Commentary

Content posted in November 2015
How Facebook Bakes Security Into Corporate Culture
Commentary  |  11/30/2015  | 
Security is everyone's responsibility at the famous social network. These five ingredients are what make up the secret sauce.
The Youthful Side Of Hacking
Commentary  |  11/25/2015  | 
If the iconic 1955 movie Rebel Without a Cause was remade today, would James Dean be a computer hacker?
Parsing What Is Reasonable In Security, Post FTC v Wyndham
Commentary  |  11/24/2015  | 
In today's regulatory climate, companies can no longer depend on technology solutions alone for example, SIEM -- to protect corporate data and customer privacy. Here's why.
We Need A New Word For Cyber
Commentary  |  11/23/2015  | 
Its time to find an alternative for 'cyber' (an adjective or noun) before the term like 'google' -- becomes a verb.
Introducing RITA for Real Intelligence Threat Analysis
Commentary  |  11/20/2015  | 
SANS' free, new framework can help teams hunt for attackers by extending traditional signature analysis to blacklisted IP addresses and accounts that have multiple concurrent logons to multiple systems.
And Now, A Cyber Arms Race Towards Critical Infrastructure Attacks
Commentary  |  11/19/2015  | 
As traditional explosives give way to 'logic bombs,' the need to protect our industrial networks and systems has never been more important.
DDoS And The Internet's Liability Problem
Commentary  |  11/18/2015  | 
It's past time for an improved liability model to disrupt DDoS.
Dont Toy With The Dark Web, Harness It
Commentary  |  11/16/2015  | 
The Dark Webs sinister allure draws outsized attention, but time-strapped security teams would benefit from knowing what's already circulating in places they don't need Tor or I2P to find.
Dark Reading Radio: A Cybersecurity Generation Gap
Commentary  |  11/16/2015  | 
Millennials--especially young women--not pursuing careers in cybersecurity due to lack of both awareness and interest.
Point of Entry: The Missing Link in the Security Hiring Gap
Commentary  |  11/12/2015  | 
How misguided notions of capability and lack of access to enterprise tools discourage diversity in Infosec.
Machine Learning: Perception Problem? Maybe. Pipe Dream? No Way!
Commentary  |  11/11/2015  | 
Guided by an organization's internal security experts,'algorithmic assistants' provide a powerful new way to find anomalies and patterns for detecting cyberthreat activity.
Why Threat Intelligence Feels Like A Game Of Connect Four
Commentary  |  11/10/2015  | 
In real life, solving the cybersecurity puzzle has many challenges. But shared wisdom and community defense models are making it easier to connect the dots.
Cybersecurity Skills Gap: Too Good To Be True For Job Seekers?
Commentary  |  11/9/2015  | 
New track at Black Hat Europe explores the special challenges of managing an information security career for both job hunters and job hirers.
What Flu Season Can Teach Us About Fighting Cyberattacks
Commentary  |  11/6/2015  | 
Cybersecurity doesn't have to be an arms race towards complexity if we put people front and center of the solution.
Mature & Unconfident: The Best Information Security Teams Ever!
Commentary  |  11/5/2015  | 
Security through maturity and humility is a workable philosophy with proven results for organizations that are willing to give it a try. Heres why.
BYOD 2015: Data Loss, Data Leaks & Data Breaches
Commentary  |  11/4/2015  | 
The growth of employee-owned devices in the workplace is placing new demands on enterprises struggling to protect both personal and professional data.
Kicking Off A New Era For Policing Cybersecurity
Commentary  |  11/3/2015  | 
In the wake of FTC v. Wyndham, government agencies are becoming more aggressive about protecting corporate data and customer privacy. But the new rules are very much a work in progress.
IPv6 And The Growing DDoS Danger
Commentary  |  11/2/2015  | 
IPv6 and the Internet of Things have arrived -- and with them an enormous potential expansion for distributed denial-of-service (DDoS) attacks.


Weaponizing IPv6 to Bypass IPv4 Security
John Anderson, Principal Security Consultant, Trustwave Spiderlabs,  6/12/2018
'Shift Left' & the Connected Car
Rohit Sethi, COO of Security Compass,  6/12/2018
Why CISOs Need a Security Reality Check
Joel Fulton, Chief Information Security Officer for Splunk,  6/13/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-10617
PUBLISHED: 2018-06-18
Delta Electronics Delta Industrial Automation DOPSoft version 4.00.04 and prior utilizes a fixed-length heap buffer where a value larger than the buffer can be read from a .dpa file into the buffer, causing the buffer to be overwritten. This may allow remote code execution or cause the application t...
CVE-2018-10621
PUBLISHED: 2018-06-18
Delta Electronics Delta Industrial Automation DOPSoft version 4.00.04 and prior utilizes a fixed-length stack buffer where a value larger than the buffer can be read from a .dpa file into the buffer, causing the buffer to be overwritten. This may allow remote code execution or cause the application ...
CVE-2018-10623
PUBLISHED: 2018-06-18
Delta Electronics Delta Industrial Automation DOPSoft version 4.00.04 and prior performs read operations on a memory buffer where the position can be determined by a value read from a .dpa file. This may cause improper restriction of operations within the bounds of the memory buffer, allow remote co...
CVE-2015-4664
PUBLISHED: 2018-06-18
An improper input validation vulnerability in CA Privileged Access Manager 2.4.4.4 and earlier allows remote attackers to execute arbitrary commands.
CVE-2018-9021
PUBLISHED: 2018-06-18
An authentication bypass vulnerability in CA Privileged Access Manager 2.8.2 and earlier allows remote attackers to execute arbitrary commands with specially crafted requests.