Commentary

Content posted in November 2011
DAM Is Morphing
Commentary  |  11/30/2011  | 
DAM may not be DAM much longer.
It's Time to Dump The 'Insider Threat'
Commentary  |  11/30/2011  | 
Blaming the "insider threat" merely hides your real security risks
SSL's Future
Commentary  |  11/28/2011  | 
SSL will evolve to meet requirements for e-commerce and mobile
Penetration Tests: Not Getting 'In' Is An Option
Commentary  |  11/28/2011  | 
Pen testers must get beyond just breaking in, and clients need to understand how the tester's results map to business risk
Partner Management: Assessing Compliance Capability And Willingness
Commentary  |  11/27/2011  | 
The first step is to determine the partner's understanding of its responsibility and ability to comply
Will Software Authentication Survive?
Commentary  |  11/26/2011  | 
Protecting secret keys or seeds in software without the risk of being stolen is crucial
Partner Management: Compliance Program Is Essential
Commentary  |  11/26/2011  | 
Understanding the risk associated with a partner relationship and managing it accordingly is key
Embedding Digital Certificates In Hardware
Commentary  |  11/23/2011  | 
A natural evolution, but there are a few potential pitfalls to avoid
Mobile Device Management: What's Still Missing
Commentary  |  11/23/2011  | 
MDM can help extend IT management all the way to the new edge of the enterprise network. But it's only one part of the solution really needed to maximize enterprise mobility.
Android Security Becomes FUD Fest
Commentary  |  11/21/2011  | 
Big scary warnings about Android security just keep on coming. Are you focused on the right MDM questions?
App Freedom Vs. Corporate Security
Commentary  |  11/18/2011  | 
IT has to walk a fine line when securing user-owned mobile devices.
Big Data And Bad Security
Commentary  |  11/16/2011  | 
The rush to collect and mine big data leaves data security in the dust
Plugging The Kiosk-Sized Security Hole
Commentary  |  11/15/2011  | 
Companies like to set up Internet kiosks for customers and job applicants, but their convenience can be their undoing
So You Want To Be A Zero Day Exploit Millionaire?
Commentary  |  11/10/2011  | 
On the active market for reporting and selling zero day vulnerabilities, you can make big money. But you'll have to answer difficult ethical questions.
Fighting 0days With Fundamentals
Commentary  |  11/7/2011  | 
How to pre-emptively secure systems against 0day attacks that, by definition, we know nothing about
Security Ostriches And Disintermediation
Commentary  |  11/3/2011  | 
HD Moore's Law (unsophisticated attackers leveraging tools like Metasploit) will make many security professionals go the way of brick-and-mortar retailers
Docs Warm Up to EHRs, Patients Want Paper
Commentary  |  11/3/2011  | 
While docs are gradually getting onboard with electronic health records, most patients worry about the security of their personal health info in cyberspace. What's behind the chasm?
Testing Your Endpoints Against Advanced Threats
Commentary  |  11/2/2011  | 
Why your pen-test efforts probably aren't preparing you for the worst by testing endpoint resilience
MDM: To Sandbox Or Not To Sandbox?
Commentary  |  11/1/2011  | 
Mobile device management systems take different approaches to sandboxing. Is mobile virtualization the answer?


White House Cybersecurity Strategy at a Crossroads
Kelly Jackson Higgins, Executive Editor at Dark Reading,  7/17/2018
Major International Airport System Access Sold for $10 on Dark Web
Kelly Sheridan, Staff Editor, Dark Reading,  7/11/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-3090
PUBLISHED: 2018-07-18
Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). The supported version that is affected is Prior to 5.2.16. Easily exploitable vulnerability allows unauthenticated attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compr...
CVE-2018-3091
PUBLISHED: 2018-07-18
Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). The supported version that is affected is Prior to 5.2.16. Easily exploitable vulnerability allows unauthenticated attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compr...
CVE-2018-3092
PUBLISHED: 2018-07-18
Vulnerability in the Oracle Outside In Technology component of Oracle Fusion Middleware (subcomponent: Outside In Filters). The supported version that is affected is 8.5.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Outside In T...
CVE-2018-3093
PUBLISHED: 2018-07-18
Vulnerability in the Oracle Outside In Technology component of Oracle Fusion Middleware (subcomponent: Outside In Filters). The supported version that is affected is 8.5.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Outside In T...
CVE-2018-3094
PUBLISHED: 2018-07-18
Vulnerability in the Oracle Outside In Technology component of Oracle Fusion Middleware (subcomponent: Outside In Filters). The supported version that is affected is 8.5.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Outside In T...