Careers & People
News & Commentary
Improving Security Savvy Of Execs And Board Room
Sara Peters, Senior Editor at Dark ReadingCommentaryVideo
Jeff Welgan describes how best to improve cybersecurity literacy throughout the C-suite.
By Sara Peters Senior Editor at Dark Reading, 9/28/2016
Comment0 comments  |  Read  |  Post a Comment
Improving The Security Conversation For CIOs, CISOs, & Board Members
Kelly Sheridan, Associate Editor, InformationWeekNews
Cybersecurity is a top priority among enterprise leaders, but it's difficult for them to communicate with IT and security teams if they lack an understanding of key security concepts.
By Kelly Sheridan Associate Editor, InformationWeek, 9/28/2016
Comment0 comments  |  Read  |  Post a Comment
7 Factors That Make Security Organizations More Effective
Steve Zurier, Freelance WriterNews
(ISC)2 members have plenty of technical chops, but IANS research found they need to focus more on how infosec aligns with the business.
By Steve Zurier Freelance Writer, 9/22/2016
Comment1 Comment  |  Read  |  Post a Comment
Snowden: Hollywood Highlights 2 Persistent Privacy Threats
Will Ackerly, Co-Founder & CTO, VirtruCommentary
Oliver Stones movie shows us that while most of us have nothing to hide, we all have information worth protecting both technically and constitutionally.
By Will Ackerly Co-Founder & CTO, Virtru, 9/22/2016
Comment11 comments  |  Read  |  Post a Comment
Florida Man Charged With Hacking Linux Servers
Dark Reading Staff, Quick Hits
Donald Austin allegedly stole credentials of Linux employee to hack four company servers and install rootkit and Trojan software.
By Dark Reading Staff , 9/21/2016
Comment0 comments  |  Read  |  Post a Comment
How You Can Support InfoSec Diversity, Starting With The Colleagues You Already Have
Sara Peters, Senior Editor at Dark ReadingCommentaryVideo
Jamesha Fisher, Security Operations Engineer of GitHub, visits the Dark Reading News Desk at Black Hat to discuss her work making security more accessible to the uninitiated, and how a predominately white and male information security field can better support women and people of color.
By Sara Peters Senior Editor at Dark Reading, 9/20/2016
Comment2 comments  |  Read  |  Post a Comment
What Smart Cities Can Teach Enterprises About Security
Gary Hayslip, Deputy Director, CISO, City of San DiegoCommentary
The more you simplify your security program while still being effective, the better, says San Diegos chief information security officer. Heres his three-step process.
By Gary Hayslip Deputy Director, CISO, City of San Diego, 9/19/2016
Comment0 comments  |  Read  |  Post a Comment
The Time Is Now To Address The Cybersecurity Talent Shortage In Unique Ways
Jeannette Jarvis, Director, Product Management for Intel Security
Cultivating talent from unaccustomed outlets will benefit all of us.
By Jeannette Jarvis Director, Product Management for Intel Security, 9/19/2016
Comment0 comments  |  Read  |  Post a Comment
Top Colleges For Cybersecurity
Ericka Chickowski, Contributing Writer, Dark Reading
Check out these respected post-secondary U.S. cybersecurity education programs at both undergraduate and graduate levels.
By Ericka Chickowski Contributing Writer, Dark Reading, 9/19/2016
Comment3 comments  |  Read  |  Post a Comment
Stop Blaming Users. Make Security User-Friendly.
Sara Peters, Senior Editor at Dark ReadingCommentaryVideo
Jelle Niemantsverdriet of Deloitte explains how security improves if security tools and error messages educate users and 'put a smile on someone's face.'
By Sara Peters Senior Editor at Dark Reading, 9/15/2016
Comment1 Comment  |  Read  |  Post a Comment
France's Online Criminal Underground Built On Foundation Of Distrust
Sara Peters, Senior Editor at Dark ReadingNews
French criminals seeking black market goods and services -- cyber and otherwise -- have to look in darker shadows and work harder to prove their felonious credibility.
By Sara Peters Senior Editor at Dark Reading, 9/14/2016
Comment0 comments  |  Read  |  Post a Comment
Security Certifications Highly Valued But Not Always Verified
Kelly Sheridan, Associate Editor, InformationWeekNews
