Defense Secretary Outlines New Cybersecurity Strategy
Smartphone Security Shootout
The Bad News For Infosec In The Target Settlement
White House's Daniel 'Intrigued' By UL-Type Model For IoT Security
Setting Security Professionals Up For Success
News & Commentary
Interop: Understand Your Attackers For Better Network Defense
Ericka Chickowski, Contributing Writer, Dark ReadingNews
Knowing who will target you is key in network security prioritization.
By Ericka Chickowski Contributing Writer, Dark Reading, 4/27/2015
Comment0 comments  |  Read  |  Post a Comment
Third-Party Risk and Organizational Situational Awareness
Emilio Iasiello, Senior Cyber Intelligence Analyst at Fidelis Cybersecurity Solutions
A rigorous risk management approach will help organizations understand the potential risks posed by their partners.
By Emilio Iasiello Senior Cyber Intelligence Analyst at Fidelis Cybersecurity Solutions, 4/27/2015
Comment0 comments  |  Read  |  Post a Comment
InformationWeek News Desk Debuts At Interop 2015
InformationWeek Staff, Commentary
Whether you are attending Interop in person or keeping tabs on the show from your desk at the office, the InformationWeek News Desk is a new way to keep up-to-date and find out what the biggest names in the industry think about the future of information technology.
By InformationWeek Staff , 4/27/2015
Comment1 Comment  |  Read  |  Post a Comment
Twitter's Top 10 Social CISOs
Marilyn Cohodas, Community Editor, Dark Reading
If you work in information security today, you're on Twitter. Or are you?
By Marilyn Cohodas Community Editor, Dark Reading, 4/27/2015
Comment0 comments  |  Read  |  Post a Comment
As Malware Surges, U.S. Remains Biggest Source of Attacks
Jai Vijayan, Freelance writerNews
The country leads others in malicious IP, URLs and phishing sites.
By Jai Vijayan Freelance writer, 4/24/2015
Comment6 comments  |  Read  |  Post a Comment
Smartphone Security Shootout
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
Researcher compared Apple iOS, Android, Windows smartphones for business use privacy and security.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 4/24/2015
Comment7 comments  |  Read  |  Post a Comment
Defense Secretary Outlines New Cybersecurity Strategy
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
Russian hackers were caught infiltrating unclassified military networks earlier this year, he said.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 4/24/2015
Comment1 Comment  |  Read  |  Post a Comment
Cybersecurity: Don’t Bank On It With 3rd Parties
Greg Dickinson, CEO, HiperosCommentary
Not knowing that a contractor’s employee had access to system passwords is not a valid excuse when your client’s records are stolen.
By Greg Dickinson CEO, Hiperos, 4/24/2015
Comment1 Comment  |  Read  |  Post a Comment
DHS Courts Private Sector For Threat Intelligence-Sharing
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
Homeland Security NCCIC now STIX- and TAXII-enabled for automated machine-to-machine sharing of intel, agency officials told attendees at the RSA Conference.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 4/23/2015
Comment2 comments  |  Read  |  Post a Comment
Behavioral Biometrics On The Rise At RSA Conference
Sara Peters, Senior Editor at Dark ReadingNews
Harder to spoof and easier on users, behavioral biometrics may be bigger than passwords soon.
By Sara Peters Senior Editor at Dark Reading, 4/23/2015
Comment3 comments  |  Read  |  Post a Comment
6 Most Dangerous New Attack Techniques in 2015
Ericka Chickowski, Contributing Writer, Dark ReadingNews
SANS experts lay out the up-and-coming trends in attack patterns at RSA Conference.
By Ericka Chickowski Contributing Writer, Dark Reading, 4/23/2015
Comment2 comments  |  Read  |  Post a Comment
Government Giving 'No More Free Passes' To Cybercriminals
Sara Peters, Senior Editor at Dark ReadingNews
At RSA Conference Wednesday, Assistant Attorney General for National Security John Carlin explained the government's new "all tools approach" to cracking down on cyberespionage and other crime.
By Sara Peters Senior Editor at Dark Reading, 4/22/2015
Comment10 comments  |  Read  |  Post a Comment
From The RSA Keynote Stage, Day Two
Sara Peters, Senior Editor at Dark ReadingNews
A 9-year-old CEO hacker, a record-breaking swimmer, and a variety of ideas about data-driven security hit the RSA stage.
By Sara Peters Senior Editor at Dark Reading, 4/22/2015
Comment0 comments  |  Read  |  Post a Comment
‘Golden Hour’ Incident Response Agility
Torry Campbell, Chief Technical Officer of Endpoint and Management at Intel Security
Security leaders must encourage and integrate data, processes, and controls to facilitate comprehension and investment of precious human capital in higher-level tasks.
By Torry Campbell Chief Technical Officer of Endpoint and Management at Intel Security, 4/22/2015
Comment0 comments  |  Read  |  Post a Comment
The Bad News For Infosec In The Target Settlement
Giora Engel, VP Product & Strategy, LightCyberCommentary
The legal argument behind the $10 million Class Action lawsuit and subsequent settlement is a gross misrepresentation of how attackers operate.
By Giora Engel VP Product & Strategy, LightCyber, 4/22/2015
Comment5 comments  |  Read  |  Post a Comment
The Rise of Counterintelligence in Malware Investigations
John Bambenek , Senior Threat Researcher at Fidelis Cybersecurity Solutions
The key to operationalizing cybersecurity threat intelligence rests in the critical thinking that establishes that a given indicator is, in fact, malicious.
By John Bambenek Senior Threat Researcher at Fidelis Cybersecurity Solutions, 4/22/2015
Comment1 Comment  |  Read  |  Post a Comment
Bank Botnets Continue to Thrive One Year After Gameover Zeus Takedown
Jai Vijayan, Freelance writerNews
Features on new botnets suggest attackers have learned from the lessons of takedown.
By Jai Vijayan Freelance writer, 4/22/2015
Comment0 comments  |  Read  |  Post a Comment
Zero-Day Malvertising Attack Went Undetected For Two Months
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
Researchers at Malwarebytes tracked stealthy attack campaign that infected some major websites with malicious ads harboring ransomware.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 4/21/2015
Comment3 comments  |  Read  |  Post a Comment
BBVA CISOs Give Tips For Securing 'Digital Bank'
Sara Peters, Senior Editor at Dark ReadingNews
At RSA conference today, CISOs at the multinational financial organization describe security strategy.
By Sara Peters Senior Editor at Dark Reading, 4/21/2015
Comment1 Comment  |  Read  |  Post a Comment
RSA: Follow Keynote Sessions on Dark Reading
Sara Peters, Senior Editor at Dark ReadingNews
From the Cryptographer's Panel to the RSA CEO's advice for the security industry, here's how the conference kicked off in San Francisco Tuesday.
By Sara Peters Senior Editor at Dark Reading, 4/21/2015
Comment2 comments  |  Read  |  Post a Comment
More Stories
Current Conversations
More Conversations
PR Newswire
Government Giving 'No More Free Passes' To Cybercriminals
Sara Peters, Senior Editor at Dark Reading,  4/22/2015
Smartphone Security Shootout
Kelly Jackson Higgins, Executive Editor at Dark Reading,  4/24/2015
As Malware Surges, U.S. Remains Biggest Source of Attacks
Jai Vijayan, Freelance writer,  4/24/2015
Register for Dark Reading Newsletters
Partner Perspectives
What's This?
'Golden Hour' Incident Response Agility
Security leaders must encourage and integrate data, processes, and controls to facilitate comprehension and investment of precious human capital in higher-level tasks. Read >>
Partner Perspectives
What's This?
Hacking Vulnerable Medical Equipment Puts Millions at Risk
Hospitals and medical device manufacturers need to start doing more to detect and thwart incoming attacks on networks and devices. Read >>
Partner Perspectives
What's This?
Third-Party Risk and Organizational Situational Awareness
A rigorous risk management approach will help organizations understand the potential risks posed by their partners. Read >>
Cartoon
Dark Reading Radio
Archived Dark Reading Radio
Join security and risk expert John Pironti and Dark Reading Editor-in-Chief Tim Wilson for a live online discussion of the sea-changing shift in security strategy and the many ways it is affecting IT and business.
White Papers
Current Issue
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-6090
Published: 2015-04-27
Multiple cross-site request forgery (CSRF) vulnerabilities in the (1) DataMappingEditorCommands, (2) DatastoreEditorCommands, and (3) IEGEditorCommands servlets in IBM Curam Social Program Management (SPM) 5.2 SP6 before EP6, 6.0 SP2 before EP26, 6.0.3 before 6.0.3.0 iFix8, 6.0.4 before 6.0.4.5 iFix...

