Latest Content
Page 1 / 2   >   >>
Deleting Emails Original Sin: An Historical Perspective
Commentary  |  10/24/2016  | 
Can DMARC do for email security what SSL certificates did for e-commerce?
A Proactive Approach To Vulnerability Management: 3 Steps
Commentary  |  10/22/2016  | 
Having the tools to detect a breach is important, but what if you could prevent the attack from happening in the first place?
Flipping Security Awareness Training
Commentary  |  10/21/2016  | 
Threats can be minimized when teams understand business goals and objectives. These four tips can help turn things around.
Why Poor Cyber Hygiene Invites Risk
Commentary  |  10/20/2016  | 
Modern cybersecurity today is all about risk management. That means eliminating and mitigating risks where possible, and knowingly accepting those that remain.
Malvertising Trends: Dont Talk Ad Standards Without Ad Security
Commentary  |  10/19/2016  | 
How malvertising marries the strengths and weaknesses of the complex digital advertising ecosystem perfectly and what online publishers and security leaders need to do about it.
A Job In Security Leads To Job Security
Commentary  |  10/18/2016  | 
Developers who focus on secure development skills find themselves in high demand.
Clearing A Path To The Cybersecurity Field
Commentary  |  10/17/2016  | 
Tune in to Dark Reading Radio on Wednesday, Oct. 19 at 1pmET, when we'll discuss what specific efforts in industry, academia, and government, are under way to fill the cybersecurity skills gap.
How To Become A Cybersecurity Entrepreneur In A Crowded Market
Commentary  |  10/17/2016  | 
If you want to build the next great cybersecurity startup, use your expertise, then follow these three simple suggestions.
Hacking Voting Systems: A Reality Check
Commentary  |  10/17/2016  | 
Can democracy be hacked? Yes, but not in the way you might think.
Encryption: A Backdoor For One Is A Backdoor For All
Commentary  |  10/14/2016  | 
We need legislation that allows law enforcement to find criminals and terrorists without eroding our security and privacy.
IoT Default Passwords: Just Don't Do It
Commentary  |  10/13/2016  | 
The rise of the Internet of Things makes the use of default passwords especially perilous. There are better options.
Certifying Software: Why Were Not There Yet
Commentary  |  10/12/2016  | 
Finding a solution to the software security and hygiene problem will take more than an Underwriters Lab seal of approval.
Cyber Hunters, Incident Response & The Changing Nature Of Network Defense
Commentary  |  10/11/2016  | 
Or how I learned that network defense needs to evolve from a game of "stumbled upon" to "search and discover."
Database Breaches: An Alarming Lack Of Preparedness
Commentary  |  10/10/2016  | 
It's no secret that databases are fertile ground for malicious activities. Here's how a seven-step process for monitoring known harbingers of an imminent attack can help reduce the risk.
For The Birds: Dark Reading Cartoon Caption Contest Winners
Commentary  |  10/8/2016  | 
Birdwatching-as-a-Service, live tweeting and NESTFLIX. And the winner is ...
Data Science & Security: Overcoming The Communication Challenge
Commentary  |  10/7/2016  | 
Data scientists face a tricky task -- taking raw data and making it meaningful for both security and business teams. Here's how to bridge the gap.
Why Its Always Cyber Hunting Season (& What To Do About It)
Commentary  |  10/6/2016  | 
To stop todays most capable and persistent adversaries, security organizations must rely less on tools and more on human analysis.
20 Questions To Explore With Security-as-a-Service Providers
Commentary  |  10/5/2016  | 
This list will help you leverage the niche expertise of security-as-a-service providers, and assess which vendor can best meet your needs
Privacy Shield's Drama Is Far From Over
Commentary  |  10/4/2016  | 
Businesses are working with trading partners to take responsibility for protecting private data in case the US-EU framework fails.
Grading Obama: C+
Administration Missed Key Opportunities To Civilize Cyberspace
Commentary  |  10/3/2016  | 
A middling grade because the President's cyber policy initiatives were reactive, laisse faire, and didnt buttress American economic opportunity.
Grading Obama: D-
President Failed To Protect Us From The Bad Guys
Commentary  |  10/3/2016  | 
A barely passing grade from a former special agent in charge of the NYC FBI cybercrimes division for failing to create deterrents and policies that encourage self defense.
Today's Cybersecurity Management Requires A New Approach
Commentary  |  9/30/2016  | 
The current managed security services provider model just doesn't work in our information-rich world. Time to shake things up.
Fear & Loathing In The Cloud
Commentary  |  9/29/2016  | 
Whether you've already bought your ticket for the cloud or still have some issues to sort through, fine-tune your security practices to make sure your ride is a smooth one.
Hacking The Polls: Where US Voting Processes Fall Short
Commentary  |  9/28/2016  | 
The patchwork of 50 decentralized state electoral systems threatens to disrupt our national election through ransomware attacks, hijacked voter registration rolls, and altered voting results.
5 Best Practices For Winning the IoT Security Arms Race
Commentary  |  9/27/2016  | 
By focusing on a pragmatic approach to security, its possible to develop IoT solutions that will reduce future risk without breaking the bank.
Mobile Fraud Changes Outlook for Multifactor Authentication
Commentary  |  9/27/2016  | 
SMS one-time passcodes just won't cut it anymore. We need new approaches that people will actually use.
What The WADA Hack Proves About Today's Threat Landscape
Commentary  |  9/26/2016  | 
Fancy Bear's initial release of data on four top American athletes reminds us all to reassess our risks.
7 New Rules For IoT Safety & Vuln Disclosure
Commentary  |  9/24/2016  | 
In the Internet of Things, even the lowliest smart device can be used for a malicious purpose. Manufacturers take heed!
On-Premises & In The Cloud: Making Sense Of Your Cybersecurity Ecosystem
Commentary  |  9/23/2016  | 
As enterprises continue to invest in hybrid cloud strategies, they need their fragmented security solutions to work together.
