[TechWeb](
Follow Dark Reading:
[RSS](
July 10, 2019
Top!Top?elq_mid=91862&elq_cid=22844169
LATEST SECURITY NEWS & COMMENTARY
[Microsoft Patches Zero-Day Vulnerabilities Under Active Attack](
Microsoft issued fixes for 77 unique vulnerabilities this Patch Tuesday, including two zero-day privilege escalation vulnerabilities seen exploited in the wild.
[Organizations Are Adapting Authentication for Cloud Applications](
Companies see the changing demands of cloud identity management but are mixed in their responses to those demands.
[Cloud Security and Risk Mitigation](
Just because your data isn't on-premises doesn't mean you're not responsible for security.
[Too Many Tools? Tidy Up in 'KonMari' Style](http://?elq_mid=91862&elq_cid=22844169&elqTrackId=43846d699d0c4d46b07b734a2b6a1848&elq=cb518a4ed5924eee8a58b9fc6709cde3&elqaid=91862&elqat=1&elqCampaignId=34490)
[Financial Impact of Cybercrime Exceeded $45B in 2018](
Cybersecurity analysts explore a range of industry research to examine trends around cyber incidents and their financial impact.
[Coast Guard Warns Shipping Firms of Maritime Cyberattacks](
A commercial vessel suffered a significant malware attack in February, prompting the US Coast Guard to issues an advisory to all shipping companies: Here be malware.
[What the AppSec Penetration Test Found](
New data drills down on the types of security misconfigurations and challenges dogging application developers.
[DevOps' Inevitable Disruption of Security Strategy](
Black Hat USA programming will dive into the ways DevOps-driven shifts in practices and tools are introducing both new vulnerabilities and new ways of securing enterprises.
[Zoom Client for Mac Exposing Users to Serious Risks](
Videoconferencing software maker downplays risks and says mitigations are on the way.
[Insider Threats: An M&A Dealmaker's Nightmare](
Because data has never been more portable, taking it has never been easier. And that's a huge problem during mergers and acquisitions.
[Cybercriminals Target Budding Cannabis Retailers](
Companies in the young, rapidly growing industry are targeted for sensitive information they store and immature security practices.
[Marriott Faces $124 Million GDPR Fine in UK](
The proposed penalty is for a data breach beginning in 2014 that affected more than 500 million customers worldwide. [MORE NEWS & COMMENTARY](
HOT TOPICS
[Toyota's Car-Hacking Tool Now Available](
'PASTA' hardware and software kit now retails for $28,300.
[New 'WannaHydra' Malware a Triple Threat to Android](
The latest variant of WannaLocker is a banking Trojan, spyware tool, and ransomware.
[7 Hot Cybersecurity Trends to Be Highlighted at Black Hat](
Just some of the research and ideas worth checking out at this year's 'security summer camp.' [MORE](
NEW FROM THE EDGE
[Too Many Tools? Tidy Up in 'KonMari' Style](
You've no doubt heard about Marie Kondo's method of decluttering the home. Turns out, it can help security pros tackle all of those security tools piling up around the organization.
[Staying Ahead of the Bot Landscape](
Thinking of the bot landscape as homogeneous paints an overly simplistic picture.
[About The Edge](http://?elq_mid=91862&elq_cid=22844169&elqTrackId=e027804b04a34986b9582e8ab5804319&elq=cb518a4ed5924eee8a58b9fc6709cde3&elqaid=91862&elqat=1&elqCampaignId=34490)
Like a Sunday magazine in a daily newspaper, The Edge offers a variety of value-add content including features, threat data and in-depth perspectives.
Tech Resources
- [7 Reasons You Need Security at the Edge](
- [451 Business Impact Brief: Security for Cloud-Native Compute Will Be Different](
- [Solve the Robo-Calling Plague](
- [Application Security: Know your Risk to Make Strategically Smart Decisions](
- [Understanding Container Adoption With a Special Focus on Container Security](
- [Network Traffic Analysis for MITRE ATT&CK](
- [DZone: Shifting Left With Continuous Delivery](
[ACCESS TECH LIBRARY NOW](
- [Improving Enterprise Authentication: Taming the Password Beast](
In this Dark Reading webinar, a top expert will discuss emerging methods for solving the authentication problem, and for building authentication strategies that go beyond the enterprise premises.
- [Find out What Your Peer's Top Priorities Are For 2020](
Protecting the network is important but it's no longer enough to secure applications and data. That's why adoption of a Zero Trust security framework is on the rise. Register and attend this webinar to find out more.
[MORE WEBINARS](
FEATURED REPORTS
- [2019 State of IT Infrastructure](
This report examines the current state of enterprise data center, storage and network infrastructure, explores how it is evolving, and looks into future plans for implementation. Read the Report today!
- [2019 State of DevOps](
DevOps is needed in today's business environment, where improved application security is essential and users demand more applications, services, and features -- fast. We sought to see where DevOps adoption and deployment stand, this report summarizes our survey findings. Find ...
[MORE REPORTS](
Middle!Middle?elq_mid=91862&elq_cid=22844169
CURRENT ISSUE
[Building and Managing an IT Security Operations Program](
[DOWNLOAD THIS ISSUE]( [SUBSCRIBE NOW](
[BACK ISSUES]( | [MUST READS]( | [TECH DIGEST](
PRODUCTS & RELEASES
[Digital Shadows Raises $10M Strategic Investment Round Led by National Australia Bank Ventures](
[Sandia Researchers Uncover Personalized Medicine Software Vulnerability](
[Internet Isolation Vendor Menlo Security Raises $75 Million in Series D Funding](
[MORE PRODUCTS & RELEASES](
Dark Reading Daily
-- Published By [InformationWeek](
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, [click here.](
To opt-out of any future Dark Reading Daily Newsletter emails, please respond [here.](
Thoughts about this newsletter? [Give us feedback.](mailto:email@techwebnewsletters.com)
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our [Privacy Statement.](
[© 2019]( | [UBM Tech]( | [Privacy Statement]( | [Terms Of Service]( | [Contact Us](mailto:iwkbtnnewsletters@ubm.com)