Commentary
Latest Content
Page 1 / 2   >   >>
Cybersecurity Smackdown: What Side Are You On?
Commentary  |  2/4/2016  | 
Analytics vs. Encryption. Prevention vs. Detection. Machine Learning: Promise or Hype? The Firewall: Dead or Still Breathing? The sharpest minds in the security industry debate some of the industry's most contentious issues.
New Kid On The Block: Cyber Threat Analyst
Commentary  |  2/4/2016  | 
Drawing from the financial service industry, this new role uses the “art of the intelligence cycle” to drive efficiency in the security operations center.
Zero Trust: Now A Critical Foundation For Securing Mobile
Commentary  |  2/3/2016  | 
No longer willing to rely on an OS that doesn't provide the security features they need, developers are taking steps to secure apps, defend data, and protect users.
Encryption Has Its Place But It Isn’t Foolproof
Commentary  |  2/2/2016  | 
Most encrypted data is unencrypted at some point in its lifecycle -- and the bad guys are pretty good at finding the one window left open.
As Good As They're Getting, Analytics Don't Inherently Protect Data
Commentary  |  2/2/2016  | 
It is only a matter of time before your system is breached, and when your data is lost, analytics won't help you.
IEEE Anti-Malware Support Service Goes Live
Commentary  |  2/1/2016  | 
Through the collaborative effort of major players in the computer security industry, organizations now have two new tools for better malware detection.
Cloud Security: It’s Become A People Problem
Commentary  |  1/29/2016  | 
Now that the cloud is becoming secure enough for sensitive data, are cloud customers ready to hold up their end of a shared liability model?
Data Privacy: Key Elements Of An Information Governance Plan
Commentary  |  1/28/2016  | 
For Data Privacy Day! Do you have the policies in place to safeguard your company’s most strategic information? Here are nine best practices.
Careers in InfoSec: Don’t Be Fooled By The Credential Alphabet
Commentary  |  1/27/2016  | 
Analytical skills, work ethic, an ability to overcome obstacles, and a natural drive to solve problems are the critical hiring factors in today’s tight job market.
NetFlow Or sFlow For Fastest DDoS Detection?
Commentary  |  1/26/2016  | 
It's still not an easy choice, but combined with the faster NetFlow exporters that have recently come to market, the speed advantage of sFlow is starting to fade.
How (And Why) Hackers Target Your Business
Commentary  |  1/25/2016  | 
Don’t miss this inside look by a trio of experts from industry and law enforcement during Dark Reading's virtual event, Cybersecurity: The Business View. Now available On-Demand.
Measuring Real Risk: The Business View
Commentary  |  1/22/2016  | 
Dark Reading's Jan. 26 virtual event on the business perspective of cybersecurity will feature a panel discussion on how to measure risk and the cost of a security program.
The Apple App Store Incident: Trouble in Paradise?
Commentary  |  1/22/2016  | 
The fact that Apple’s security model has worked so well in the past doesn’t mean it will work well forever. Here’s why.
When The Boss Is Your Biggest Security Risk
Commentary  |  1/21/2016  | 
No one possesses more sensitive information in an organization than upper management. So why do companies screen executives on the way in but not on the way out?
Preparing Your Business For A Major Data Breach: The Business View
Commentary  |  1/20/2016  | 
Today's Dark Reading's Virtual Conference on the business perspectives of cybersecurity will include a panel to prep your leaders for responding to the inevitable breach.
Behavioral Analytics: The Future of Just-in-Time Awareness Training?
Commentary  |  1/20/2016  | 
It’s high time we leveraged modern threat detection tools to keep users on the straight and narrow road of information security.
Cloud Security: To Scale Safely, Think Small
Commentary  |  1/19/2016  | 
Why today's enterprises need an adaptable cloud infrastructure centered around flexibility, portability, and speed.
Dark Reading Radio: A New Job Description For the CISO
Commentary  |  1/19/2016  | 
As cyberattacks grow and evolve, so too has the role of the chief information security officer. Fascinating discussion on key trends and challenges.
