Attacks/Breaches

11/25/2013
11:06 AM
John Klossner
John Klossner
Commentary
100%
0%

Cartoon: You Might Be A Security Expert If...

Comment  | 
Print  | 
More Insights
Comments
Threaded  |  Newest First  |  Oldest First
Marilyn Cohodas
50%
50%
Marilyn Cohodas,
User Rank: Strategist
11/26/2013 | 7:57:07 AM
Not crazy but....
Funny cartoon but is it true? Is paranoia now a part of the job description for IT security professionals? Or maybe I am  just being paraonoid.
Susan Fogarty
50%
50%
Susan Fogarty,
User Rank: Apprentice
11/26/2013 | 10:39:49 AM
Re: Not crazy but....
Unfortunately I think it is true, especially when you're talking about corporations that are potential targets because they have data that could be valuable in many different ways. I know several mobile security consultants who advise IT managers to start with the assumption that any device has been breached, and go from there in protecting enterprise data and apps. It's a jungle out there!
J_Brandt
50%
50%
J_Brandt,
User Rank: Apprentice
11/27/2013 | 5:04:09 PM
Re: Not crazy but....
Paranoia isn't just for security professionals.  A healthy security awareness program for users looks to promote a little bit of paranoia in everyone doesn't it?
Marilyn Cohodas
50%
50%
Marilyn Cohodas,
User Rank: Strategist
12/2/2013 | 8:09:14 AM
Re: Not crazy but....
J_Brandt.That's a great point about injecting a healthy dose of paranoia as part of a corporate security awareness program. What have you found to be the right amont of scare tactics in user security training. When does too much paranoia seem crazy and counter productive?
More Than Half of Users Reuse Passwords
Curtis Franklin Jr., Senior Editor at Dark Reading,  5/24/2018
Is Threat Intelligence Garbage?
Chris McDaniels, Chief Information Security Officer of Mosaic451,  5/23/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Flash Poll
[Strategic Security Report] Navigating the Threat Intelligence Maze
[Strategic Security Report] Navigating the Threat Intelligence Maze
Most enterprises are using threat intel services, but many are still figuring out how to use the data they're collecting. In this Dark Reading survey we give you a look at what they're doing today - and where they hope to go.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-11471
PUBLISHED: 2018-05-25
Cockpit 0.5.5 has XSS via a collection, form, or region.
CVE-2018-11472
PUBLISHED: 2018-05-25
Monstra CMS 3.0.4 has Reflected XSS during Login (i.e., the login parameter to admin/index.php).
CVE-2018-11473
PUBLISHED: 2018-05-25
Monstra CMS 3.0.4 has XSS in the registration Form (i.e., the login parameter to users/registration).
CVE-2018-11474
PUBLISHED: 2018-05-25
Monstra CMS 3.0.4 has a Session Management Issue in the Administrations Tab. A password change at admin/index.php?id=users&action=edit&user_id=1 does not invalidate a session that is open in a different browser.
CVE-2018-11475
PUBLISHED: 2018-05-25
Monstra CMS 3.0.4 has a Session Management Issue in the Users tab. A password change at users/1/edit does not invalidate a session that is open in a different browser.