[TechWeb]( Follow Dark Reading:
[RSS](
July 31, 2021 LATEST SECURITY NEWS & COMMENTARY [Inside the Famed Black Hat NOC](
Network operations center managers Bart Stump and Neil Wyler (aka Grifter) again head up the show network, but with a new hybrid twist.
[101: Why BGP Hijacking Just Won't Die](
A look at the dangers of attacks on the Internet's Border Gateway Protocol and what ISPs and enterprises can do about them.
[When Software Updates Get Hacked](
Darned if you do, darned if you don't: Software fixes have become extensively automated, which works when software supply chains are secure. Yet with attackers focused on compromising those pipelines, is automated patching such a good idea?
[Phishing, Viruses Continue to Dominate the Malware Landscape](
Despite concerns over widely publicized ransomware and supply chain attacks, most enterprises report that phishing attacks and viruses are the most common threats they face.
[How Do I Let Go of 'Human Error' as an Explanation for Incidents?](
Successfully learning from incidents requires a deeper and more expansive perspective of them. [MORE NEWS & COMMENTARY]( HOT TOPICS [Top Security Leaders Share Management Tips, Lessons, and Stories]( A panel of experts from Microsoft, Twitter, Cisco, and MongoDB share their thoughts on non-technical CISOs, managing through crises, and how they wish people communicated with them.
[How to Secure Your Cryptocurrency Wallet]( With your investments in a digital wallet, under your control, you are the sole owner and can have the peace of mind that no institution can confiscate your digital assets.
[When Ransomware Comes to (Your) Town]( While steps for defending against a ransomware attack vary based on the size of the government entity and the resources available to each one, rooting out ransomware ultimately will come down to two things: system architecture and partnerships. [MORE]( EDITORS' CHOICE [How Gaming Attack Data Aids Defenders Across Industries](
Web application attacks against the video game industry quadrupled in 2020 compared to the previous year, but companies outside entertainment can learn from the data. FROM THE NEWS DESK [8 Security Tools to be Unveiled at Black Hat USA](
Security researchers and practitioners share a host of new cyber tools for penetration testing, reverse engineering, malware defense, and more. Tech Resources - [The New Risk Equation: Motives, Means, Opportunity](
- [Today's Hybrid Work Model Requires a Hybrid Approach to Security](
- [Accelerate Network Operations Efficiency with AIOps](
- [Ransomware, the Exploding Cyber Threat](
- [Case Study: What Elite Threat Hunters See That Others Miss](
- [Incident Readiness and Building Response Playbook](
- [GRC Buyer's Guide - 5 Steps to Success]( [ACCESS TECH LIBRARY NOW]( - [External Threat Hunting - Reduce Supply Chain Risk]( In this webinar, we'll look at how one Fortune 100 organization transformed its security program by investing in external threat hunting, establishing a world class threat reconnaissance program that now has proven ROI. With no-touch monitoring of its third parties' networks, ... - [Making Security Orchestration Automation and Response (SOAR) Work in Your Enterprise]( Over the past few years, many enterprises have been improving cybersecurity by implementing the Security Orchestration, Automation, and Response (SOAR) framework, which provides a path to collect threat data from multiple sources and respond to some security events automatically. How ... [MORE WEBINARS]( FEATURED REPORTS - [How Enterprises Are Developing Secure Applications](
- [Tech Insights: Detecting and Preventing Insider Data Leaks]( [MORE REPORTS]( CURRENT ISSUE
[The State of Cybersecurity Incident Response](
[DOWNLOAD THIS ISSUE]( [SUBSCRIBE NOW](
[BACK ISSUES]( | [MUST READS]( | [TECH DIGEST]( PRODUCTS & RELEASES [CrowdStrike Falcon X Recon+ Expands Threat Intelligence Suite, Delivering Managed Protection Against Dark Web Threats](
CrowdStrike expands fast-growing threat intelligence leadership with new offering to help organizations proactively hunt threat actors looking for opportunities to exploit their brand, steal their data and gain unauthorized access.
[Tenable Helps Organizations Disrupt Attacks with New Active Directory Security Readiness Checks](
Tenable has developed 10 foundational configuration checks for its solutions, including Tenable.io, Tenable.sc and both Nessus Professional and Nessus Essentials, that assess Microsoft Active Directory security readiness.
[Zerto Announces General Availability of Zerto 9 for Ransomware Recovery](
Solution also provides enhanced cloud data management and protection capabilities for end users and managed service providers.
[Noetic Cyber Launches with $20M in Funding](
New entrant to cyber asset management and continuous controls monitoring markets brings innovative approach to fundamental cybersecurity challenge.
[Epiphany Systems Launches Offensive Context-Aware Platform](
Epiphany's 'Exploitability Index' helps contextualize cyber-risk and drives better decisions. [MORE PRODUCTS & RELEASES]( Dark Reading Daily
-- Published By [Dark Reading](
Informa Tech
303 Second St., Suite 900 South Tower, San Francisco, CA 94107
To update your profile, change your e-mail address, or unsubscribe, [click here.](
To opt-out of any future Dark Reading Daily Newsletter emails, please respond [here.](
Thoughts about this newsletter? [Give us feedback.](mailto:customerservice_informationhub@techweb.com)
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our [Privacy Statement.]( [© 2021]( | [Informa Tech]( | [Privacy Statement]( | [Terms & Conditions]( | [Contact Us](mailto:customerservice_informationhub@techweb.com)