Snowden: Hollywood Highlights 2 Persistent Privacy Threats
Commentary  |  9/22/2016  | 
Oliver Stones movie shows us that while most of us have nothing to hide, we all have information worth protecting both technically and constitutionally.
Even A False Positive Can Be Valuable
Commentary  |  9/22/2016  | 
Sharing information about cyberthreats is important for the financial services industry, even when threats turn out to be not-so-threatening.
A Twist On The Cyber Kill Chain: Defending Against A JavaScript Malware Attack
Commentary  |  9/21/2016  | 
This slightly modified model is a practical way to keep attackers out of your systems.
Hacking 'Forward With Weaponized Intelligence
Commentary  |  9/20/2016  | 
Instead of hacking back and taking the fight to your adversary, what if your organization hacked forward by unearthing breach scenarios before the hackers do?
What Smart Cities Can Teach Enterprises About Security
Commentary  |  9/19/2016  | 
The more you simplify your security program while still being effective, the better, says San Diegos chief information security officer. Heres his three-step process.
Whats The Risk? 3 Things To Know About Chatbots & Cybersecurity
Commentary  |  9/19/2016  | 
Interactive message bots are useful and becoming more popular, but they raise serious security issues.
Why You May Need To Shake Up Your DevOps Team To Manage The Cloud
Commentary  |  9/16/2016  | 
The security approaches of yesterday wont work in the cloud world of today and tomorrow.
20 Questions Security Leaders Need To Ask About Analytics
Commentary  |  9/15/2016  | 
The game of 20 questions is a great way to separate vendors that meets your needs from those who will likely disappoint.
Yes, The Cloud Can Be A Security Win
Commentary  |  9/15/2016  | 
With the right controls in place, the cloud doesnt have to be a scary place. These guidelines can help your company stay safe.
Risk Management Best Practices For CISOs
Commentary  |  9/14/2016  | 
What's your company's risk appetite? Our list of best practices can help you better understand a difficult topic.
A Moving Target: Tackling Cloud Security As A Data Issue
Commentary  |  9/13/2016  | 
Todays challenge is protecting critical information that an increasingly mobile workforce transfers every day between clouds, between cloud and mobile, and between cloud, mobile, and IoT.
Snowden May Help Explain Your Job To Your Family
Commentary  |  9/12/2016  | 
Hacking Oliver Stone's new film about whistleblower Edward Snowden.
New Book Traces Obama Strategy To Protect America From Hackers, Terrorists & Nation States
Commentary  |  9/12/2016  | 
A review of Charlie Mitchell's 'Hacked: The Inside Story of Americas Struggle to Secure Cyberspace.'
Data Manipulation: An Imminent Threat
Commentary  |  9/12/2016  | 
Critical industries are largely unprepared for a potential wave of destructive attacks.
Avoiding The Blame Game For A Cyberattack
Commentary  |  9/8/2016  | 
How organizations can develop a framework of acceptable care for cybersecurity risk.
The Shifting Mindset Of Financial Services CSOs
Commentary  |  9/8/2016  | 
Theyre getting more realistic and developing strategies to close security gaps.
Defining The Common Core Of Cybersecurity: Certifications + Practical Experience
Commentary  |  9/7/2016  | 
Security certifications are necessary credentials, but alone wont solve the industrys critical talent gap.
Introducing Deep Learning: Boosting Cybersecurity With An Artificial Brain
Commentary  |  9/6/2016  | 
With nearly the same speed and precision that the human eye can identify a water bottle, the technology of deep learning is enabling the detection of malicious activity at the point of entry in real-time.
Why Social Media Sites Are The New Cyber Weapons Of Choice
Commentary  |  9/6/2016  | 
Facebook, LinkedIn, and Twitter cant secure their own environments, let alone yours. Its time to sharpen your security acumen.
The New Security Mindset: Embrace Analytics To Mitigate Risk
Commentary  |  9/5/2016  | 
Sure, conducting a penetration test can find a weakness. But to truly identify key areas of risk, organizations must start to think more creatively, just like todays hackers.
3 Golden Rules For Managing Third-Party Security Risk
Commentary  |  9/1/2016  | 
Rule 1: know where your data sets are, which vendors have access to the data, and what privacy and security measures are in place.
Page 1 / 2   >   >>

Register for Dark Reading Newsletters
White Papers
Current Issue
Five Emerging Security Threats - And What You Can Learn From Them
At Black Hat USA, researchers unveiled some nasty vulnerabilities. Is your organization ready?
Flash Poll
10 Recommendations for Outsourcing Security
10 Recommendations for Outsourcing Security
Enterprises today have a wide range of third-party options to help improve their defenses, including MSSPs, auditing and penetration testing, and DDoS protection. But are there situations in which a service provider might actually increase risk?
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2015-10-15
The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated b...

Published: 2015-10-15
netstat in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x, when a fibre channel adapter is used, allows local users to gain privileges via unspecified vectors.

Published: 2015-10-15
Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.

Published: 2015-10-15
Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.

Published: 2015-10-15
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076.

Dark Reading Radio
Archived Dark Reading Radio
According to industry estimates, about a million new IT security jobs will be created in the next two years but there aren't enough skilled professionals to fill them. On top of that, there isn't necessarily a clear path to a career in security. Dark Reading Executive Editor Kelly Jackson Higgins hosts guests Carson Sweet, co-founder and CTO of CloudPassage, which published a shocking study of the security gap in top US undergrad computer science programs, and Rodney Petersen, head of NIST's new National Initiative for Cybersecurity Education.