Commentary

Content posted in December 2012
The Only Security Prediction That Matters
Commentary  |  12/26/2012  | 
In this silly season of year-end predictions, we need to collectively revisit the only prediction that will matter next year
Monitoring A La Borg
Commentary  |  12/24/2012  | 
What would a true infrastructure collective look like?
The Identity Cliff
Commentary  |  12/18/2012  | 
Kicking the can down the road on identity cannot go on forever. Not choosing to deal with improving identity and access architecture is a choice
You Are The Big Data
Commentary  |  12/15/2012  | 
Monitoring isn't just about systems anymore
S.C. Security Blunders Show Why States Get Hacked
Commentary  |  12/13/2012  | 
Governor blames data breach on Russian hackers and the IRS, but states' by-the-book IT ethos shows rules and regulations are the real culprit.
Don't Get 'Ha-Duped' By Big Data Security Products
Commentary  |  12/12/2012  | 
Some Big Data security recommendations
Hauling That 50-Pound Sack Of Compliance
Commentary  |  12/11/2012  | 
Done wrong, your compliance efforts can needlessly weigh your team down
The Most Important IAM Question: Who Does This?
Commentary  |  12/10/2012  | 
IAM projects get so wound up around tooling and processes that critical organizational questions go unanswered
Find The Right Data Archive Method
Commentary  |  12/10/2012  | 
Backup-as-archive is an increasingly viable storage solution, especially for companies that don't have strict data retention requirements.
What Is Big Data?
Commentary  |  12/7/2012  | 
Big data is not about buying more big iron
Royal Security Fail: 'May I Speak To Kate?'
Commentary  |  12/6/2012  | 
The oldest -- and most effective -- social engineering trick in the book remains getting on the phone and impersonating an insider. Ask Kate Middleton, the Duchess of Cambridge.


White House Cybersecurity Strategy at a Crossroads
Kelly Jackson Higgins, Executive Editor at Dark Reading,  7/17/2018
Major International Airport System Access Sold for $10 on Dark Web
Kelly Sheridan, Staff Editor, Dark Reading,  7/11/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-3090
PUBLISHED: 2018-07-18
Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). The supported version that is affected is Prior to 5.2.16. Easily exploitable vulnerability allows unauthenticated attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compr...
CVE-2018-3091
PUBLISHED: 2018-07-18
Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). The supported version that is affected is Prior to 5.2.16. Easily exploitable vulnerability allows unauthenticated attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compr...
CVE-2018-3092
PUBLISHED: 2018-07-18
Vulnerability in the Oracle Outside In Technology component of Oracle Fusion Middleware (subcomponent: Outside In Filters). The supported version that is affected is 8.5.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Outside In T...
CVE-2018-3093
PUBLISHED: 2018-07-18
Vulnerability in the Oracle Outside In Technology component of Oracle Fusion Middleware (subcomponent: Outside In Filters). The supported version that is affected is 8.5.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Outside In T...
CVE-2018-3094
PUBLISHED: 2018-07-18
Vulnerability in the Oracle Outside In Technology component of Oracle Fusion Middleware (subcomponent: Outside In Filters). The supported version that is affected is 8.5.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Outside In T...