IoT Security: $1-per-Thing To Protect Connected Devices
Commentary  |  1/14/2016  | 
Locking down the Internet of Things won’t be cheap. Here's the math.
We Are What We Eat: Software Assurance Edition
Commentary  |  1/13/2016  | 
The fact that open-source code you use is free from vulnerabilities today doesn’t mean that it will remain that way in the near future.
A DDoS Learning Curve for Universities, Government & Enterprises
Commentary  |  1/12/2016  | 
Distributed Denial of Service attacks are easy, cheap and too often, effective. But they’re not unstoppable.
7 Criteria For Enriching Digital Evidence
Commentary  |  1/11/2016  | 
Context is the essential ingredient that is missing from many digital forensic investigations.
Lessons Learned About Critical Infrastructure: What’s Good Enough?
Commentary  |  1/8/2016  | 
Over the past decade, oil and gas companies have invested significant resources in security management, but there are sizable challenges ahead in people and processes.
The Matrix Reloaded: Security Goals v. Operational Requirements
Commentary  |  1/7/2016  | 
Building a matrix that measures people, process, and technology against security goals is a proven method for reducing risk in an organization. Here’s how.
Data Insecurity: Flawed Technology Or Outdated Business Process?
Commentary  |  1/6/2016  | 
When it comes to protecting critical data, legacy processes are just as vulnerable as legacy software.
How Technologies Incubated A Decade Ago Shape The World Today
Commentary  |  1/5/2016  | 
The security industry is doing a better job of sharing threat intelligence than ever before, but we're also sharing with the enemy.
2015: The Year Of 'Attacks on Trust'
Commentary  |  1/4/2016  | 
Nine attacks that leveraged stolen, compromised, or unprotected cryptographic keys and digital certificates show how easy it is for cybercriminals to bypass security controls and hide their actions.
The Changing Face Of Encryption: What You Need To Know Now
Commentary  |  12/30/2015  | 
Encryption today is now an absolute must and the fact that it is difficult does not change the fact that you have to use it.
The Fraud Tsunami Heads To The Sharing Economy
Commentary  |  12/29/2015  | 
When it comes to cyberfraud, online marketplaces like AirBnB can expect an uphill battle in the wake of the rollout of new chip card technology in 2016.
The Rise Of Community-Based Information Security
Commentary  |  12/28/2015  | 
The more vendors, service providers, and companies’ band together to fight security threats, the more difficult it will become for attacks to succeed.
A Hidden Insider Threat: Visual Hackers
Commentary  |  12/23/2015  | 
Ponemon experiment shows how low-tech white-hat hackers, posing as temps, captured information from exposed documents and computer screens in nearly nine out of ten attempts.
The Industrial Cyber Myth: It’s No Fantasy
Commentary  |  12/22/2015  | 
As threats become more sophisticated, the industry is still playing catch-up.
Security Tech: It’s Not What You Buy, It’s How You Deploy
Commentary  |  12/21/2015  | 
Good information security depends on a holistic strategy, not on an elite lineup of discretely moving parts.
When RATs Become a Social Engineer’s Best Friend
Commentary  |  12/18/2015  | 
Hacking humans in the banking industry through rogue help desks is becoming a significant problem.
The InfoSec Gender Divide: Practical Advice For Empowering Women
Commentary  |  12/17/2015  | 
There is no one-size-fits-all approach for women to succeed in IT security. What you need is a roadmap and a little help from your friends.
An Ill ‘Wynd’ Blowing But No Safe Harbor
Commentary  |  12/16/2015  | 
What will state-of-the-art for cybersecurity look like in 2016? The regulatory headwinds on both sides of the Atlantic portend big changes.
To Better Defend Yourself, Think Like A Hacker
Commentary  |  12/15/2015  | 
As attacks become more sophisticated and attackers more determined, organizations need to adopt an offensive approach to security that gets inside the head of the hacker.
Making Security Everyone’s Job, One Carrot At A Time
Commentary  |  12/14/2015  | 
These five user education strategies will turn employee bad behavior into bulletproof policies that protect data and systems.
