About Us

Dark Reading: Connecting The Information Security Community

Long one of the most widely-read cyber security news sites on the Web, Dark Reading is now the most trusted online community for security professionals like you. Our community members include thought-leading security researchers, CISOs, and technology specialists, along with thousands of other security professionals. We want you to join us.

This is where enterprise security staffers and decision-makers come to learn about new cyber threats, vulnerabilities, and technology trends. It's where they discuss potential defenses against the latest attacks, and key technologies and practices that may help protect their most sensitive data in the future. It's where they come to engage with one another and with Dark Reading editors to embrace new (and big) ideas, find answers to their IT security questions and solve their most pressing problems.

Dark Reading.com encompasses ten communities, each of which drills deeper into the enterprise security challenge: Attacks & Breaches, Application Security, Cloud Security, Data Leaks & Insider Threats, Endpoint Security & Privacy, Mobile Security, Network & Perimeter Security, Risk Management & Compliance, Security Management & Analytics, and Vulnerabilities and Threats. Each community is led by editors and subject matter experts who collaborate with security researchers, technology specialists, industry analysts and other Dark Reading members to provide timely, accurate and informative articles that lead to spirited discussions.

Our goal is to challenge community members to think about security by providing strong, even unconventional points of view, backed by hard-nosed reporting, hands-on experience and the professional knowledge that comes only with years of work in the information security industry.

We want you to be part of this community. Please join us on live chats, story discussions, polls, radio shows, reader-generated discussion boards, newsletters and other interactive features -- all for free. We'll also invite you to live events where we can continue these conversations face-to-face.

Simply register here – it's free – to join the conversation and fully benefit from all the features on this site. If you're interested in participating further, contact our editors – we're always on the lookout for industry thought leaders who'd like to offer their perspectives on IT security and its role in business.

Contact Us

Welcome to DarkReading.com.

View staff bios.

If you wish to no longer receive any promotional emails from UBM Tech please click here, unsub@ubm.com.

Title Name/Email Phone
Editor In Chief Tim Wilson 703-262-0680
Senior Editor Kelly Jackson Higgins 434-960-9899
Community Editor Marilyn Cohodas 978-590-5248
Associate Editor Mathew J. Schwartz
     
Contributing Writers
Contributing Writer Ericka Chickowski
Contributing Writer Robert Lemos
Contributing Writer Brian Prince
Contributing Writer John Sawyer
 
Editors
InformationWeek.com
VP and Editor In Chief Rob Preston 516-562-5692
Editor Chris Murphy 414-906-5331
Editor In Chief, InformationWeek.com Laurianne McLaughlin 516-562-7009
Managing Editor Paul Travis 516-562-5217
Managing Editor Jim Donahue 516-562-7980
Managing Editor Shane O'Neill 617-202-3710
InformationWeek
Government
David F. Carr Editor
InformationWeek
Healthcare
Alison Diana Editor
516-562-5052
     
InformationWeek Reports
Content Director, Reports Lorna Garey 978-694-1681
Managing Editor, Research Heather Vallis 516-562-7501
     
InformationWeek Business Technology Network
NetworkComputing.com
Networking, Communications, and Storage
Susan Fogarty Site Editor
Dr. Dobb's
The World of Software Development
Andrew Binstock Editor In Chief
 
UBM Tech
Paul Miller CEO
Marco Pardi President, Events
David Michael CIO
Kelley Damore Chief Community Officer
Simon Carless Exec. VP, Game & App Development and Black Hat
Rakhi Williams, Chief of Staff
Angela Scalpello Sr. VP, People & Culture

Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
DevOps’ Impact on Application Security
DevOps’ Impact on Application Security
Managing the interdependency between software and infrastructure is a thorny challenge. Often, it’s a “developers are from Mars, systems engineers are from Venus” situation.
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-0972
Published: 2014-08-01
The kgsl graphics driver for the Linux kernel 3.x, as used in Qualcomm Innovation Center (QuIC) Android contributions for MSM devices and other products, does not properly prevent write access to IOMMU context registers, which allows local users to select a custom page table, and consequently write ...

CVE-2014-2627
Published: 2014-08-01
Unspecified vulnerability in HP NonStop NetBatch G06.14 through G06.32.01, H06 through H06.28, and J06 through J06.17.01 allows remote authenticated users to gain privileges for NetBatch job execution via unknown vectors.

CVE-2014-3009
Published: 2014-08-01
The GDS component in IBM InfoSphere Master Data Management - Collaborative Edition 10.0 through 11.0 and InfoSphere Master Data Management Server for Product Information Management 9.0 and 9.1 does not properly handle FRAME elements, which makes it easier for remote authenticated users to conduct ph...

CVE-2014-3302
Published: 2014-08-01
user.php in Cisco WebEx Meetings Server 1.5(.1.131) and earlier does not properly implement the token timer for authenticated encryption, which allows remote attackers to obtain sensitive information via a crafted URL, aka Bug ID CSCuj81708.

CVE-2014-3534
Published: 2014-08-01
arch/s390/kernel/ptrace.c in the Linux kernel before 3.15.8 on the s390 platform does not properly restrict address-space control operations in PTRACE_POKEUSR_AREA requests, which allows local users to obtain read and write access to kernel memory locations, and consequently gain privileges, via a c...

Best of the Web
Dark Reading Radio