[TechWeb](
Follow Dark Reading:
[RSS](
July 29, 2019
LATEST SECURITY NEWS & COMMENTARY
[Companies' 'Anonymized' Data May Violate GDPR, Privacy Regs](
New study found that any database containing 15 pieces of demographic data could be used to identify individuals.
[A Security-First Approach to DevOps](
Aware of the risks inherent in software, businesses are recognizing the need for application security.
[3 Takeaways from the First American Financial Breach](
Data leaks from business logic flaws are not well understood and difficult to identify before they reach production environments. Here's how to find and prevent them.
[Malware Researcher Hutchins Sentenced to Supervised Release](
Marcus Hutchins, the researcher known for stopping WannaCry, avoids jail time over charges of creating and distributing Kronos malware.
ICYMI
[7 Hot Cybersecurity Trends to Be Highlighted at Black Hat](
Just some of the research and ideas worth checking out at this year's 'security summer camp.'
[6 Security Tips That'll Keep the Summer Fun](
Taking some time off this summer? Before you head out on vacation, make sure your devices and apps are also ready. [MORE NEWS & COMMENTARY](
HOT TOPICS
[How Cybercriminals Break into the Microsoft Cloud](
Microsoft and Trimarc researchers explore the most common attacks against the cloud and effective defenses and mitigation.
[The War for Cyber Talent Will Be Won by Retention not Recruitment](
Six steps for creating a work environment that challenges, stimulates, rewards, and constantly engages employees fighting the good fight against cybercriminals.
[What Every Security Team Should Know About Internet Threats](
Of particular interest for cybercriminals is the Domain Name System, which plays a central role in orchestrating all Internet and application traffic. [MORE](
EDITORS' CHOICE
[7 Stats That Show What It Takes to Run a Modern SOC](
An inside look at staffing levels, budget allocation, outsourcing habits, and the metrics used by security operations centers (SOCs).
[Black Hat Q&A: Inside the Black Hat NOC](
Cybersecurity expert Bart Stump explains what it's like to reliably deliver a useful, high-security network for one of the toughest audiences in the world.
NEW FROM THE EDGE
[Travel Security [from J4vv4D]](
Do you travel to dangerous places, like Information Security Conferences?
Tech Resources
- [The Future of AI-Powered Autonomous Response](
- [Are Your Security Controls Yesterday's News?](
- [4 Cybersecurity Essentials Your Board Wants to Know](
- [Back to Basics with Log Management, SIEMs & MSSPs](
- [Testing for Compliance Just Became Easier](
- [State of the Internet: Web Attacks & Gaming Abuse](
- [IDC SpotLight: Protecting Against Threats with Application Security Testing](
[ACCESS TECH LIBRARY NOW](
- [DDoS Resilience, Remediation & Recovery: Updating Your Strategy](
Are you ready for a DDoS attack on your network -- or on your service provider's network - or is it time to update your resilience, remediation and recovery plan? In this webinar, learn strategies that will make your business ...
- [Vendor ATT&CK Misdirection and How to Avoid It](
In this webinar, you will learn how a simple shift to an adversary-focused approach will help stop targeted threats and will evolve your security program from lean-back to lean-forward -- no matter the size or maturity of your security team.
[MORE WEBINARS](
FEATURED REPORTS
- [Salary Survey: Can you spare 10 minutes?](
InformationWeek and Interop are putting together a comprehensive IT salary report and we need your help... Can you spare 10 minutes?
- [2019 State of DevOps](
DevOps is needed in today's business environment, where improved application security is essential and users demand more applications, services, and features -- fast. We sought to see where DevOps adoption and deployment stand, this report summarizes our survey findings. Find ...
[MORE REPORTS](
CURRENT ISSUE
[Building and Managing an IT Security Operations Program](
[DOWNLOAD THIS ISSUE]( [SUBSCRIBE NOW](
[BACK ISSUES]( | [MUST READS]( | [TECH DIGEST](
PRODUCTS & RELEASES
[2019 SMB Cyberthreat Study: Most SMBs Severely Underestimate Their Cybersecurity Vulnerabilities](
[The Infosec Industry Comes Together to Recognize Innovators and Leaders at the First-Ever Cybersecurity Women of the Year Awards](
[ISA Announces First Founding Members of Global Cybersecurity Alliance](
[MORE PRODUCTS & RELEASES](
Dark Reading Daily
-- Published By [InformationWeek](
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, [click here.](
To opt-out of any future Dark Reading Daily Newsletter emails, please respond [here.](
Thoughts about this newsletter? [Give us feedback.](mailto:email@techwebnewsletters.com)
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our [Privacy Statement.](
[© 2019]( | [UBM Tech]( | [Privacy Statement]( | [Terms Of Service]( | [Contact Us](mailto:iwkbtnnewsletters@ubm.com)