Thought Leaders
Editors
Marilyn Cohodas
Marilyn Cohodas
Community Editor, Dark Reading
Kelly Jackson Higgins
Kelly Jackson Higgins
Senior Editor, Dark Reading
Tim Wilson
Tim Wilson
Editor in Chief, Dark Reading
Contributors
Ed Amoroso
Ed Amoroso
Chief Security Officer, AT&T
Charles Babcock
Charles Babcock
Editor At Large, InformationWeek
David Berlind
Chief Content Officer, UBM TechWeb
Rajat Bhargava
Rajat Bhargava
Co-Founder & CEO, JumpCloud
Michael Biddick
Michael Biddick
CEO, Fusion PPT
James Bindseil
James Bindseil
President & CEO, Globalscape
Ellis Booker
Ellis Booker
Technology Journalist
Kate Borten
Kate Borten
President, The Marblehead Group
Jennifer Bosavage
Jennifer Bosavage
Editor In Chief, Solution Providers for Retail
Tom Bowers
Tom Bowers
Principal Security Strategist, ePlus Technologies
Mark Bregman
Mark Bregman
Senior Vice President & Chief Technology Officer, Neustar
John Bumgarner
John Bumgarner
Chief Technology Officer for the U.S. Cyber Consequences Unit
Kristin Burnham
Kristin Burnham
Senior Editor, InformationWeek.com
Craig Carpenter
Craig Carpenter
Chief Cybersecurity Strategist, AccessData
David F Carr
David F Carr
Editor, InformationWeek Healthcare
Pat Carroll
Pat Carroll
Executive Chairman & Founder, ValidSoft
Sol Cates
Sol Cates
CSO, Vormetric
Ericka Chickowski
Ericka Chickowski
Contributing Writer, Dark Reading
Thomas Claburn
Thomas Claburn
Editor-at-Large
Kerstyn Clover
Kerstyn Clover
Attack & Defense Team Consultant
Mark L. Cohn
Mark L. Cohn
Chief Technology Officer, Unisys Federal Systems
Eric Cole
Eric Cole
Founder & Chief Scientist, Secure Anchor Consulting
Bob Covello
Bob Covello
Security Tech Veteran
George Crump
George Crump
President, Storage Switzerland
Andy Daudelin
Andy Daudelin
VP Security Services, AT&T Business Solutions
Michael A. Davis
Michael A. Davis
Contributing Editor
Amy DeCarlo
Amy DeCarlo
Principal Analyst, Security and Data Center Services
Alison Diana
Alison Diana
Senior Editor
Boonsri Dickinson
Boonsri Dickinson
Associate Editor of BYTE
Phil Dunkelberger
Phil Dunkelberger
President & CEO, Nok Nok Labs
Adam Ely
Adam Ely
COO, Bluebox
Michael Endler
Michael Endler
Associate Editor, InformationWeek.com
Jonathan Feldman
Jonathan Feldman
CIO, City of Asheville, NC
Michael Finneran
Michael Finneran
President, dBrn Associates, Inc.
Kevin Fogarty
Kevin Fogarty
Technology Writer
John Foley
John Foley
Editor, InformationWeek
Paige Francis
Paige Francis
CIO for IT, Fairfield University
Mike Fratto
Mike Fratto
Network Computing Editor
Andrew Froehlich
Andrew Froehlich
President & Lead Network Architect, West Gate Networks
Dave Frymier
Dave Frymier
Chief Information Security Officer, Unisys
Lorna Garey
Lorna Garey
Content Director, InformationWeek Reports
Brad Garlinghouse
Brad Garlinghouse
CEO, Hightail
Randy George
Randy George
Director, IT Operations, Boston Red Sox
Joshua Goldfarb
Joshua Goldfarb
CSO, nPulse Technologies
Garret Grajek
Garret Grajek
CTO & COO, SecureAuth
Levi Gundert
Levi Gundert
Technical Lead, Cisco Threat Research, Analysis, and Communications (TRAC)
Malcolm Harkins
Malcolm Harkins
Vice President and Chief Security and Privacy Officer, Intel Corporation
Doug Henschen
Doug Henschen
Executive Editor, InformationWeek
Joe Hernick
Joe Hernick
IT Director
Robert Hinden
Robert Hinden
Check Point Fellow & IPV6 Co-Inventor
J. Nicholas Hoover
J. Nicholas Hoover
Senior Editor, InformationWeek Government
Rick Howard
Rick Howard
CSO, Palo Alto Networks
Ravi Ithal
Ravi Ithal
Chief Architect, Netskope
William Jackson
William Jackson
Technology Writer
Dan Jones
Dan Jones
Mobile Editor
Wyatt Kash
Wyatt Kash
Editor, InformationWeek Government
TK Keanini
TK Keanini
CTO, Lancope
Dave Kearns
Dave Kearns
Analyst, Kuppinger-Cole
Bill Kleyman
Bill Kleyman
National Director of Strategy & Innovation, MTM Technologies
John Klossner
John Klossner
Cartoonist
Marianne Kolbasuk McGee
Marianne Kolbasuk McGee
Senior Writer, InformationWeek
Ray Le Maistre
Ray Le Maistre
Editor-in-chief
Martin Lee
Martin Lee
Technical Lead, Threat Research, Analysis & Communications, Cisco
Robert Lemos
Robert Lemos
Technology Journalist
Pete Lindstrom
Pete Lindstrom
Principal & VP Research, Spire Security
Eric Lundquist
Eric Lundquist
VP & Editorial Analyst for InformationWeek Business Technology Network
Calum MacLeod
Calum MacLeod
VP, EMEA, Lieberman Software
Elena Malykhina
Elena Malykhina
Technology Journalist
Kurt Marko
Kurt Marko
Contributing Editor
Howard Marks
Howard Marks
Network Computing Blogger