How ‘Digital Forensic Readiness’ Reduces Business Risk
Commentary  |  12/11/2015  | 
These six real-world scenarios show how to turn reactive investigative capabilities into proactive, problem-solving successes.
The Lizard Squad: Cyber Weapon or Business?
Commentary  |  12/10/2015  | 
Even a hacker with the noblest intentions can run afoul of the law by not following six important do’s and don’ts.
‘Re-innovating’ Static Analysis: 4 Steps
Commentary  |  12/9/2015  | 
Before we pronounce the death of static analysis, let’s raise the bar with a modern framework that keeps pace with the complexity and size found in today’s software.
How CISOs Can Reframe The Conversation Around Security: 4 Steps
Commentary  |  12/8/2015  | 
Security professionals often complain that people are the weak link in the data security system. But in reality, they could be your biggest asset and ally.
Playing It Straight: Building A Risk-Based Approach To InfoSec
Commentary  |  12/7/2015  | 
What a crooked haircut can teach you about framing the discussion about organizational security goals and strategies.
The Power of Prevention: What SMBs Need to Know About Cybersecurity
Commentary  |  12/4/2015  | 
There is no such thing as a company that can't afford security. But where do you start?
Congress Clears Path for Information Sharing But Will It Help?
Commentary  |  12/3/2015  | 
The key challenge companies will face with the new Cybersecurity Information Sharing Act of 2015 is how quickly they can separate data they need to share with data they need to protect.
Into the Breach: Why ‘Self Detection’ Leads To Faster Recovery
Commentary  |  12/2/2015  | 
When an organization can identify network and system intrusions in their early phases it takes the advantage away from its adversaries. Here’s how.
How CISOs Can Change The Game of Cybersecurity
Commentary  |  12/1/2015  | 
In the modern enterprise, chief information security officers need a broad mandate over security and risk management across all operational silos, not just the datacenter.
How Facebook Bakes Security Into Corporate Culture
Commentary  |  11/30/2015  | 
Security is everyone's responsibility at the famous social network. These five ingredients are what make up the secret sauce.
The Youthful Side Of Hacking
Commentary  |  11/25/2015  | 
If the iconic 1955 movie Rebel Without a Cause was remade today, would James Dean be a computer hacker?
Parsing What Is ‘Reasonable’ In Security, Post FTC v Wyndham
Commentary  |  11/24/2015  | 
In today's regulatory climate, companies can no longer depend on technology solutions alone – for example, SIEM -- to protect corporate data and customer privacy. Here's why.
Page 1 / 2   >   >>


Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Latest Comment: nice one good
Current Issue
E-Commerce Security: What Every Enterprise Needs to Know
The mainstream use of EMV smartcards in the US has experts predicting an increase in online fraud. Organizations will need to look at new tools and processes for building better breach detection and response capabilities.
Flash Poll
10 Recommendations for Outsourcing Security
10 Recommendations for Outsourcing Security
Enterprises today have a wide range of third-party options to help improve their defenses, including MSSPs, auditing and penetration testing, and DDoS protection. But are there situations in which a service provider might actually increase risk?
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7445
Published: 2015-10-15
The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated b...

CVE-2015-4948
Published: 2015-10-15
netstat in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x, when a fibre channel adapter is used, allows local users to gain privileges via unspecified vectors.

CVE-2015-5660
Published: 2015-10-15
Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.

CVE-2015-6003
Published: 2015-10-15
Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.

CVE-2015-6333
Published: 2015-10-15
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076.

Dark Reading Radio
Archived Dark Reading Radio
Join Dark Reading community editor Marilyn Cohodas in a thought-provoking discussion about the evolving role of the CISO.