About Us

Dark Reading: Connecting The Information Security Community

Long one of the most widely-read cyber security news sites on the Web, Dark Reading is now the most trusted online community for security professionals like you. Our community members include thought-leading security researchers, CISOs, and technology specialists, along with thousands of other security professionals. We want you to join us.

This is where enterprise security staffers and decision-makers come to learn about new cyber threats, vulnerabilities, and technology trends. It's where they discuss potential defenses against the latest attacks, and key technologies and practices that may help protect their most sensitive data in the future. It's where they come to engage with one another and with Dark Reading editors to embrace new (and big) ideas, find answers to their IT security questions and solve their most pressing problems.

Dark Reading.com encompasses ten communities, each of which drills deeper into the enterprise security challenge: Attacks & Breaches, Application Security, Cloud Security, Data Leaks & Insider Threats, Endpoint Security & Privacy, Mobile Security, Network & Perimeter Security, Risk Management & Compliance, Security Management & Analytics, and Vulnerabilities and Threats. Each community is led by editors and subject matter experts who collaborate with security researchers, technology specialists, industry analysts and other Dark Reading members to provide timely, accurate and informative articles that lead to spirited discussions.

Our goal is to challenge community members to think about security by providing strong, even unconventional points of view, backed by hard-nosed reporting, hands-on experience and the professional knowledge that comes only with years of work in the information security industry.

We want you to be part of this community. Please join us on live chats, story discussions, polls, radio shows, reader-generated discussion boards, newsletters and other interactive features -- all for free. We'll also invite you to live events where we can continue these conversations face-to-face.

Simply register here – it's free – to join the conversation and fully benefit from all the features on this site. If you're interested in participating further, contact our editors – we're always on the lookout for industry thought leaders who'd like to offer their perspectives on IT security and its role in business.

Contact Us

Welcome to DarkReading.com.

View staff bios.

If you wish to no longer receive any promotional emails from UBM Tech please click here, unsub@ubm.com.

Title Name/Email Phone
Editor In Chief Tim Wilson 703-262-0680
Senior Editor Kelly Jackson Higgins 434-960-9899
Community Editor Marilyn Cohodas 978-590-5248
     
Contributing Writers
Contributing Writer Ericka Chickowski  
Contributing Writer Robert Lemos  
Contributing Writer Brian Prince  
Contributing Writer John Sawyer  
 
Editors
InformationWeek.com
VP and Editor In Chief Rob Preston 516-562-5692
Editor Chris Murphy 414-906-5331
Editor In Chief, InformationWeek.com Laurianne McLaughlin 516-562-7009
Managing Editor Paul Travis 516-562-5217
Managing Editor Jim Donahue 516-562-7980
Managing Editor Shane O'Neill 617-202-3710
InformationWeek
Government
David F. Carr Editor
InformationWeek
Healthcare
Alison Diana Editor
516-562-5052
     
InformationWeek Reports
Content Director, Reports Lorna Garey 978-694-1681
Managing Editor, Research Heather Vallis 516-562-7501
     
InformationWeek Business Technology Network
NetworkComputing.com
Networking, Communications, and Storage
Susan Fogarty Site Editor
Dr. Dobb's
The World of Software Development
Andrew Binstock Editor In Chief
 
UBM Tech
Sally Shankland, CEO, UBM Americas
Brian Field, COO, UBM Americas
Stacey Lisowski, Sr. VP, People & Culture, UBM Americas
Marco Pardi, President, Events
Kelley Damore, Chief Community Officer
Tom Spaeth, Chief Financial Officer
Simon Carless Exec. VP, Game & App Development and Black Hat

Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading December Tech Digest
Experts weigh in on the pros and cons of end-user security training.
Flash Poll
10 Recommendations for Outsourcing Security
10 Recommendations for Outsourcing Security
Enterprises today have a wide range of third-party options to help improve their defenses, including MSSPs, auditing and penetration testing, and DDoS protection. But are there situations in which a service provider might actually increase risk?
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-1421
Published: 2014-11-25
mountall 1.54, as used in Ubuntu 14.10, does not properly handle the umask when using the mount utility, which allows local users to bypass intended access restrictions via unspecified vectors.

CVE-2014-3605
Published: 2014-11-25
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2014-6407. Reason: This candidate is a reservation duplicate of CVE-2014-6407. Notes: All CVE users should reference CVE-2014-6407 instead of this candidate. All references and descriptions in this candidate have been removed to pre...

CVE-2014-7839
Published: 2014-11-25
DocumentProvider in RESTEasy 2.3.7 and 3.0.9 does not configure the (1) external-general-entities or (2) external-parameter-entities features, which allows remote attackers to conduct XML external entity (XXE) attacks via unspecified vectors.

CVE-2014-8001
Published: 2014-11-25
Buffer overflow in decode.cpp in Cisco OpenH264 1.2.0 and earlier allows remote attackers to execute arbitrary code via an encoded media file.

CVE-2014-8002
Published: 2014-11-25
Use-after-free vulnerability in decode_slice.cpp in Cisco OpenH264 1.2.0 and earlier allows remote attackers to execute arbitrary code via an encoded media file.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Now that the holiday season is about to begin both online and in stores, will this be yet another season of nonstop gifting to cybercriminals?