New study shows IT leaders place the greatest value on cybersecurity certifications, but nearly half rarely confirm legitimacy of new hires' credentials.
By Kelly Sheridan Associate Editor, InformationWeek, 9/13/2016
Comment1 Comment  |  Read  |  Post a Comment
Israeli Teenagers Held For Allegedly Running Hacking Service
Dark Reading Staff, Quick Hits
The two 18-year-olds were responsible for more than 150,000 DDoS attacks which earned them around $600,000 in two years, say reports.
By Dark Reading Staff , 9/13/2016
Comment0 comments  |  Read  |  Post a Comment
Government Accelerates Cyber Hiring
Ned Miller, Intel Security, Chief Technology Strategist for Public Sector
The federal government is looking to add 3,500 more cyber and IT workers by January 2017.
By Ned Miller Intel Security, Chief Technology Strategist for Public Sector, 9/12/2016
Comment0 comments  |  Read  |  Post a Comment
Dan Kaminsky On How Not To Lose The Internet As We Know It
Sara Peters, Senior Editor at Dark ReadingCommentaryVideo
Dan Kaminsky discusses how to improve the security and privacy of the Internet without destroying the openness and freedom to innovate that it has always provided.
By Sara Peters Senior Editor at Dark Reading, 9/12/2016
Comment0 comments  |  Read  |  Post a Comment
HackProof Systems Challenges Hackers To Breach Server Security
Dark Reading Staff, Quick Hits
Company invites hackers to penetrate its new security technology and win $5,000.
By Dark Reading Staff , 9/8/2016
Comment7 comments  |  Read  |  Post a Comment
Defining The Common Core Of Cybersecurity: Certifications + Practical Experience
Jung Lee, Head of Certification Test Preparation Programs, CyberVistaCommentary
Security certifications are necessary credentials, but alone wont solve the industrys critical talent gap.
By Jung Lee Head of Certification Test Preparation Programs, CyberVista, 9/7/2016
Comment0 comments  |  Read  |  Post a Comment
The New Security Mindset: Embrace Analytics To Mitigate Risk
Todd Thibodeaux, President & CEO, CompTIACommentary
Sure, conducting a penetration test can find a weakness. But to truly identify key areas of risk, organizations must start to think more creatively, just like todays hackers.
By Todd Thibodeaux President & CEO, CompTIA, 9/5/2016
Comment0 comments  |  Read  |  Post a Comment
How IT Departments Can Manage The Security Skills Shortage
Kelly Sheridan, Associate Editor, InformationWeekNews
A lack of skilled cybersecurity talent is putting organizations at risk. Which skills are in highest demand, and how can IT managers secure the right people to protect their information?
By Kelly Sheridan Associate Editor, InformationWeek, 9/1/2016
Comment3 comments  |  Read  |  Post a Comment
How To Talk About Security With Every C-Suite Member
Andrew Storms, VP Security Services, New ContextCommentary
Reframe your approach with context in order to get your message across.
By Andrew Storms VP Security Services, New Context, 9/1/2016
Comment0 comments  |  Read  |  Post a Comment
More Stories
Current Conversations
More Conversations
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Five Emerging Security Threats - And What You Can Learn From Them
At Black Hat USA, researchers unveiled some nasty vulnerabilities. Is your organization ready?
Flash Poll
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7445
Published: 2015-10-15
The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated b...

CVE-2015-4948
Published: 2015-10-15
netstat in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x, when a fibre channel adapter is used, allows local users to gain privileges via unspecified vectors.

CVE-2015-5660
Published: 2015-10-15
Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.

CVE-2015-6003
Published: 2015-10-15
Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.

CVE-2015-6333
Published: 2015-10-15
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076.

Dark Reading Radio
Archived Dark Reading Radio
Cybercrime has become a well-organized business, complete with job specialization, funding, and online customer service. Dark Reading editors speak to cybercrime experts on the evolution of the cybercrime economy and the nature of today's attackers.