Author

 Jennifer Bosavage

Profile of Jennifer Bosavage

Editor In Chief, Solution Providers for Retail
News & Commentary Posts: 2

Writing and editing from the IT metropolis that is Fairfield County, Conn., Jen is Editor In Chief of Solution Providers For Retail. In her role, she oversees all editorial operations of the site, including engaging VARs to share their expertise within the community. She has written for IT professionals for more than 20 years, with expertise in covering issues concerning solution providers, systems integrators, and resellers.

Jen most recently was Senior Editor at CRN. There, she was in charge of the publication's editorial research projects, including: Solution Provider 500, Fast Growth 100, Women of the Channel, and Emerging Vendors, among many others. She launched the online blog, "Channel Voices," and often wrote on career issues facing IT professionals in her blog, "One Year to a Better Career."

Jen began her tech journalism career at Electronic Buyer News, where she covered the purchasing beat. (That was so long ago that blue LEDs were big news.) Starting as copy editor, she worked her way up to Managing Editor before moving to VARBusiness. At VARBusiness, she was Executive Editor, leading a team of writers that won the prestigious Jesse Neal award for editorial excellence.

Jennifer has been married for 22 years and has two wonderful kids (even the teenager). To adults in her hometown, she is best known for her enormous Newfoundland dog; to high schoolers, for her taco nights.

Articles by Jennifer Bosavage

How We Could Protect Pre-Teens Online

2/2/2007
Are you familiar with COPPA, the Children's Online Privacy Protection Act? It's a worthy bill, aimed at preventing the online collection of personal information from children under 13 years of age. What most people don't know is, it's turned out to be rather cumbersome for companies to comply with. The result has been that there are few social networking sites which provide a safe place from pre-teens to hang out and chat.

Post a Comment
Veterans Find New Roles in Enterprise Cybersecurity
Kelly Sheridan, Staff Editor, Dark Reading,  11/12/2018
Empathy: The Next Killer App for Cybersecurity?
Shay Colson, CISSP, Senior Manager, CyberClarity360,  11/13/2018
Understanding Evil Twin AP Attacks and How to Prevent Them
Ryan Orsi, Director of Product Management for Wi-Fi at WatchGuard Technologies,  11/14/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: "Narcissistic Security Disorder."
Current Issue
Flash Poll
Online Malware and Threats: A Profile of Today's Security Posture
Online Malware and Threats: A Profile of Today's Security Posture
This report offers insight on how security professionals plan to invest in cybersecurity, and how they are prioritizing their resources. Find out what your peers have planned today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-9209
PUBLISHED: 2018-11-19
Unauthenticated arbitrary file upload vulnerability in FineUploader php-traditional-server <= v1.2.2
CVE-2018-9207
PUBLISHED: 2018-11-19
Arbitrary file upload in jQuery Upload File <= 4.0.2
CVE-2018-15759
PUBLISHED: 2018-11-19
Pivotal Cloud Foundry On Demand Services SDK, versions prior to 0.24 contain an insecure method of verifying credentials. A remote unauthenticated malicious user may make many requests to the service broker with different credentials, allowing them to infer valid credentials and gain access to perfo...
CVE-2018-15761
PUBLISHED: 2018-11-19
Cloud Foundry UAA release, versions prior to v64.0, and UAA, versions prior to 4.23.0, contains a validation error which allows for privilege escalation. A remote authenticated user may modify the url and content of a consent page to gain a token with arbitrary scopes that escalates their privileges...
CVE-2018-17190
PUBLISHED: 2018-11-19
In all versions of Apache Spark, its standalone resource manager accepts code to execute on a 'master' host, that then runs that code on 'worker' hosts. The master itself does not, by design, execute user code. A specially-crafted request to the master can, however, cause the master to execute code ...