CVE-2014-6092
Published: 2015-04-27
IBM Curam Social Program Management (SPM) 5.2 before SP6 EP6, 6.0 SP2 before EP26, 6.0.4 before 6.0.4.6, and 6.0.5 before 6.0.5.6 requires failed-login handling for web-service accounts to have the same lockout policy as for standard user accounts, which makes it easier for remote attackers to cause...

CVE-2015-0113
Published: 2015-04-27
The Jazz help system in IBM Rational Collaborative Lifecycle Management 4.0 through 5.0.2, Rational Quality Manager 4.0 through 4.0.7 and 5.0 through 5.0.2, Rational Team Concert 4.0 through 4.0.7 and 5.0 through 5.0.2, Rational Requirements Composer 4.0 through 4.0.7, Rational DOORS Next Generation...

CVE-2015-0174
Published: 2015-04-27
The SNMP implementation in IBM WebSphere Application Server (WAS) 8.5 before 8.5.5.5 does not properly handle configuration data, which allows remote authenticated users to obtain sensitive information via unspecified vectors.

CVE-2015-0175
Published: 2015-04-27
IBM WebSphere Application Server (WAS) 8.5 Liberty Profile before 8.5.5.5 does not properly implement authData elements, which allows remote authenticated users to gain privileges via unspecified vectors.

10 Recommendations for Outsourcing Security
10 Recommendations for Outsourcing Security
Enterprises today have a wide range of third-party options to help improve their defenses, including MSSPs, auditing and penetration testing, and DDoS protection. But are there situations in which a service provider might actually increase risk?
Flash Poll
Video
Slideshows
Twitter Feed