Leonard T. Marzigliano
Leonard T. Marzigliano
CISSP-ISSMP, Information Assurance Architect, Defense Logistics Agency
Paul McDougall
Paul McDougall
Editor At Large, InformationWeek
Laurianne McLaughlin
Laurianne McLaughlin
Editor-in-Chief, InformationWeek.com
Michelle McNickle
Michelle McNickle
Associate Editor of InformationWeek Healthcare
Jasmine McTigue
Jasmine McTigue
Principal, McTigue Analytics
David Melnick
David Melnick
Founder & CEO, WebLife Balance
Grayson Milbourne
Grayson Milbourne
Director, Security Intelligence, Webroot
Grant Moerschel
Grant Moerschel
Co-Founder, WaveGard
Chris Murphy
Chris Murphy
Editor, InformationWeek
Andrew Conry Murray
Andrew Conry Murray
Director of Content & Community, Interop
Corey Nachreiner
Corey Nachreiner
Director, Security Strategy & Research, WatchGuard Technologies
Wendy Nather
Wendy Nather
Research Director, Enterprise Security Practice
Fritz Nelson
Fritz Nelson
Vice President, Editorial Director InformationWeek Business Technology Network
Fredrik Nilsson
Fredrik Nilsson
General Manager, Axis Communications, North America
Roma Nowak
Roma Nowak
Sr Director Web Operations & Production
Susan Nunziata
Susan Nunziata
Director of Editorial, Enterprise Efficiency
Thomas Pedersen
Thomas Pedersen
CEO & Founder, OneLogin
John W. Pirc
John W. Pirc
Research Vice President, NSS Labs
Dave Piscitello
Dave Piscitello
VP Security, ICANN
Rob Preston
Rob Preston
VP & Editor in Chief, InformationWeek
Brian Prince
Brian Prince
Contributing Writer, Dark Reading
Tom Quillin
Tom Quillin
Director of Cyber Security Technology & Initiatives, Intel Corporation
Jim Reavis
Jim Reavis
Co-Founder & Executive Director, Cloud Security Alliance
Tim Rohrbaugh
Tim Rohrbaugh
VP Information Security, Intersections Inc.
Mike Rothman
Mike Rothman
Analyst & President, Securosis
Tim Sapio
Tim Sapio
Security Analyst, Bishop Fox
Marcia Savage
Marcia Savage
Managing Editor, Network Computing
John H. Sawyer
John H. Sawyer
Contributing Writer, Dark Reading
Jaeson Schultz
Jaeson Schultz
Threat Research Engineer, Cisco TRAC Team
Nick Selby
Nick Selby
CEO, StreetCred Software, Inc
Shahar Tal
Shahar Tal
Vulnerability & Security Research Manager, Check Point Software Technologies
Bankim Tejani
Bankim Tejani
Senior Security Architect, ServiceMesh
Bala Venkat
Bala Venkat
CMO, Cenzic
Mitch Wagner
Mitch Wagner
California Bureau Chief, Light Reading
Peter Waterhouse
Peter Waterhouse
Senior Technical Marketing Advisor, CA Technologies
Mark Weinstein
Mark Weinstein
Founder & CEO, Sgrouples
Jeff Williams
Jeff Williams
CTO, Contrast Security
Ira Winkler
Ira Winkler
Co-Founder & President, Secure Mentem, Inc.
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Containing Corporate Data on Mobile Devices
Containing Corporate Data on Mobile Devices
If youíre still focused on securing endpoints, youíve got your work cut out for you. WiFi network provider iPass surveyed 1,600 mobile workers and found that the average US employee carries three devices -- a smartphone, a computer, and a tablet or e-reader -- with more than 80% of them doing work on personal devices.
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2012-0360
Published: 2014-04-23
Memory leak in Cisco IOS before 15.1(1)SY, when IKEv2 debugging is enabled, allows remote attackers to cause a denial of service (memory consumption) via crafted packets, aka Bug ID CSCtn22376.

CVE-2012-1317
Published: 2014-04-23
The multicast implementation in Cisco IOS before 15.1(1)SY allows remote attackers to cause a denial of service (Route Processor crash) by sending packets at a high rate, aka Bug ID CSCts37717.

CVE-2012-1366
Published: 2014-04-23
Cisco IOS before 15.1(1)SY on ASR 1000 devices, when Multicast Listener Discovery (MLD) tracking is enabled for IPv6, allows remote attackers to cause a denial of service (device reload) via crafted MLD packets, aka Bug ID CSCtz28544.

CVE-2012-3062
Published: 2014-04-23
Cisco IOS before 15.1(1)SY, when Multicast Listener Discovery (MLD) snooping is enabled, allows remote attackers to cause a denial of service (CPU consumption or device crash) via MLD packets on a network that contains many IPv6 hosts, aka Bug ID CSCtr88193.

CVE-2012-3918
Published: 2014-04-23
Cisco IOS before 15.3(1)T on Cisco 2900 devices, when a VWIC2-2MFT-T1/E1 card is configured for TDM/HDLC mode, allows remote attackers to cause a denial of service (serial-interface outage) via certain Frame Relay traffic, aka Bug ID CSCub13317.

Best of the Web