey shows majority of DevOps pros mostly learn on the job about security.
[Kill Switches, Vaccines, & Everything in Between](
The language can be a bit fuzzy at times, but there are real differences between the various ways of disabling malware. [MORE NEWS & COMMENTARY](
HOT TOPICS
[Server Management Software Discovered Harboring Backdoor](
ShadowPad backdoor found embedded in a software product used by major organizations around the globe to manage their Linux, Windows, and Unix servers.
[Breaches Are Coming: What Game of Thrones Teaches about Cybersecurity](
Whether you're Lord Commander of the Night's Watch or the CISO of a mainstream business, it's not easy to defend against a constantly evolving threat that is as deadly as an army of White Walkers.
[Amazon Tackles Security of Data in S3 Storage](
Amazon Macie is a new security service built to protect AWS S3 data from accidental leaks and breaches. [MORE](
EDITORS' CHOICE
[The Shadow Brokers: How They Changed 'Cyber Fear'](
At Black Hat USA, Matt Suiche, founder of Comae Technologies, describes what we know about the Shadow Brokers and how they have changed the business of cyber fear.
[[Strategic Security Report] How Enterprises Are Attacking the IT Security Problem](strategic-security-report]-how-enterprises-are-attacking-the-cybersecurity-challenge/390403?elq_mid=79845&elq_cid=22844169&cid=NL_DR_EDT_DR_daily_20170818&_mc=NL_DR_EDT_DR_daily_20170818&elqTrackId=d98a37caf68549858e7890d2336ddb8a&elq=acf4843fa9294d61b4b5c31f48bd8339&elqaid=79845&elqat=1&elqCampaignId=27663)
Enterprises are spending more of their IT budgets on cybersecurity technology. How do your organization's security plans and strategies compare to what others are doing? Here's an in-depth look.
Tech Resources
- [5 Steps to Quantifying Insider Risk](
- [2017 Threat Report](
- [The DomainTools Report: Spring 2017 Edition](
- [GDPR: What It Means & How SAS Data Mgmt Can Help](
- [[Best Practices] Office 365 Security Monitoring](
- [4 Methods of Archiving](
- [Investigate Attacks Like Never Before](
[ACCESS TECH LIBRARY NOW](
- [Faster, More Effective Response With Threat Intelligence & Orchestration Playbooks](
Finding ways to increase speed, accuracy, and efficiency when responding to threats should be the goal of any security team. Baking threat intelligence into the day-to-day efforts of detecting and responding to threats is a great way to see some ...
- [How to Talk to Your Management about IT Security](
This webinar will bring you some new methods for describing and measuring your cybersecurity initiatives so that they can be understood by even the most business-oriented executives.
[MORE WEBINARS](
Partner Perspectives
[How to Avoid the 6 Most Common Audit Failures](
In a security audit, the burden is on you to provide the evidence that you've done the right things.
[Cloud Complexity Mandates Security Visibility](
The cloud is flexible, but security should be the top priority.
[In Search of the Security Unicorn: Unified, Adaptive Defense](
How enterprises can get an edge over innovative cybercriminals by creating a cycle of continual security posture adjustment within their own organizations.
Middle!Middle?elq_mid=79845&elq_cid=22844169
FEATURED REPORTS
- [How Enterprises Are Attacking the IT Security Problem](strategic-security-report]-how-enterprises-are-attacking-the-cybersecurity-challenge/390403?elq_mid=79845&elq_cid=22844169&_mc=NL_DR_EDT_DR_daily_20170818&cid=NL_DR_EDT_DR_daily_20170818&elqTrackId=a2e436775e43414d9307bdfaa7c3dad4&elq=acf4843fa9294d61b4b5c31f48bd8339&elqaid=79845&elqat=1&elqCampaignId=27663)
Enterprises are spending more of their IT budgets on cybersecurity technology. How do your organization's security plans and strategies compare to what others are doing? Here's an in-depth look.
- [Assessing Cybersecurity Risk](strategic-security-report]-assessing-cybersecurity-risk/390613?elq_mid=79845&elq_cid=22844169&_mc=NL_DR_EDT_DR_daily_20170818&cid=NL_DR_EDT_DR_daily_20170818&elqTrackId=66146d280ec04dd2bc3c9885731de031&elq=acf4843fa9294d61b4b5c31f48bd8339&elqaid=79845&elqat=1&elqCampaignId=27663)
[MORE REPORTS](
CURRENT ISSUE
[Security Vulnerabilities: The Next Wave](
[DOWNLOAD THIS ISSUE]( [SUBSCRIBE NOW](
[BACK ISSUES]( | [MUST READS]( | [TECH DIGEST](
PRODUCTS & RELEASES
[IBM Offers Women Scholarships to Hacker Halted Security Conference](
[ISACA Releases New CISM and CRISC Online Review Courses](
[Exploit Leaks Led to Over Five Million Attacks in Q2 2017](
[Alert Logic Releases 2017 Cloud Security Report](
[Rackspace Deploys RiskIQ PassiveTotal](
[MORE PRODUCTS & RELEASES](
Dark Reading Daily
-- Published By [InformationWeek](?elq_mid=79845&elq_cid=22844169&_mc=NL_DR_EDT_DR_daily_20170818&cid=NL_DR_EDT_DR_daily_20170818&elqTrackId=9755ebc70acd43619b25b81beabed12e&elq=acf4843fa9294d61b4b5c31f48bd8339&elqaid=79845&elqat=1&elqCampaignId=27663)
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, [cick here.](
To opt-out of any future Dark Reading Daily Newsletter emails, please respond [here.](
Thoughts about this newsletter? [Give us feedback.](mailto:email@techwebnewsletters.com)
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our [Privacy Statement.](
[© 2017]( | [UBM Tech]( | [Privacy Statement]( | [Terms Of Service]( | [Contact Us](mailto:iwkbtnnewsletters@ubm.com)